Specify an alphanumeric name for the object. You might want to include the protocol the attack uses in the attack name.