An intrusion detection system detects and takes appropriate action against
intrusion attacks on packets transmitted on a network. Various conditions
for the intrusion attacks are described in the form of a rule tree. The
intrusion detection system employs a pipelined structure including a
plurality of modules, and parts of the rule are assigned to the modules.
The modules determine in a pipelined manner whether the conditions of an
intrusion attack are satisfied. In an intrusion attack on the packet is
detected, the intrusion detection system takes appropriate action against
the determined intrusion attack.