Chapter 15 Unified Threat Management for FortiOS 5.0 : Intrusion protection : IPS concepts : Signature-based defense : IPS engine
  
IPS engine
Once the protocol decoders separate the network traffic by protocol, the IPS engine examines the network traffic for the attack signatures.