作者: Richard Paul Tarquini
DOI:
关键词: Operating system 、 Computer science 、 Signature (logic) 、 Reading (computer) 、 Central processing unit 、 Operand 、 Set (abstract data type) 、 Media access control 、 Computer network 、 Network packet 、 Node (networking)
摘要: A method of identifying data comprised in a network exploit comprising receiving packet by an intrusion prevention system maintained node network, the bound to media access control driver and protocol driver, invoking signature analysis algorithm system, comparing with first rule set logically defining is provided. maintaining instance central processing unit, memory module for storing machine-readable format retrieval execution operating stack associative process engine input/output layer, layer operable receive file generated from operand, operator mask, pass engine, analyze assign logical value dependent upon result computer-readable medium having stored thereon instructions be executed, instructions, when executed processor, cause processor perform computer reading packet, selecting plurality files sets files, each respective at least one rules, selected