BRIEF DESCRIPTION OF DRAWINGS
Embodiments of the present invention are illustrated by way of example and not of limitation in the figures of the accompanying drawings, in which like reference numbers indicate similar elements and in which:
FIG. 1 shows a network environment within which an example embodiment may be implemented;
FIG. 2 is a block diagram of an intrusion detection system (IDS), in accordance with an example embodiment;
FIG. 3 is a flow diagram illustrating a method, in accordance with an example embodiment, to monitor data packets on a network;
FIG. 4 is a flow diagram illustrating a method, in accordance with an example embodiment, to detect an indication of an attack signature; and
FIG. 5 is a diagrammatic representation of an example machine in the form of a computer system within which a set of instructions, for causing the machine to perform any one or more of the methodologies discussed herein, may be executed.