摘要 |
<p>In an intrusion detection/prevention system, network traffic is received and checked for a matching pattern. Upon identifying the matching pattern, the network traffic with the matching pattern is evaluated against rules that are represented by a rule tree (101). References to rule options (131) are represented in the rule tree (101) and are stored separately from the rule tree. The rule tree represents unique rules by unique paths from a root of the tree (103) to the leaf nodes (111, 115, 121, 127), and represents rule options (133) as non-leaf nodes (103) of the rule tree. Evaluating the network traffic includes processing, against the network traffic, the rule options in the rule tree beginning at the root (103). Processing of the rules represented by subtrees of nodes with rule options that do not match is eliminated. The network traffic is evaluated against rules terminating in leaf nodes (111, 115, 121, 127) only for combinations of rule options that match the network traffic.</p> |