x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF

Technical Support

Need help?

 

What type of intrusions can IPS protect against?

Information applies to:

Products
Panda GateDefender Integra 100
Panda GateDefender Integra 300

Panda GateDefender Integra can protect against different types of intrusions. The most important are:

 

  • Port scanning

    Before compromising the system, a number of methods that can be used by intruders to examine the target system in order to determine what type of services are housed in a host or subnet. This type of operation is often a clear signal of malicious intentions.

 

  • Denial of Service (DoS)

    This attack aims to leave a certain system or even an entire network without one or more services. Loss of the connection is usually evidence of loss of service, due to the high bandwidth used in the target network by the intruder or an overload on resources, such as memory, CPU, storage systems, etc. By overloading the victim system, the intruder causes it to stop providing the services it is designed to offer. The advanced version of this type of attack is a Distributed Denial of Service (DDoS), which uses various coordinated systems to carry out a large scale attack.

 

  • Attacks that target services

    These types of attacks target databases, the Internet and insecure communications protocols. These are more damaging than other types of attacks. In order to carry out these types of attacks, the intruder exploits known vulnerabilities in order to achieve different objectives. One of the most dangerous attacks aims to obtain superuser privileges, which allow the intruder to gain complete control of the system.

 

  • IP spoofing

    The aim of this attack is to hide the identity of the intruder. If DNS or authentication server type addresses are used, this could result in a denial of service attack or ‘man in the middle’ (MITM) attack.

 

  • Other

    The aims of these attacks can be to find out the network topology, evade the IPS service, etc.
Help nº- 20070702 31465 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





Do you need one of our technicians to connect to
your PC or device remotely to fix a problem?

Discover our Premium Services

ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT