What is the best defense against stealth scans of the network? I know this is a vague and open question.How do you prevent when signature detects a single TCP packet with none of the control bits, i.e. SYN, FIN, ACK, PSH, URG or RST flags set being ...