作者: Srikant Vissamsetti , Keith E. Amidon , Steve M. Haeffele , Ananth Raman , Parveen K. Jain
DOI:
关键词:
摘要: A method of detecting intrusions on a computer includes storing an intrusion signature describing attack computer. Once plurality internet protocol packets is received, the collectively containing information sequence within series states, it rearranged so as to place in order. Each state states then successively examined correlate signature.