×

Matching with a large vulnerability signature ruleset for high performance network defense

  • US 8,522,348 B2
  • Filed: 07/29/2010
  • Issued: 08/27/2013
  • Est. Priority Date: 07/29/2009
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method for network intrusion detection, said method comprising:

  • capturing a data message;

    invoking a protocol parser to extract content of a protocol field from the data message;

    constructing a signature table, where each row of the signature table represents a vulnerability signature, each column of the signature table represents a protocol field to be matched, and each cell of the signature table represents how the corresponding field is matched on the corresponding vulnerability signature;

    for each column in the signature table, examining the contents of the protocol field against corresponding entries for all vulnerability signatures in the signature table and labelling each vulnerability signature that matches the contents of the protocol field as a candidate signature;

    iteratively combining candidate signatures from different columns to produce a final matching outcome; and

    detecting an unwanted network intrusion based on the final matching outcome.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×