intrusion signature


Recorded evidence of a system intrusion, typically as part of an intrusion detection system (IDS). When a malicious attack is launched against a system, the attack typically leaves evidence of the intrusion in the system��s logs. Each intrusion leaves a kind of footprint behind (e.g., unauthorized software executions, failed logins, misuse of administrative privileges, file and directory access) that administrators can document and use to prevent the same attacks in the future. By keeping tables of intrusion signatures and instructing devices in the IDS to look for the intrusion signatures, a system��s security is strengthened against malicious attacks.

Because each signature is different, it is possible for system administrators to determine by looking at the intrusion signature what the intrusion was, how and when it was perpetrated, and even how skilled the intruder is.

Read Also:

  • invalid page fault

    A page fault that produces an error. Page fault errors can occur for any of the following reasons: The virtual memory system becomes unstable due to a shortage of physical memory (RAM). The virtual memory system becomes unstable due to a shortage of free disk space. The virtual memory area is corrupted by a misbehaving […]

  • inverted network

    An inverted network design employs the philosophy that that security should be focused at the core of the network rather than on the perimeter (where firewalls, anti-virus and iintrusion detection systems would typically sit). Recognizing the increasingly threats to the enterprise network come from with, even internal LANs — and every component connected to it […]

  • invisible Web

    (n.) Also referred to as the deep Web, the term refers to either Web pages that cannot be indexed by a typical search engine or Web pages that a search engine purposely does not index, rendering the data “invisible” to the general user. One of the most common reasons that a Web site��s content is […]

  • invocation

    The execution of a program or function.

  • invisible text

    See under keyword stuffing.


Disclaimer: intrusion signature definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.