What kind of attacks are covered by server defender?

Modified on Fri, 26 Jul at 2:47 PM

CategoryVersion / Phase TimelineSpecific Threats, Attacks & Features
Version / Phase Timeline
Specific Threats & Attacks
1: Network Traffic



Version 2.0 / Phase 1 Q4 2025
Unified Host & Network Analysis
User-Computer Authentication
Network Intrusion Simulation (Military Simulation)
Web Server Data Set (Cable Bound & Wifi Services)
Botnet, Normal & Background Traffic Data Set
Malware Traffic, Network Forensics, SCADA/ICS Network Captures, Packet Injection Attacks/Man-on-the-Side Attacks
PCAP Data Training
IoT Device Communications
2: Malware

Version 1.0 / Phase 1 Q2 2025
Fuzzers

Version 2.0 / Phase 2 In The Near Future
Open Source Intrusion Detection System
Analysis Opfake
Backdoors
FakeInst
Denial of Service (DoS)
DroidKungFu
Exploits BaseBridge
Generic
Gappusin
Reconnaissance

Shellcode

Worms

3: Software
Version 1.0 /  Phase 2 Q3 2025
JavaScript-Based Vulnerabilities

Version 2.0 / Phase 2 In The Near Future
Snort Intrusion Detection Logs, Domain Name Service Logs, Web Server Logs, Log Server Aggregate Logs
Scan HTTP headers
ISOT Interactions
Training On Phishing Websites
4: Web Apps

Version 1.0 /  Phase 2 Q3 2025
Application Attack Payloads

Version 2.0 / Phase 2 In The Near Future
Web Attack Payloads
Wide Scan Data Repositories
Application Firewalls
Web Logs 
Crawlers 
5: URLs and Domain Names

Version 1.0 /  Phase 2 Q3 2025
Malicious URLs
Version 2.0 / Phase 2 In The Near Future
Cybercrime Tracker
Malware Domain List Mapping
Malicious URLs (IPV6)
Spam
6: Host


Version 2.0 / Phase 2 In The Near Future
Public Security Log Sharing Websites
7: Email


Version 2.0 / Phase 2 In The Near Future
Spam Email Identifiers
8: Fraud


Version 2.0 / Phase 2 In The Near FutureCredit Card Fraud Detection
9: Honeypots


Version 2.0 / Phase 2 In The Near Future
Distributed Denial of Service (DDoS)
10: Binaries


Version 2.0 / Phase 2 In The Near Future
Executable Files Causing Issues
11: Phishing


Version 2.0 / Phase 2 In The Near Future
Phishing Attacks
12: Passwords Frequency


Version 2.0 / Phase 2 In The Near Future
Password Frequency Mapping

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article