Attack in Visual Studio .NET

Draw Code 128 Code Set B in Visual Studio .NET Attack
Attack
Code 128A Scanner In .NET Framework
Using Barcode Control SDK for VS .NET Control to generate, create, read, scan barcode image in VS .NET applications.
Frequency
USS Code 128 Generator In .NET Framework
Using Barcode printer for .NET Control to generate, create Code128 image in Visual Studio .NET applications.
Change
Decoding Code 128A In VS .NET
Using Barcode scanner for Visual Studio .NET Control to read, scan read, scan image in Visual Studio .NET applications.
Total number of affected objects 0/9
Create Bar Code In VS .NET
Using Barcode creator for .NET Control to generate, create barcode image in .NET applications.
Apache
Barcode Recognizer In .NET Framework
Using Barcode reader for VS .NET Control to read, scan read, scan image in .NET framework applications.
Medium
USS Code 128 Maker In C#.NET
Using Barcode creator for Visual Studio .NET Control to generate, create Code 128B image in VS .NET applications.
High
Encode Code 128 Code Set A In .NET Framework
Using Barcode drawer for ASP.NET Control to generate, create Code 128 Code Set C image in ASP.NET applications.
ARP 1 1
Creating Code128 In VB.NET
Using Barcode creation for .NET Control to generate, create Code 128A image in VS .NET applications.
Medium
Code 128 Maker In Visual Studio .NET
Using Barcode creation for .NET framework Control to generate, create ANSI/AIM Code 128 image in .NET framework applications.
High
Create UPC-A Supplement 2 In Visual Studio .NET
Using Barcode generation for VS .NET Control to generate, create UPC A image in VS .NET applications.
Distributed
Bar Code Encoder In .NET Framework
Using Barcode generator for Visual Studio .NET Control to generate, create bar code image in VS .NET applications.
Medium
MSI Plessey Encoder In VS .NET
Using Barcode printer for VS .NET Control to generate, create MSI Plessey image in .NET applications.
High
Barcode Scanner In .NET Framework
Using Barcode scanner for .NET Control to read, scan read, scan image in .NET framework applications.
Fork
ANSI/AIM Code 128 Decoder In .NET Framework
Using Barcode reader for Visual Studio .NET Control to read, scan read, scan image in .NET framework applications.
Medium
Printing UPC-A Supplement 2 In C#
Using Barcode printer for Visual Studio .NET Control to generate, create UPC A image in .NET framework applications.
High
Painting Bar Code In VB.NET
Using Barcode drawer for .NET framework Control to generate, create bar code image in .NET framework applications.
+ + + + + + + + + + + +
Data Matrix ECC200 Generator In Java
Using Barcode generation for Java Control to generate, create Data Matrix 2d barcode image in Java applications.
FTP 3
Code 3 Of 9 Creator In Visual Basic .NET
Using Barcode encoder for .NET framework Control to generate, create Code 39 image in .NET framework applications.
Medium
Barcode Maker In Visual C#
Using Barcode encoder for .NET Control to generate, create bar code image in .NET framework applications.
High
Generating UCC - 12 In Visual Basic .NET
Using Barcode creator for VS .NET Control to generate, create UPC Symbol image in VS .NET applications.
