v.1.1
Slightly higher packet counter / timing limits, due to some false positive alerts. As a result, missed Nmap scan types are especially: unfragmented TCP SYN scans at -T1 or below. Added detection rules for port 4444 TCP/UDP, since it's a classic MetaSploit / MeterPreter / NetCat port.