×

Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing

  • US 8,474,043 B2
  • Filed: 08/28/2008
  • Issued: 06/25/2013
  • Est. Priority Date: 04/17/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method, performed in an intrusion detection/prevention system in a computer system, for evaluating network traffic against rules, comprising:

  • receiving network traffic;

    checking for a matching pattern in a packet in the network traffic using a state machine and a fast pattern matcher based on attack signatures, in which matching patterns being searched each corresponds to one or more attacks;

    adding, to an array of matching end states, a matching end state corresponding to the matching pattern found in the packet, when the matching pattern is found in the network traffic by the fast pattern matcher;

    the checking and adding being performed until the fast pattern matcher has completed a full pass over data in the packet or the array is full of matching end states;

    creating a list of rule trees that correspond to the matching end states in the array of matching end states, when the fast pattern matcher has completed the full pass over data in the packet or when the array is full;

    evaluating the packet in the network traffic with the matching pattern against each rule tree in the list of rule trees that correspond to the matching end states, wherein each of the rule trees corresponds to a different one of the matching patterns, wherein one of the matching patterns in the network traffic corresponds to plural rules, wherein references to rule options are represented in the rule trees and the rule options are stored separately from the rule trees, the rule tree representing each unique rule by each unique path from a root of the tree to each of the leaf nodes, and the rule tree representing a rule option as a non-leaf node of the rule tree, the evaluating of the network traffic including;

    processing, against the network traffic, the rule options in the rule tree beginning at the root of the rule tree;

    wherein processing of all of the rules represented by the subtrees of nodes with rule options that do not match are eliminated,wherein the network traffic is evaluated against rules terminating in leaf nodes only for combinations of rule options which match the network traffic.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×