Home > Endpoint Protection / Advanced for Windows > Intrusion Prevention > Types of IDS attacks
Denial-of-service attacks are designed to make a device or service unavailable to its intended users. They rely primarily on brute force, flooding the target with an overwhelming flux of packets, or exploiting known vulnerabilities in an application, operating system or device.
These attacks include:
LAND attack
SYN flood
UDP flood
ICMP attack
Fragmentation control
Protocol security mechanisms protect certain protocols against known vulnerabilities. They rely on the knowledge of protocols and their context to reject unsolicited requests.
These include:
Smart WINS
Smart DNS
Smart DHCP
Smart ARP
Header lengths
ICMP attack
Fragmentation control
These protection mechanisms detect deviation from known legitimate behavior in order to track devices and discover vulnerabilities.
These include:
TCP flags check
TCP port scan
UDP port scan
ICMP filter echo request
OS detection
IP explicit path
Fragmentation control