Vulnerability Scan in Visual Studio .NET

Drawing Code 128 in Visual Studio .NET Vulnerability Scan
7211 Vulnerability Scan
Decoding Code128 In .NET
Using Barcode Control SDK for .NET Control to generate, create, read, scan barcode image in VS .NET applications.
NMAP 381, which is used in the Vulnerability Scan attack, probes each port on the victim computer to nd open ports, and then examines each open port to determine the type and version of software providing service at each port as well as the type and version of the operating system through, for example, inspecting the reply packets for sequence numbers, response messages, and so on The attack ends when NMAP completes its scanning procedure
Code 128A Printer In Visual Studio .NET
Using Barcode generation for Visual Studio .NET Control to generate, create Code 128B image in .NET framework applications.
7212 Text Editing
Recognize Code 128 Code Set C In .NET
Using Barcode scanner for VS .NET Control to read, scan read, scan image in VS .NET applications.
In the text editing activity, the user is asked to open a Microsoft WORD le and type the text from a piece of paper given to the user for ten or more minutes
Encoding Bar Code In Visual Studio .NET
Using Barcode drawer for Visual Studio .NET Control to generate, create bar code image in .NET framework applications.
7213 Web Browsing
Bar Code Scanner In .NET Framework
Using Barcode decoder for VS .NET Control to read, scan read, scan image in .NET applications.
In the web browsing activity, the user is asked to use Windows Internet Explore to search the Google web site, wwwgooglecom, for a topic (eg, intrusion detection ) and keep visiting the related sites for ten or more minutes
Create Code 128 Code Set B In Visual C#.NET
Using Barcode drawer for VS .NET Control to generate, create Code 128 Code Set C image in .NET framework applications.
Procedure of data collection
Encode USS Code 128 In Visual Studio .NET
Using Barcode printer for ASP.NET Control to generate, create Code 128 image in ASP.NET applications.
Outside Network
Code 128 Code Set C Maker In VB.NET
Using Barcode generation for VS .NET Control to generate, create Code 128 Code Set A image in VS .NET applications.
Ethernet
Barcode Printer In .NET
Using Barcode creation for .NET Control to generate, create bar code image in .NET applications.
DLink DSS-16 Switch
GS1-128 Generation In .NET Framework
Using Barcode generation for .NET framework Control to generate, create UCC - 12 image in VS .NET applications.
NetGear Router
UPC Symbol Maker In Visual Studio .NET
Using Barcode encoder for Visual Studio .NET Control to generate, create UPC Symbol image in VS .NET applications.
Ethernet
Make USS Code 93 In .NET Framework
Using Barcode generator for Visual Studio .NET Control to generate, create Code 93 image in Visual Studio .NET applications.
Ethe
Scanning EAN / UCC - 13 In .NET
Using Barcode recognizer for VS .NET Control to read, scan read, scan image in VS .NET applications.
rnet
Draw Barcode In .NET
Using Barcode maker for ASP.NET Control to generate, create bar code image in ASP.NET applications.
he Et
Decoding DataMatrix In .NET Framework
Using Barcode scanner for .NET Control to read, scan read, scan image in Visual Studio .NET applications.
Ethe
Bar Code Drawer In Java
Using Barcode drawer for Java Control to generate, create barcode image in Java applications.
rnet
Generating EAN / UCC - 14 In .NET Framework
Using Barcode printer for ASP.NET Control to generate, create EAN / UCC - 14 image in ASP.NET applications.
Dell PC #1 with Linux (Attacker)
Bar Code Encoder In VS .NET
Using Barcode creation for ASP.NET Control to generate, create bar code image in ASP.NET applications.
Dell PC #2 with Windows XP (Attacker)
Encode UPC Symbol In Java
Using Barcode creation for Java Control to generate, create UCC - 12 image in Java applications.
Dell PC #3 with Windows 2000 (Attacker)
Create UPC-A Supplement 5 In C#.NET
Using Barcode generation for .NET framework Control to generate, create UPCA image in VS .NET applications.
Dell PC #4 with Windows XP (Normal User)
Figure 71 Computer network setup for data collection
73 COMPUTER NETWORK SETUP FOR DATA COLLECTION
Figure 71 shows the computer network setup, which consists of mainly a NetGear router and four Dell PCs which are linked to the router through 100Mbps Ethernet cables Three of the four Dell PCs are used as the attacking computers, and another Dell PC is used by a normal user as the victim computer from which Windows performance objects data are collected Three attacking computers have the Linux operating system, the Windows XP operating system, and the Windows 2000 operating systems to execute Linux-, Windows XP-, and Windows 2000-based attacks, respectively The victim computer has the Windows XP operating system Table 73 lists the hardware capacities and software con gurations of the router and four Dell PCs For the Fork Bomb, Hardware Keylogger and Software Keylogger attacks, the attacking computers are turned off since these attacks involve only the victim computer on which hardware device or software for attacking is installed and executed
74 PROCEDURE OF DATA COLLECTION
For each of eleven attacks, three runs of activities are carried out on the victim computer as shown in Table 74 to collect data from the victim computer A blank cell in Table 74 indicates that the corresponding activity is not carried out in the corresponding run As noted by V in Table 74, the duration of an attack activity varies with attacks, and the duration of each attack may vary slightly in each run of execution Table 75 shows the duration of each attack execution by listing the number of data observations obtained from each run of attack execution for each attack, with the data sampling rate of every 1 second The design of three runs for each attack is to discover data characteristics of each attack and each normal use activity and also provide testing data to evaluate detection models in Parts IV VI of this book The comparison of inactive data with attack data from Run 1 reveals
Windows performance objects data
Table 73 Hardware capacities and software con gurations of equipment in the computer network setup Equipment NetGear Router Capacities and Con gurations Processor: 200 MHz Memory: 2 Mb Flash, 16 Mb SDRAM Bandwidth: 125 Mbps for LAN to WAN, 12 Mbps for 3DES Con guration: only outgoing network traf c is allowed through the router, except when the normal user is performing the web browsing activity Processor: Pentium 4, 300 GHz RAM: 375 GB Hard disk: 120 GB Operating system: Linux Ubuntu 504 Attacks supported: Apache Resource DoS, ARP Poison, Distributed DoS, FTP Buffer Over ow, Rootkit, and Security Audit Processor: Pentium 4, 300 GHz RAM: 25 GB Hard disk: 120 GB Network interface: Intel Pro/1000 MT Network Operating system: Microsoft Windows XP Professional with Service Pack 2 Attacks supported: Vulnerability Scan Processor: Pentium 4, 300 GHz RAM: 1 GB Operating system: Microsoft Windows 2000 Attack supported: Remote Dictionary Processor: Pentium 4, 300 GHz RAM: 30 GB Operating system: Microsoft Windows XP Professional with Service Pack 2 Attacks supported: Fork Bomb, Hardware Keylogger, and Software Keylogger