Source/destination operating system type-based IDS virtualization
An operating system and virtualization technology, applied in the direction of transmission system, electrical components, etc., can solve the problem that the system cannot be upgraded well
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] Embodiments of the present invention relate to techniques for intrusion detection system (IDS) virtualization based on packet target operating system (OS) characteristics and tuning packet inspection to a reduced set of threat signatures. Tuning and the accompanying IDS virtualization are in turn based on the use of passive and / or active packet fingerprinting to determine the target operating system of a packet. In some embodiments, the target OS may be a tuple consisting of the operating systems of the packet's source host and the packet's destination host.
[0014] figure 1 A virtualized intrusion detection system 100 configured in accordance with one embodiment of the invention is shown. Viewed at a high level, the system 100 consists of an interface to the unprotected network 101 , an inspection / processing system component, and a second interface to the protected network 102 . Additionally, operator interface 120 allows an operator to load a population of threat s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 