What is server defender detection strategy?

Modified on Mon, 8 Jul at 5:20 PM

Application Layer

Server Defender monitors network traffic & detects unusual data transfers, such as large data exfiltration attempts or unauthorized access to sensitive files.

Parameters

Network Traffic Patterns, File Access Patterns

Presentation Layer

Server Defender detects suspicious activity in encrypted data, spotting signs of tampering or decryption attempts, while also tracking compression algorithm usage to flag unusual data patterns indicating potential threats.

Parameters

Encryption Algorithms, Compression Algorithms, Data Patterns

Session Layer

Server Defender examines session IDs, timestamps, & state transitions to identify inconsistencies that could indicate session hijacking or other session-based attacks.

Parameters

Session IDs, Session Timestamps, Session State Transitions

Transport Layer

Server Defender analyzes TCP & UDP packets to detect suspicious activity, such as unauthorized port scans, unusual packet sizes, or anomalous traffic patterns.

Parameters

Source & Destination Ports, Packet Headers, Network Traffic Patterns

Network Layer

Server Defender monitors IP addresses, MAC addresses, network traffic patterns, & intrusion detection alerts to detect IP spoofing, routing anomalies, & malicious ICMP

Parameters

IP Addresses, MAC Addresses, Network Traffic Patterns, Intrusion Detection Alerts

Data Link Layer

Server Defender analyzes Ethernet & Wi-Fi frames to detect MAC address spoofing, frame tampering, & abnormal error rates.

Parameters

MAC Addresses, Frame Types, Error Rates

Physical Layer

Server Defender monitors signal strength, noise level, Bit Error Rate (BER), packet loss, & jitter to identify signal interference, excessive noise, high bit error rates & abnormal packet loss or jitter, which may indicate physical layer attacks or hardware malfunctions

Parameters

Signal Strength, Noise Level, Bit Error Rate (BER), Packet Loss, Jitter


By correlating data from all seven layers, Server Defender can accurately detect and identify threats that go unnoticed by traditional siloed security solutions. Additionally, Server Defender’s patented AI algorithm can analyze patterns & anomalies across layers to proactively prevent attacks before they can cause damage.


LayerKey Elements & Protocols
Layer 7 - Application Protocols: HTTP, HTTPS, SMTP, FTP, DHCP, SSH
Applications: Web Browsers, Email Clients, FTP Clients, DNS Servers, DHCP Servers, SSH Clients
Layer 6 - Presentation
Date Manipulation Methods: Encryption, Decryption, Data Compression, Syntax Conversion, JPEG, MPEG
Layer 5 - Session Protocols: NetBIOS, RPC, PPTP, SMB, Session Establishment
Layer 4 - Transport
Protocols: TCP, UDP, SCTP, ICMP, Ports, Flow Control, Error Detection/Correction, Segmentation & Reassembly
Layer 3 - Network Protocols: IP, ICMP, OSPF, BGP, NAT, Subnetting, Routing
Layer 2 - Data Link
Sublayers: Logical Link Control (LLC), Media Access Control (MAC)
Elements: Ethernet, MAC Addresses, VLAN, Frame Check Sequence (FCS), Error Detection
Layer 1 - Physical
Elements: Ethernet Cables, Hubs, Repeaters, Bit Encoding, Signal Transmission, Physical Medium

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article