In related work , we have used a similar approach to monitor the spread of internet worms such as codered and nimda 最近,他們還使用了類似的方法來監(jiān)控互聯(lián)網(wǎng)的病毒,比如紅色代碼和尼姆達(dá)
With nimda worm that uses a fake library to run inside other processes , the worm will be deactivated in memory to stop its spreading Nimda病毒偽裝成庫在其他處理器上運(yùn)作,病毒將會在內(nèi)存被終止阻止它的擴(kuò)散
The theory of protocol analysis is listed . by explaining the course of nimda virus evades computer and server , it shows the reason why protocol analysis can detect nimda virus . afterwards it lists the advantage that pattern match can " t have 重點(diǎn)介紹了協(xié)議分析的工作原理,并以nimda病毒為例分析了該檢測方法能夠檢測出這種攻擊的原因,并概括出其具有模式匹配無法比擬的優(yōu)勢。