What does server defender monitor across the OSI Layers?

Modified on Tue, 9 Jul at 11:26 AM

INTRODUCTION

Server Defender provides comprehensive protection across all seven layers of the OSI model through vigilant monitoring and in-depth analysis of network traffic. Here is an overview of its approach to each layer, along with examples 



1: PHYSICAL LAYER
At the forefront of defense, Server Defender meticulously analyzes at the physical layer, delving into the raw bits and signals coursing through the network infrastructure. Here, it proactively confronts threats head-on, swiftly identifying any aberrations or irregularities - even Zero Day threats - that could signal a breach in security or the onset of a physical layer attack. 


Example: Detecting signal anomalies or physical layer attacks.


2: NETWORK LAYER
Monitoring network layer activities, such as network address translations and router configurations. 


Example: Detecting suspicious network configurations or unauthorized router access. At the network layer, Server Defender monitors Network Address Translations (NAT) from the core VAN to the LAN, along with physical and logical router access. Our AI adeptly manages route sequencing, particularly with Cisco devices, though we’re open to exploring routing capabilities with other models, leveraging our success with the MG 365814 router. 


3: TRANSPORT LAYER


Server Defender observes end-to-end communication between devices, monitoring protocols like TCP, UDP, SRP and BGP.


Example: Detecting and mitigating TCP/UDP-based attacks: Server Defender monitors end-to-end communications including TCP, UDP, SRP, and BGP protocols, across LAN, WAN, and VAN frameworks. It ensures continuous oversight and regulation of communication in various architectures, including cloud and open stack environments, managed via a connected VAN motherboard. 




4: DATA LINK LAYER

Server Defender inspects data link layer operations, including VLAN monitoring, encryption and decryption. 


Example: Detecting VLAN spoofing and monitoring data transmissions: At the data link layer, Server Defender inspects ARP and spoofing across all VLANs, encrypts VPN and wireless data, and validates data integrity using checksums and reduced echelon form metrics, ensuring thorough monitoring across OSI stack layers. 


Supporting Information: 

LLC (Logical Link Control): A data link layer sublayer ensuring accurate and reliable data frame delivery between network nodes by overseeing error detection, flow control, and addressing. MAC (Media Access Control): Unique MAC addresses are assigned to network interfaces in the data link layer, regulates access of transmission medium, and prevents collisions in shared network. 


Inter-Device Communication: The data link layer establishes connections in networks, ensuring data integrity with frame synchronization and error detection. Protocols like NetBIOS, RPC, and EAP improve communications and authentication. LLC and MAC manage error checking, addressing, and medium access, enhancing reliability across to the session layer.


5: PRESENTATION LAYER

Analyzes data compression, encryption, decryption, and other operations. 


Example: Server Defender detects unauthorized decryption or manipulation of data during transmission by monitoring checksum values at the bit layer. Suspicious alterations undergo rigorous evaluation against an equation in Reduced Row Echelon Form (RREF) metrics at the physical layer (bit layer). 


6: SESSION LAYER

Monitors protocols such as NetBIOS, RPC, EAP & inter-device communications. 


Example: Server Defender monitors all protocols akin to a circuit-level firewall (Shim Layer) for suspicious activities in inter-device communications.


Supporting Information:


NetBIOS (Network Basic Input/Output System): A session layer protocol for naming and session services, enabling communications between applications on different computers via Local Area Network (LAN). 


RPC (Remote Procedure Call): Facilitates service requests between programs on different networked computers, operating at the session layer to exchange structured data. 


EAP (Extensible Authentication Protocol): Provides a framework for secure authentication in network communications, ensuring standardized authentication methods for network clients. 


Inter-Device Communications: The session layer manages dialog between devices, handling session establishment, maintenance, and termination. It synchronizes data exchange and manages checkpoints for reliability.  


7: APPLICATION LAYER

It monitors data streams using protocols such as HTTP, HTTPS, DHCP, SSH, FTP, and others. 


Example: Detects anomalies in application layer data, like web service or email system attacks - Server Defender utilizes AI to monitor application data frames at the physical layer, scrutinizing each packet. It extends its monitoring to operating system layer patches and activities within the application layer, actively observing data frames transmitted to software instances. 



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article