An intrusion detection system employs a pointer fingerprint method for
detecting attempted or successful intrusions into an information system
or network. In a pointer fingerprint method, the specific stream of bits
searched from the traffic streams is a pointer or part of it that must be
included in all working buffer overflow (bof) attacks. This makes it
possible to detect also the previously unknown bof attacks.