Chapter 15 Security Profiles
:
Intrusion protection
:
IPS concepts
:
Signature-based defense
:
IPS engine
IPS engine
Once the protocol decoders separate the network traffic by protocol, the IPS engine examines the network traffic for the attack signatures.