A method of describing intrusion signatures, which are used by an intrusion detection system to detect attacks on a local network. The signatures are described using a "high level" syntax having features in common with regular expression and logical expression methodology. These high level signatures may then be compiled, or otherwise analyzed, to provide a process executable by a sensor or other processor-based signature detector.

 
Web www.patentalert.com

< System and method for populating forms with previously used data values

< Secure method of updating bios by using a simply authenticated external module to further validate new firmware code

> Method of file system recovery logging

> Virtual machines in OS/390 for execution of any guest system

~ 00052