Show 

Home > Endpoint Protection / Advanced for Windows > Intrusion Prevention > Types of IDS attacks

Types of IDS attacks

DoS (Denial-of-Service) attacks

Denial-of-service attacks are designed to make a device or service unavailable to its intended users. They rely primarily on brute force, flooding the target with an overwhelming flux of packets, or exploiting known vulnerabilities in an application, operating system or device.

These attacks include:

LAND attack

SYN flood

UDP flood

ICMP attack

Fragmentation control

 

Protocol or application security

Protocol security mechanisms protect certain protocols against known vulnerabilities. They rely on the knowledge of protocols and their context to reject unsolicited requests.

These include:

Smart WINS

Smart DNS

Smart DHCP

Smart ARP

Header lengths

ICMP attack

Fragmentation control

 

Tracking and discovery

These protection mechanisms detect deviation from known legitimate behavior in order to track devices and discover vulnerabilities.

These include:

TCP flags check

TCP port scan

UDP port scan

ICMP filter echo request

OS detection

IP explicit path

Fragmentation control