Host-based network intrusion detection systems
A host and communication network technology, which is applied in the field of communication network security and can solve problems such as vulnerability to insertion and evasion attacks, and significant overhead.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0052] figure 2 The scanning module (SM) 200 is shown in more detail. The scanning module 200 includes a scanning engine 202 , a signature database 201 and a log database 203 .
[0053] Signature database 201 contains a list of known attack signatures. This is similar to the virus signature database used by antivirus systems. Scan engine 202 uses the signatures in signature database 201 to detect intrusions. The signature database 201 may be a plain ASCII file containing a list of signatures, although other file formats may also be used. These signatures are available from the arachNIDS database.
[0054] Table 1 gives an example of a signature, where "|" is used to contain binary data in bytecode format:
[0055] ″|eb 02 eb 02 eb 02|″
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 