Application Layer
Server Defender monitors network traffic & detects unusual data transfers, such as large data exfiltration attempts or unauthorized access to sensitive files.
ParametersNetwork Traffic Patterns, File Access Patterns
Presentation Layer
Server Defender detects suspicious activity in encrypted data, spotting signs of tampering or decryption attempts, while also tracking compression algorithm usage to flag unusual data patterns indicating potential threats.
ParametersEncryption Algorithms, Compression Algorithms, Data Patterns
Session Layer
Server Defender examines session IDs, timestamps, & state transitions to identify inconsistencies that could indicate session hijacking or other session-based attacks.
ParametersSession IDs, Session Timestamps, Session State Transitions
Transport Layer
Server Defender analyzes TCP & UDP packets to detect suspicious activity, such as unauthorized port scans, unusual packet sizes, or anomalous traffic patterns.
ParametersSource & Destination Ports, Packet Headers, Network Traffic Patterns
Network Layer
Server Defender monitors IP addresses, MAC addresses, network traffic patterns, & intrusion detection alerts to detect IP spoofing, routing anomalies, & malicious ICMP
ParametersIP Addresses, MAC Addresses, Network Traffic Patterns, Intrusion Detection Alerts
Data Link Layer
Server Defender analyzes Ethernet & Wi-Fi frames to detect MAC address spoofing, frame tampering, & abnormal error rates.
ParametersMAC Addresses, Frame Types, Error Rates
Physical Layer
Server Defender monitors signal strength, noise level, Bit Error Rate (BER), packet loss, & jitter to identify signal interference, excessive noise, high bit error rates & abnormal packet loss or jitter, which may indicate physical layer attacks or hardware malfunctions
ParametersSignal Strength, Noise Level, Bit Error Rate (BER), Packet Loss, Jitter
By correlating data from all seven layers, Server Defender can accurately detect and identify threats that go unnoticed by traditional siloed security solutions. Additionally, Server Defender’s patented AI algorithm can analyze patterns & anomalies across layers to proactively prevent attacks before they can cause damage.
Layer | Key Elements & Protocols |
Layer 7 - Application | Protocols: HTTP, HTTPS, SMTP, FTP, DHCP, SSH |
Applications: Web Browsers, Email Clients, FTP Clients, DNS Servers, DHCP Servers, SSH Clients | |
Layer 6 - Presentation | Date Manipulation Methods: Encryption, Decryption, Data Compression, Syntax Conversion, JPEG, MPEG |
Layer 5 - Session | Protocols: NetBIOS, RPC, PPTP, SMB, Session Establishment |
Layer 4 - Transport | Protocols: TCP, UDP, SCTP, ICMP, Ports, Flow Control, Error Detection/Correction, Segmentation & Reassembly |
Layer 3 - Network | Protocols: IP, ICMP, OSPF, BGP, NAT, Subnetting, Routing |
Layer 2 - Data Link | Sublayers: Logical Link Control (LLC), Media Access Control (MAC) |
Elements: Ethernet, MAC Addresses, VLAN, Frame Check Sequence (FCS), Error Detection | |
Layer 1 - Physical | Elements: Ethernet Cables, Hubs, Repeaters, Bit Encoding, Signal Transmission, Physical Medium |
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article