Method of operating an intrusion detection system according to a set of business rules
First Claim
Patent Images
1. A method of operating an intrusion detection system for detecting an intrusion of a protected network attachment according to at least one business rule, said method comprising the steps of:
- awaiting an occurrence of a next update time of the intrusion detection system, said next update time being a time at which at least one validity condition of the at least one business rule is checked;
responsive to the occurrence of the next update time, checking the at least one validity condition of the at least one business rule to determine whether a provision of any business rule of the at least one business rule is a newly operative provision that has first become operative or gone into effect since an occurrence of a last previous update time at which the at least one validity condition of the at least one business rule was checked, said newly operative provision prescribing an alteration of an intrusion set that the provision applies to;
if the checked provision is the newly operative provision that applies to the intrusion set, then altering the intrusion set according to the newly operative provision.
2 Assignments
0 Petitions
Accused Products
Abstract
An intrusion detection system checks a list of business rules at predetermined update times, and determines whether any provision of the business rules has become newly operative since the last update time. Provisions of the business rules prescribe alterations to intrusion signatures, thresholds, actions, or weights that are appropriate to broader circumstances evident at the update time. Whenever a new provision is found to be operative, the effected signatures, thresholds, actions, or weights are altered accordingly.
22 Citations
22 Claims
-
1. A method of operating an intrusion detection system for detecting an intrusion of a protected network attachment according to at least one business rule, said method comprising the steps of:
-
awaiting an occurrence of a next update time of the intrusion detection system, said next update time being a time at which at least one validity condition of the at least one business rule is checked; responsive to the occurrence of the next update time, checking the at least one validity condition of the at least one business rule to determine whether a provision of any business rule of the at least one business rule is a newly operative provision that has first become operative or gone into effect since an occurrence of a last previous update time at which the at least one validity condition of the at least one business rule was checked, said newly operative provision prescribing an alteration of an intrusion set that the provision applies to; if the checked provision is the newly operative provision that applies to the intrusion set, then altering the intrusion set according to the newly operative provision. - View Dependent Claims (2, 3, 4, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
5. A method of operating an intrusion detection system according to a set of business rules, comprising the steps of:
-
awaiting an update time of the intrusion detection system; responsive to occurrence of an update time, checking validity conditions of the set of business rules to determine whether a provision of any of the set of business rules is a newly operative provision; for each newly operative provision, checking an intrusion set to determine whether the newly operative provision applies to the intrusion set; and if the new provision applies to the intrusion set, altering the intrusion set according to the newly operative provision. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
Specification