Claims
- 1. A method of presenting data related to an intrusion event on a computer system, comprising:
capturing data related to the intrusion event; decoding the captured data from a predetermined format to a predetermined format decipherable by humans, the decoded data in turn comprises intrusion event data, data summary, and detailed data; and presenting the decoded data to a user in an organized manner.
- 2. The method, as set forth in claim 1, wherein capturing data comprises capturing network data packets of the intrusion event.
- 3. The method, as set forth in claim 1, wherein decoding the captured data comprises decoding the captured data from a binary format to a human-readable text format.
- 4. The method, as set forth in claim 1, wherein decoding the captured data comprises decoding the captured data to decoded data having a data link layer protocol header, a network layer protocol header, a network layer protocol data summary, and packet data in hexadecimal format.
- 5. The method, as set forth in claim 1, wherein decoding the captured data comprises decoding the captured data to decoded data having an Ethernet header, an IP header, an IP data summary, and packet data in hexadecimal format.
- 6. The method, as set forth in claim 1, wherein presenting the decoded data comprises displaying the decoded data on a computer screen.
- 7. The method, as set forth in claim 1, wherein presenting the decoded data comprises graphically displaying the decoded data according to a predetermined report organization and format.
- 8. The method, as set forth in claim 1, wherein presenting the decoded data comprises generating a report having the decoded data.
- 9. A method of presenting data of an intrusion detection system, comprising:
capturing, from a network, data related to an intrusion event in response to a trigger; decoding the captured data from a first predetermined format to a second predetermined format, the decoded data comprising network header data, data summary, and detailed data; and presenting the decoded data according to a predetermined report format.
- 10. The method, as set forth in claim 9, wherein capturing data comprises capturing network data packets of the intrusion event in response to detecting the presence of a predetermined signature in the network data packet.
- 11. The method, as set forth in claim 9, wherein decoding the captured data comprises decoding the captured data from a binary format to a human-readable text format.
- 12. The method, as set forth in claim 9, wherein decoding the captured data comprises decoding the captured data to decoded data having a data link layer protocol header, a network layer protocol header, a network layer protocol data summary, and packet data in hexadecimal format.
- 13. The method, as set forth in claim 9, wherein decoding the captured data comprises decoding the captured data to decoded data having an Ethernet header, an IP header, an IP data summary, and packet data in hexadecimal format.
- 14. The method, as set forth in claim 9, wherein presenting the decoded data comprises graphically displaying the decoded data according to a predetermined report format and organization.
- 15. The method, as set forth in claim 1, wherein presenting the decoded data comprises generating a report having the decoded data.
- 16. A system of presenting data of an intrusion detection system, comprising:
a network driver capturing data related to an intrusion event from a network; a decode engine decoding the captured data from a predetermined format to a predetermined format decipherable by humans, the decoded data comprising intrusion event data, data summary, and detailed data; and a user interface presenting the decoded data to a user.
- 17. The system, as set forth in claim 16, wherein the network driver captures network data packets of the intrusion event in response to the intrusion detection system detecting a predetermined intrusion signature.
- 18. The system, as set forth in claim 16, wherein the decode engine decodes the captured data from a binary format to a human-readable text format.
- 19. The system, as set forth in claim 16, wherein the decode engine decodes the captured data to decoded data having a data link layer protocol header, a network layer protocol header, a network layer protocol data summary, and packet data in hexadecimal format.
- 20. The system, as set forth in claim 16, wherein the decode engine decodes the captured data to decoded data having an Ethernet header, an IP header, an IP data summary, and packet data in hexadecimal format.
- 21. The system, as set forth in claim 16, wherein the user interface displays the decoded data on a computer screen.
- 22. The system, as set forth in claim 16, wherein the user interface graphically displaying the decoded data according to a predetermined report organization and format.
- 23. The system, as set forth in claim 16, wherein the user interface generates a report having the decoded data.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This patent application is related to co-pending U.S. Patent Application, Attorney Docket No. 10014010-1, entitled “METHOD AND COMPUTER READABLE MEDIUM FOR SUPPRESSING EXECUTION OF SIGNATURE FILE DIRECTIVES DURING A NETWORK EXPLOIT”; U.S. Patent Application, Attorney Docket No. 10016933-1, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY CONDITION OF A COMPUTER SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017028-1, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY VULNERABILITIES OF A COMPUTER SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017029-1, entitled “SYSTEM AND METHOD OF DEFINING UNAUTHORIZED INTRUSIONS ON A COMPUTER SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017055-1, entitled “NETWORK INTRUSION DETECTION SYSTEM AND METHOD”; U.S. Patent Application, Attorney Docket No. 10016861-1, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR INSERTING AN INTRUSION PREVENTION SYSTEM INTO A NETWORK STACK”; U.S. Patent Application, Attorney Docket No. 10016862-1, entitled “METHOD, COMPUTER-READABLE MEDIUM, AND NODE FOR DETECTING EXPLOITS BASED ON AN INBOUND SIGNATURE OF THE EXPLOIT AND AN OUTBOUND SIGNATURE IN RESPONSE THERETO”; U.S. Patent Application, Attorney Docket No. 10016591-1, entitled “NETWORK, METHOD AND COMPUTER READABLE MEDIUM FOR DISTRIBUTED SECURITY UPDATES TO SELECT NODES ON A NETWORK”; U.S. Patent Application, Attomey Docket No. 10014006-1, entitled “METHOD, COMPUTER READABLE MEDIUM, AND NODE FOR A THREE-LAYERED INTRUSION PREVENTION SYSTEM FOR DETECTING NETWORK EXPLOITS”; U.S. Patent Application, Attorney Docket No. 10016864-1, entitled “SYSTEM AND METHOD OF AN OSINTEGRATED INTRUSION DETECTION AND ANTI-VIRUS SYSTEM”; U.S. Patent Application, Attorney Docket No. 10002019-1, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR IDENTIFYING DATA IN A NETWORK EXPLOIT”; U.S. Patent Application, Attorney Docket No. 10017334-1, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR OPTIMIZING PERFORMANCE OF SIGNATURE RULE MATCHING IN A NETWORK”; U.S. Patent Application, Attorney Docket No. 10017333-1, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR PERFORMING MULTIPLE SIGNATURE MATCHING IN AN INTRUSION PREVENTION SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017270-1, entitled “NODE AND MOBILE DEVICE FOR A MOBILE TELECOMMUNICATIONS NETWORK PROVIDING INTRUSION DETECTION”; U.S. Patent Application, Attorney Docket No. 10017331-1, entitled “METHOD AND COMPUTER-READABLE MEDIUM FOR INTEGRATING A DECODE ENGINE WITH AN INTRUSION DETECTION SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017328-1, entitled “SYSTEM AND METHOD OF GRAPHICALLY DISPLAYING DATA FOR AN INTRUSION PROTECTION SYSTEM”; and U.S. Patent Application, Attorney Docket No. 10017303-1, entitled “SYSTEM AND METHOD OF GRAPHICALLY CORRELATING DATA FOR AN INTRUSION PROTECTION SYSTEM”.