In related work , we have used a similar approach to monitor the spread of internet worms such as codered and nimda 最近,他們還使用了類似的方法來監(jiān)控互聯(lián)網(wǎng)的病毒,比如紅色代碼和尼姆達
With nimda worm that uses a fake library to run inside other processes , the worm will be deactivated in memory to stop its spreading Nimda病毒偽裝成庫在其他處理器上運作,病毒將會在內存被終止阻止它的擴散
The theory of protocol analysis is listed . by explaining the course of nimda virus evades computer and server , it shows the reason why protocol analysis can detect nimda virus . afterwards it lists the advantage that pattern match can " t have 重點介紹了協(xié)議分析的工作原理,并以nimda病毒為例分析了該檢測方法能夠檢測出這種攻擊的原因,并概括出其具有模式匹配無法比擬的優(yōu)勢。
百科解釋
Nimda is a computer worm, also a file infector. It quickly spread, surpassing the economic damage caused by previous outbreaks such as Code Red.