This document discusses malicious traffic on computer networks. It defines malicious traffic as any traffic anomalies caused by hardware/software failures or intentionally modified internet packets. Several types of malicious traffic are described, including scanners, worms, spam, backscatter, and denial-of-service (DOS) attacks. Methods for detecting and preventing malicious traffic involve anomaly detection techniques, signature scanning, intrusion detection systems, quality-of-service metrics, and network filters. The conclusion emphasizes the importance of security awareness to help mitigate internet misuse.