Claims
- 1. A method of analyzing frames at a node of a network by an intrusion prevention system executed by the node, comprising:
reading the frame by the intrusion prevention system; comparing the frame with a machine-readable signature file; determining the frame has a frame signature that corresponds with the machine-readable signature file; and determining the machine-readable signature file has an associated squelch comprising a squelch threshold and a squelch period.
- 2. The method according to claim 1, further comprising disabling execution of a directive of the machine-readable signature file if a frame counter exceeds the squelch threshold.
- 3. The method according to claim 1, further comprising incrementing a frame counter upon determination that the frame signature corresponds with the machine-readable signature.
- 4. The method according to claim 1, further comprising determining whether the squelch period has elapsed.
- 5. The method according to claim 4, further comprising initiating a new squelch period upon determining the squelch period has elapsed.
- 6. The method according to claim 3, further comprising determining if the squelch threshold has been exceed by the frame counter.
- 7. The method according to claim 1, further comprising executing a directive of the machine-readable signature file upon determination that the squelch threshold has not been exceeded.
- 8. The method according to claim 1, further comprising suppressing execution of a directive of the signature file upon determination that the squelch threshold has been exceeded.
- 9. The method according to claim 8, wherein suppressing execution of a directive of the signature file further comprises suppressing execution of report generation associated with the determination that the frame signature corresponds with the machine-readable signature file.
- 10. A computer-readable medium having stored thereon a set of instructions to be executed, the set of instructions, when executed by a processor, cause the processor to perform a computer method of:
reading a frame; comparing the frame with a machine-readable signature file; determining the frame has a frame signature that corresponds with the machine-readable signature file; and determining the machine-readable signature file has an associated squelch comprising a squelch threshold and a squelch period.
- 11. The computer readable medium according to claim 10, further comprising a set of instruction that, when executed by the processor, cause the processor to perform a computer method of periodically incrementing a squelch period timer assigned to the machine-readable signature file.
- 12. The computer readable medium according to claim 11, further comprising a set of instructions that, when executed by the processor, cause the processor to perform a computer method of determining if the squelch period timer equals or exceed the squelch period.
- 13. The computer readable medium according to claim 12, further comprising a set of instructions that, when executed by the processor, cause the processor to perform a computer method of:
re-initiating the squelch period timer upon determination that the squelch period timer equals or exceeds the squelch period; and incrementing a frame counter upon determining the frame signature corresponds with the machine-readable signature file.
- 14. The computer readable medium according to claim 12, further comprising a set of instructions that, when executed by the processor, cause the processor to perform a computer method of determining if a frame counter exceeds the squelch threshold.
- 15. The computer readable medium according to claim 14, further comprising a set of instructions that, when executed by the processor, cause the processor to perform a computer method of suppressing execution of a directive of the signature file upon determination that the squelch threshold has been exceeded by the frame counter.
- 16. The computer readable medium according to claim 14, further comprising a set of instructions that, when executed by the processor, cause the processor to perform a computer method of executing a directive of the signature file upon determination that the squelch threshold has not been exceeded by the frame counter.
- 17. The computer readable medium according to claim 15, wherein suppressing execution of a directive further comprises suppressing execution of a report generation associated with the determination that the frame signature corresponds with the machine-readable signature file.
- 18. The computer readable medium according to claim 13, further comprising a set of instructions that, when executed by the processor, cause the processor to perform a computer method of determining if the squelch is enabled.
- 19. The computer readable medium according to claim 13, further comprising a set of instructions that, when executed by the processor, cause the processor to perform a computer method of executing a directive of the signature file upon determining the squelch is disabled.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This patent application is related to co-pending U.S. patent application Ser. No. ______, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY CONDITION OF A COMPUTER SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY VULNERABILITIES OF A COMPUTER SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “SYSTEM AND METHOD OF DEFINING UNAUTHORIZED INTRUSIONS ON A COMPUTER SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______,entitled “NETWORK INTRUSION DETECTION SYSTEM AND METHOD,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. _______, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR INSERTING AN INTRUSION PREVENTION SYSTEM INTO A NETWORK STACK,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “METHOD, COMPUTER-READABLE MEDIUM, AND NODE FOR DETECTING EXPLOITS BASED ON AN INBOUND SIGNATURE OF THE EXPLOIT AND AN OUTBOUND SIGNATURE IN RESPONSE THERETO,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “NETWORK, METHOD AND COMPUTER READABLE MEDIUM FOR DISTRIBUTED SECURITY UPDATES TO SELECT NODES ON A NETWORK,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “METHOD, COMPUTER READABLE MEDIUM, AND NODE FOR A THREE-LAYERED INTRUSION PREVENTION SYSTEM FOR DETECTING NETWORK EXPLOITS,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. _______, entitled “SYSTEM AND METHOD OF AN OS-INTEGRATED INTRUSION DETECTION AND ANTI-VIRUS SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR IDENTIFYING DATA IN A NETWORK EXPLOIT,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR OPTIMIZING PERFORMANCE OF SIGNATURE RULE MATCHING IN A NETWORK,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR PERFORMING MULTIPLE SIGNATURE MATCHING IN AN INTRUSION PREVENTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “USER INTERFACE FOR PRESENTING DATA FOR AN INTRUSION PROTECTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “NODE AND MOBILE DEVICE FOR A MOBILE TELECOMMUNICATIONS NETWORK PROVIDING INTRUSION DETECTION,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “METHOD AND COMPUTERREADABLE MEDIUM FOR INTEGRATING A DECODE ENGINE WITH AN INTRUSION DETECTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. ______, entitled “SYSTEM AND METHOD OF GRAPHICALLY DISPLAYING DATA FOR AN INTRUSION PROTECTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; and U.S. patent application Ser. No. ______, entitled “SYSTEM AND METHOD OF GRAPHICALLY CORRELATING DATA FOR AN INTRUSION PROTECTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith.