Claims
- 1. A method of displaying data related to an intrusion event on a computer system, comprising:
capturing data related to the intrusion event; decoding the captured data from a first predetermined format to a second predetermined format decipherable by humans, the decoded data in turn comprising intrusion signature, data summary, and detailed data; correlating data components of the intrusion signature, data summary and detailed data to one another; and graphically displaying the correlated decoded data components.
- 2. The method, as set forth in claim 1, wherein graphically displaying the correlated decoded data components comprises graphically highlighting correlated data components of intrusion signature, data summary and detailed data.
- 3. The method, as set forth in claim 1, wherein graphically displaying the correlated decoded data comprises:
receiving a user input selecting a displayed data component; graphically highlighting data components correlated to the selected data component.
- 4. The method, as set forth in claim 1, wherein graphically displaying the correlated decoded data comprises:
receiving a user input selecting a displayed data component; graphically highlighting the user selected data component; and graphically highlighting data components correlated to the selected data component.
- 5. The method, as set forth in claim 1, wherein capturing data comprises capturing network data packets of the intrusion event.
- 6. The method, as set forth in claim 1, wherein decoding the captured data comprises decoding the captured data from a binary format to a human-readable text format.
- 7. The method, as set forth in claim 1, wherein decoding the captured data comprises decoding the captured data to decoded data having a data link layer protocol header, a network layer protocol header, a network layer protocol data summary, and packet data in hexadecimal format.
- 8. The method, as set forth in claim 1, wherein decoding the captured data comprises decoding the captured data to decoded data having an Ethernet header, an IP header, an IP data summary, and packet data in hexadecimal format.
- 9. The method, as set forth in claim 1, further comprising storing the captured data.
- 10. A method of graphically displaying data related to an intrusion event on a computer system, comprising:
capturing data related to the intrusion event (the data comprising data components of intrusion signature, data summary, and detailed data); correlating data components of the intrusion signature, data summary and detailed data to one another; and graphically displaying the correlated data components.
- 11. The method, as set forth in claim 10, wherein graphically displaying the correlated data components comprises:
receiving a user input selecting a displayed data component; and graphically highlighting all data components correlated to the selected data component.
- 12. The method, as set forth in claim 10, wherein graphically displaying the correlated data components comprises:
receiving a user input selecting a displayed data component; graphically highlighting the user selected data component; and graphically highlighting all data components correlated to the selected data component.
- 13. The method, as set forth in claim 10, wherein capturing data comprises capturing network data packets of the intrusion event in response to detecting the presence of a predetermined signature in the network data packet.
- 14. The method, as set forth in claim 10, further comprising decoding the captured data from a binary format to a human-readable text format.
- 15. The method, as set forth in claim 10, further comprising decoding the captured data to decoded data having a data link layer protocol header, a network layer protocol header, a network layer protocol data summary, and packet data in hexadecimal format.
- 16. The method, as set forth in claim 10, further comprising decoding the captured data to decoded data having an Ethernet header, an IP header, an IP data summary, and packet data in hexadecimal format.
- 17. A system of presenting data of an intrusion detection system, comprising:
a network driver capturing data related to an intrusion event upon detecting a predetermined intrusion signature; a decode engine decoding the captured data from a first predetermined format to a second predetermined format decipherable by humans, the decoded data comprising data components of intrusion event data, data summary, and detailed data; and a user interface correlating data components of the intrusion signature, intrusion event data, data summary and detailed data to one another and displaying the correlated decoded data components.
- 18. The system, as set forth in claim 17, wherein the user interface graphically highlights correlated data components of intrusion event data, data summary and detailed data.
- 19. The system, as set forth in claim 17, wherein the user interface is operable to receive a user input selecting a displayed data component, and graphically highlight all data components correlated to the selected data component.
- 20. The system, as set forth in claim 17, wherein the user interface is operable to receive a user input selecting a displayed data component, highlight the user selected data component, and highlight all data components correlated to the selected data component.
- 21. The system, as set forth in claim 17, wherein the network driver captures network data packets of the intrusion event in response to the intrusion detection system detecting a predetermined intrusion signature.
