A method of describing intrusion signatures, which are used by an intrusion
detection system to detect attacks on a local network. The signatures are
described using a "high level" syntax having features in common with
regular expression and logical expression methodology. These high level
signatures may then be compiled, or otherwise analyzed, to provide a
process executable by a sensor or other processor-based signature
detector.