Hardware 1
2/9 1
Medium
High
Remote 5 1 1
6/9 1 1
Medium 2
2 3 4
High
Rootkit 4
2/9 11
Medium
High
Security
3/9 1 2 2 1 2 (Continued)
Medium
High
+ + + + + + + + + + + + + + +
Table 114 (Continued) Objects O1 O2 O3 O4 O5 O6 O7 O8 O9 O10 O11 O12 O13 O14 O15
Attack
Frequency
Change
Total number of affected objects 3/9
Software 4 2 7 4
2 1 3
6/9 2 2 6/11 1/11 0/11 0/11 0/11 2 3/11 2 6 6 7/11 1 1 3/11 0/11 1 1 1/11 1/11 3 3 4/11 0/11
+ Medium + High + Vulnerability Low + Medium + High + Total number of affecting attacks
1/11 0/11
Table 115 The number of wavelet change attack characteristics based on the Daubechies wavelet transform by Windows performance objects and attacks Objects O2 O3 O4 O5 O6 O7 O8 O9 O10 O11 O12 O13 O14 O15
Attack
Frequency
Change
Total number of affected objects 6/15
Apache 1 1 1 2 3 2 3 1 3 2 4
Medium
High
1/15
Medium
High
1 1/15
Distributed
Medium 1
High
Fork
0/15
Medium
High
+ + + + + + + + + + + +
(Continued)
Table 115 (Continued) Objects O2 7 1 3 1 1 2 1 1 2 18 2 6/15 1 2 3 1 1 1 11/15 2 1 2 3 2 1 2 1 2 1 4/15 2 5 1 2 6 6 O3 O4 O5 O6 O7 O8 O9 O10 O11 O12 O13 O14 O15
Attack
Frequency
Change
Total number of affected objects 10/15
FTP 1 2 7 16
Medium
High
+ + +
Hardware
Medium
High
+ + + 2 3 1 1
Remote 4 2 4 1 7 2 1
Medium
High
+ + + 19 37 3 29
Rootkit
Medium
High
+ + +
10 19 7 45
Security 2 1 1 2 1 2 1 1 1 1 2 2 2 1 2 2 3 2 7 31 10 1 1 2 1 1 1 1 2 36 3 1 3 2 2 11 1 2 1 2 16 7 2 12 1 1 2 1 2 2 1 1 3 14 3 4 3 2
1 1 4
2 1 5
8/15
11/15
+ Medium + High + Software Low + Medium + High + Vulnerability Low + Medium + High + Total number of affecting attacks 2 2 2 12 2 4/11 3/11 7/11 8/11 7/11 4/11 1/11 8/11 8/11 5/11 2/11 0/11 5/11 2/11 4/11
10/15
Table 116 The number of wavelet change attack characteristics based on the Morlet wavelet transform by Windows performance objects and attacks Objects O2 2 1 1 2 1 1 3 1 3 1 1 1 2 5 1 O3 O4 O5 O6 O7 O8 O9 O10 O11 O12 O13 O14 O15 1 2
Attack
Frequency
Change
Total number of affected objects 7/14
Apache
Medium
High 6 1
5 3 1
2/14
Medium 2 1 1 2 2 1 3
High
Distributed
9/14
Medium 2 1 1 2
1 1 2 1 1 4 2
High
6 3 1 5 8 1
Fork
3/14 1 1 1
Medium
High 1
+ + + + + + + + + + + + 1
FTP 2 3 1 4 4 6/14 1 1 3 3 1 2 12/14 6 1 1 2 1 2 2 2 2 4/14 1 2 2 1 2 1 2 2 1 1 1
11/14
Medium
8 8 10 11
6 9 2 6
High 18 3
Hardware
Medium
High
Remote 2 1 1 7 4 5 1 1 1 17 4 1 1 4
Medium
High 5 8 2 9 2 18 2 1 2 2 1 2 15 2
Rootkit
Medium
High
Security
4 9 60 30 39 1 67 62 37 85 7 38 43 7 4
9/14
Medium 1 11 1 3
High
8 11 2
+ + + + + + + + + + + + + + + 4 2 3 3 2 3
(Continued)
Table 116 (Continued) Objects O1 7 2 2 2 4 1 5 7 7 5 1 17 49 11 3 O2 O3 O4 O5 O6 O7 O8 O9 O10 O11 O12 O13 1 O14 2 O15
Attack
Frequency
Change
Total number of affected objects 11/14
Software
6 10
2 6 1 9/14
1 1 1 4/11 8/11 7/11 8/11 4/11 2/11 7/11 1
+ Medium + High + Vulnerability Low + Medium + High + Total number of affecting attacks 1 1 1 1 1 1 39 73 3 2 8 6 3 3 1 11/11 6/11 3/11
4 3 1
1 6/11
0/11 7/11
3/11
8/11
Table 117 A comparison of major ndings in the wavelet change attack characteristics based on the ve wavelet transforms Wavelet change attack characteristics based on DoG wavelet 13 Server 9 15 Haar wavelet Daubechies wavelet Morlet wavelet 14
Findings
Paul wavelet
1 Total number of objects affected 2 Object(s) with the attack characteristics for only one wavelet transform 3 Object(s) affected by most attacks Process (affected by all 11 attacks)
Process (affected by all 11 attacks)
Process (affected by 8 out of 11 attacks except ARP Poison, Distributed DoS, and Fork Bomb) Remote Dictionary and Software Keylogger (affecting 11 objects)
Process (affected by all 11 attacks)
4 Attacks affecting most Software Keylogger objects (affecting 12 objects)
Remote Dictionary (affecting 13 objects)
Process (affected by 7 out of 11 attacks except Apache Resource DoS, ARP Poison, Distributed DoS, and Fork Bomb) Remote Dictionary and Vulnerability Scan (affecting 6 objects)
Remote Dictionary (affecting 12 objects)