Attacks affecting most objects in .NET

Generation Code 128 in .NET Attacks affecting most objects
7 Attacks affecting most objects
Scanning USS Code 128 In VS .NET
Using Barcode Control SDK for Visual Studio .NET Control to generate, create, read, scan barcode image in .NET framework applications.
Distributed DoS and Software Keylogger (affecting 4 out of 8 objects)
Code 128B Generation In .NET Framework
Using Barcode encoder for .NET framework Control to generate, create Code 128A image in .NET applications.
Vulnerability Scan (affecting 9 out of 11 objects)
Code 128 Code Set B Reader In .NET
Using Barcode decoder for VS .NET Control to read, scan read, scan image in .NET applications.
Distributed DoS and Hardware Keylogger (affecting 3 out of 5 objects)
Generate Barcode In Visual Studio .NET
Using Barcode maker for VS .NET Control to generate, create barcode image in .NET applications.
Remote Dictionary (affecting 9 out of 12 objects)
Reading Barcode In VS .NET
Using Barcode decoder for .NET Control to read, scan read, scan image in .NET framework applications.
8 Attacks affecting no objects X (appearing in 4 attacks)
Painting Code 128 In C#.NET
Using Barcode creator for .NET Control to generate, create Code 128B image in Visual Studio .NET applications.
ARP Poison and Hardware Keylogger (affecting 5 out of 8 objects) Apache Resources DoS
Drawing Code 128 Code Set A In VS .NET
Using Barcode generation for ASP.NET Control to generate, create Code128 image in ASP.NET applications.
9 The distribution change in the Cache object that is most common among the attacks
Code 128 Code Set C Creator In VB.NET
Using Barcode creation for Visual Studio .NET Control to generate, create Code128 image in VS .NET applications.
10 The distribution change in the IP object that is most common among the attacks
Barcode Encoder In .NET Framework
Using Barcode generator for Visual Studio .NET Control to generate, create bar code image in .NET applications.
X (appearing in 4 attacks)
Code 3 Of 9 Creation In VS .NET
Using Barcode printer for VS .NET Control to generate, create Code 3 of 9 image in .NET applications.
11 The distribution change in the LogicalDisk object that is most common among the attacks X (appearing in 7 attacks)
Barcode Creator In Visual Studio .NET
Using Barcode creation for VS .NET Control to generate, create barcode image in VS .NET applications.
X (appearing in 9 attacks)
Creating Code 11 In .NET
Using Barcode generator for Visual Studio .NET Control to generate, create Code 11 image in Visual Studio .NET applications.
12 The distribution change in the Memory object that is most common among the attacks
ECC200 Drawer In Java
Using Barcode drawer for Java Control to generate, create Data Matrix 2d barcode image in Java applications.
13 The distribution change in the Network Interface object that is most common among the attacks
GTIN - 13 Drawer In Visual Studio .NET
Using Barcode maker for ASP.NET Control to generate, create EAN 13 image in ASP.NET applications.
X (appearing in 4 attacks)
Barcode Creation In Java
Using Barcode creator for Java Control to generate, create bar code image in Java applications.
(Continued )
Scanning Barcode In .NET Framework
Using Barcode decoder for .NET framework Control to read, scan read, scan image in .NET framework applications.
Table 99 (Continued ) Characteristics of distribution change to DUR X (appearing in 2 attacks) X (appearing in 2 attacks) DUS DUF DMM
Code 39 Extended Encoder In Java
Using Barcode maker for Java Control to generate, create Code 3 of 9 image in Java applications.
Findings
Print Data Matrix 2d Barcode In VS .NET
Using Barcode creator for ASP.NET Control to generate, create Data Matrix ECC200 image in ASP.NET applications.
14 The distribution change in the Objects object that is most common among the attacks X (appearing in 8 attacks)
Reading UPC-A In .NET
Using Barcode recognizer for Visual Studio .NET Control to read, scan read, scan image in VS .NET applications.
X (appearing in 2 attacks)
Paint Universal Product Code Version A In Visual Studio .NET
Using Barcode encoder for ASP.NET Control to generate, create UPC-A Supplement 5 image in ASP.NET applications.
15 The distribution change in the PhysicalDisk object that is most common among the attacks X (appearing in all 10 attacks)
16 The distribution change in the Process object that is most common among the attacks X (appearing in 6 attacks)
17 The distribution change in the Processor object that is most common among the attacks X (appearing in 7 attacks)
18 The distribution change in the System object that is most common among the attacks X (appearing in 5 atatcks)
X (appearing in 7 attacks)
19 The distribution change in the Terminal Services Session object that is most common among the attacks
20 The distribution change in the UDP object that is most common among the attacks
X (appearing in 3 attacks)
Probability distribution change characteristics
Finding 1 in Table 99 indicates that totally 8, 11, 5, 8, and 12 performance objects have attack characteristics of distribution change to the DUL, DUR, DUS, DUF and DMM distributions, respectively Hence, under all the attack conditions, the distribution changes to the right skewed (DUR) and multimodal (DMM) distributions are the most common across all the objects, followed by the left skewed (DUL) and uniform (DUF) distributions The attack characteristics of distribution change to the unimodal symmetric (DUS) distribution affect the smallest number of objects As shown in nding 2 of Table 99, ve performance objects, which include LogicalDisk, Memory, Process, System and Terminal Services Session, encounter the attack characteristics of distribution change to all the ve distributions The IP object, however, encounters the attack characteristics of distribution change to the multimodal (DMM) distribution only as shown in nding 3 of Table 99 The Process object is affected by most of the attacks in the attack characteristics of distribution change to each of the ve distributions as shown in nding 4 of Table 99 The LogicalDisk object is also affected by 9 out of 10 attacks in the attack characteristics of distribution change to the multimodal distribution It can be seen in nding 5 of Table 99 that among all the attacks the Hardware Keylogger attack affects the Process object most in 21 Process variables for the distribution change to the right skewed (DUR) distribution and in 33 process variables for the distribution change to the uniform (DUF) distribution In contrast to the Hardware Keylogger attack which manifests in the Process variables through the distribution changes to the right skewed and uniform distributions, the Software Keylogger attack manifests in the Process variables through mainly the distribution change to the left skewed (DUL) distribution which affects 18 process variables As can be seen in Table 94, the Software Keylogger attack produces the downward spike data pattern (leading to the left skewed distribution) of 19 Process variables, whereas the Hardware Keylogger attack produces the downward spike data pattern in only one Process variable Finding 6 in Table 99 shows that the Software Keylogger, Security Audit, Rootkit, Hardware Keylogger, and Security Audit attacks are the attacks with most of the distribution changes to the left skewed, right skewed, unimodal symmetric, uniform, and multimodal distributions, respectively, in a certain object Finding 7 in Table 99 points out the attacks that affect most of the objects for the attack characteristics of distribution change to each of the ve distributions, including:
r the Distributed DoS attack for the distribution changes to the left skewed distribution and r the Hardware Keylogger attack for the distribution changes to the unimodal symmetric r the Software Keylogger attack for the distribution change to the left skewed distribution r the Vulnerability Scan attack for the distribution change to the right skewed distribution r the ARP Poison attack for the distribution change to the uniform distribution (DUF); r the Remote Dictionary attack for the distribution change to the multimodal distribution
(DMM) (DUR); (DUL); distribution (DUS) and the uniform distribution (DUF); the uniform distribution (DUF);