A system and method are disclosed for detecting intrusions in a host
system on a network. The intrusion detection system comprises an analysis
engine configured to use continuations and apply forward- and
backward-chaining using rules. Also provided are sensors, which
communicate with the analysis engine using a meta-protocol in which the
data packet comprises a 4-tuple. A configuration discovery mechanism
locates host system files and communicates the locations to the analysis
engine. A file processing mechanism matches contents of a deleted file to
a directory or filename, and a directory processing mechanism extracts
deallocated directory entries from a directory, creating a partial
ordering of the entries. A signature checking mechanism computes the
signature of a file and compares it to previously computed signatures. A
buffer overflow attack detector compares access times of commands and
their associated files. The intrusion detection system further includes a
mechanism for checking timestamps to identify and analyze forward and
backward time steps in a log file.