In addition, what malicious traffic patterns would emerge if we could sample the unsolicited traffic - termed Internet ... This includes traffic breakdown by protocol: TCP (80%), UDP (3%), ICMP (17%), ...