An intrusion signature describing an attack is stored on a computer. Once
a plurality of internet protocol packets is received, the plurality of
internet protocol packets collectively containing an information sequence
within a series of states, it is rearranged so as to place the
information sequence in order. Each state of the series of states is then
successively examined so as to correlate the information sequence to the
intrusion signature.