Chapter 15 Unified Threat Management for FortiOS 5.0
:
Intrusion protection
:
IPS concepts
:
Signature-based defense
:
IPS engine
IPS engine
Once the protocol decoders separate the network traffic by protocol, the IPS engine examines the network traffic for the attack signatures.