IDP Attacks and Attack Objects