Unobtrusive Mapping of Network
Purpose of Scanning the Network: Stealth Attacks