- 22. The system, as set forth in claim 17, wherein the decode engine decodes the captured data from a binary format to a human-readable text format.
- 23. The system, as set forth in claim 17, wherein the decode engine decodes the captured data to decoded data having a data link layer protocol header, a network layer protocol header, a network layer protocol data summary, and packet data in hexadecimal format.
- 24. The system, as set forth in claim 17, wherein the decode engine decodes the captured data to decoded data having an Ethernet header, an IP header, an IP data summary, and packet data in hexadecimal format.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This patent application is related to co-pending U.S. patent application, Attorney Docket No. 10014010-1, entitled “METHOD AND COMPUTER READABLE MEDIUM FOR SUPPRESSING EXECUTION OF SIGNATURE FILE DIRECTIVES DURING A NETWORK EXPLOIT”; U.S. patent application, Attorney Docket No. 10016933-1, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY CONDITION OF A COMPUTER SYSTEM”; U.S. patent application, Attorney Docket No. 10017028-1, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY VULNERABILITIES OF A COMPUTER SYSTEM”; U.S. patent application, Attorney Docket No. 10017029-1, entitled “SYSTEM AND METHOD OF DEFINING UNAUTHORIZED INTRUSIONS ON A COMPUTER SYSTEM”; U.S. patent application, Attorney Docket No. 10017055-1, entitled “NETWORK INTRUSION DETECTION SYSTEM AND METHOD”; U.S. patent application, Attorney Docket No. 10016861-1, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR INSERTING AN INTRUSION PREVENTION SYSTEM INTO A NETWORK STACK”; U.S. patent application, Attorney Docket No. 10016862-1, entitled “METHOD, COMPUTER-READABLE MEDIUM, AND NODE FOR DETECTING EXPLOITS BASED ON AN INBOUND SIGNATURE OF THE EXPLOIT AND AN OUTBOUND SIGNATURE IN RESPONSE THERETO”; U.S. patent application, Attorney Docket No. 10016591-1, entitled “NETWORK, METHOD AND COMPUTER READABLE MEDIUM FOR DISTRIBUTED SECURITY UPDATES TO SELECT NODES ON A NETWORK”; U.S. patent application, Attorney Docket No. 10014006-1, entitled “METHOD, COMPUTER READABLE MEDIUM, AND NODE FOR A THREE-LAYERED INTRUSION PREVENTION SYSTEM FOR DETECTING NETWORK EXPLOITS”; U.S. patent application, Attorney Docket No. 10016864-1, entitled “SYSTEM AND METHOD OF AN OS-INTEGRATED INTRUSION DETECTION AND ANTI-VIRUS SYSTEM”; U.S. patent application, Attorney Docket No. 10002019-1, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR IDENTIFYING DATA IN A NETWORK EXPLOIT”; U.S. patent application, Attorney Docket No. 10017334-1, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR OPTIMIZING PERFORMANCE OF SIGNATURE RULE MATCHING IN A NETWORK”; U.S. patent application, Attorney Docket No. 10017333-1, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR PERFORMING MULTIPLE SIGNATURE MATCHING IN AN INTRUSION PREVENTION SYSTEM”; U.S. patent application, Attorney Docket No. 10017330-1, entitled “USER INTERFACE FOR PRESENTING DATA FOR AN INTRUSION PROTECTION SYSTEM”; U.S. patent application, Attorney Docket No. 10017270-1, entitled “NODE AND MOBILE DEVICE FOR A MOBILE TELECOMMUNICATIONS NETWORK PROVIDING INTRUSION DETECTION”; U.S. patent application, Attorney Docket No. 10017331-1, entitled “METHOD AND COMPUTER-READABLE MEDIUM FOR INTEGRATING A DECODE ENGINE WITH AN INTRUSION DETECTION SYSTEM”; and U.S. patent application, Attorney Docket No. 10017328-1, entitled “SYSTEM AND METHOD OF GRAPHICALLY DISPLAYING DATA FOR AN INTRUSION PROTECTION SYSTEM”.