Intrusion detection in data processing systems
First Claim
Patent Images
1. Apparatus for testing an intrusion detection system in a data processing system, the apparatus comprising:
- an attack generator for generating attack traffic on a communications path in the data processing system;
a collector for receiving responses generated by the intrusion detection system on receipt of the attack traffic; and
, a controller coupled to the attack generator and the collector for varying the attack traffic generated by the attack generator in dependence on the response received from the intrusion detection system by the collector.
7 Assignments
0 Petitions
Accused Products
Abstract
Described is apparatus for testing an intrusion detection system in a data processing system. The apparatus comprises an attack generator for generating attack traffic on a communications path in the data processing system. A collector receives responses generated by the intrusion detection system on receipt of the attack traffic. A controller coupled to the attack generator and the collector varies the attack traffic generated by the attack generator in dependence on the response received from the intrusion detection system by the collector.
-
Citations
12 Claims
-
1. Apparatus for testing an intrusion detection system in a data processing system, the apparatus comprising:
- an attack generator for generating attack traffic on a communications path in the data processing system;
a collector for receiving responses generated by the intrusion detection system on receipt of the attack traffic; and
, a controller coupled to the attack generator and the collector for varying the attack traffic generated by the attack generator in dependence on the response received from the intrusion detection system by the collector. - View Dependent Claims (2, 3, 4, 5, 6, 9, 10, 11)
- an attack generator for generating attack traffic on a communications path in the data processing system;
-
8. A method for testing an intrusion detection system in a data processing system, the method comprising:
- generating by an attack generator attack traffic in a communications path in the data processing system;
receiving by a collector responses from the intrusion detection system to the attack traffic generated by the attack generator; and
, varying by a controller coupled to the attack generator and the collector the attack traffic generated by the attack generator in dependence on the response received by the collector from the intrusion detection system. - View Dependent Claims (12)
- generating by an attack generator attack traffic in a communications path in the data processing system;
Specification