×

Signature based network intrusion detection system and method

  • US 7,424,744 B1
  • Filed: 03/05/2002
  • Issued: 09/09/2008
  • Est. Priority Date: 03/05/2002
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for execution with computer code embodied on a tangible computer readable medium for detecting intrusions on a network, comprising:

  • storing signature profiles identifying patterns associated with network intrusions in a signature database;

    generating classification rules based on said signature profiles;

    receiving data packets transmitted on the network;

    classifying data packets having corresponding classification rules according to said generated classification rules;

    forwarding said classified packets to a signature engine for comparison with signature profiles; and

    performing a table lookup to select an action to be performed on said classified packets based on the classification;

    wherein the classification is carried out by a first classification stage capable of classifying the data packets based on a first set of packet characteristics, and a second classification stage capable of classifying the data packets received from the first classification stage based on a second set of packet characteristics;

    wherein one of the actions is comparing said classified packets to at least a subset of the signature profiles;

    wherein the first set of packet characteristics on which the classification of the first classification stage is based includes at least one of a destination address, a protocol type, and a destination port number;

    wherein the second set of packet characteristics on which the classification of the second classification stage is based includes at least one of a packet type and a size;

    wherein classifying said data packets comprises classifying said data packets according to at least one packet field into groups, and classifying said data packets within each of the groups according to TCP flags;

    wherein the second classification stage remains in communication with a flow table for identifying an action to be taken with respect to the data packets;

    wherein the action identified utilizing the flow table includes dropping at least one of the data packets and updating one or more fields in the flow table;

    wherein the first classification stage precedes the second classification stage.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×