Process seems to be a network worm.
进程行为与网络蠕虫类似。
Code Red "use of Microsoft software in a loophole, is one of the first network worm."
“红色代码”利用了微软软件中的一个漏洞,是最早的网络蠕虫之一。
In order to describe Internet worm propagation, a novel subsection model of network worm propagation was put forward.
为了更好地表达网络蠕虫传播情况,提出了一种新的蠕虫传播分段模型。
Because of the huge damage of network worm epidemics, how to detect and response network worms has become an important task in computer network security field.
由于网络蠕虫泛滥产生的巨大危害,如何对网络蠕虫进行检测、预警和应对,已经成为计算机网络安全研究领域的一个重要课题。
The result of experiments shows that our adaptive worm detection algorithm can effectively detect the spread of network worms, and has a low false alarm rate and omission rate.
实验结果表明,本文所设计的自适应蠕虫检测算法能够有效的检测网络蠕虫的传播,且具有较低的误报率和漏报率。
In order to verify the validity of the algorithm, this paper designed an experimental methods to apply the algorithm through the existing network worm propagation data to verify its effectiveness.
为了验证上述算法的有效性,本文设计了一套实验方法,通过对现有网络蠕虫传播数据归档文件应用该算法进行检测来验证其有效性。
In the network the sorts of computer virus are various and we can not catch the speed of its renewing.After comparing many kinds of virus, in order to be close to reality, I choose the "Worm."
当今网络上计算机病毒不但种类繁多而且更新的速度之快更是令人目不暇接。
Worm - this type of virus is able to spread itself automatically over the network from one computer to the next.
蠕虫——这类病毒可以在网络上自动从一台计算机传播到另一台。
HPOWP provides a good solution for worm prevention in the large-scale and complex network environment.
该模型为大规模复杂网络环境中的蠕虫防御提供了很好的解决方案。
The diverse propagation way and complex application conditions bring worm eruption in frequency, latency and overcast, therefore the worm does very serious crisis to the network.
在网络环境下,多样化的传播途径和复杂的应用环境使网络蠕虫发生频率增高、潜伏性变强、覆盖面更广,给网络造成了极大的危害。
Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.
在网络通信模型的基础上,进一步结合蠕虫传播的特征,本文提出了蠕虫的攻击树模型。
Network Shield - Provider SettingsNetwork Shield provider protects your computer from Internet worm attacks.
网络防护保护您的计算机免遭网络蠕虫的侵袭。
Secondly, the worm simulating environment is implemented, and the effects of worm traffic on network are analyzed.
其次,建立了蠕虫模拟环境,并研究了蠕虫流量对网络的影响。
In current worm simulation, network simulators drop the scanning packets sent to invalid IP addresses, which will underestimate the traffic brought by worm.
蠕虫模拟时产生的无效ip地址扫描包会在源节点所属的路由器被直接丢弃,这与实际网络中数据包的传输情况差距较大。
This method of classification overcomes the shortcomings of the classical one based on worm modeling, which doesn't distinguish the way of network modeling.
这种分类方式克服了按蠕虫模型分类无法区分网络建模方式的缺点。
While the network security defense mechanisms continue to improve, worm also continues to improve its own propagation mechanisms and new worms continue to emerge.
伴随着网络安全防御机制的不断完善,蠕虫也在不停改善自身的传播机制,新的蠕虫不断涌现。
In the network the sorts of computer virus are various and we can not catch the speed of its renewing. After comparing many kinds of virus, in order to be close to reality, I choose the "Worm."
当今网络上计算机病毒不但种类繁多而且更新的速度之快更是令人目不暇接。
In current worm simulation, network simulators will drop the scanning packets sent to invalid IP addresses, which will underestimate the traffic brought by worm.
蠕虫模拟时产生的无效ip地址扫描包会在源节点所属的路由器被直接丢弃,这与实际网络中数据包的传输情况差距较大。
The graph-based model of network division is created, an algorithm fit for worm spread restraint is brought forward, and the theoretic analyze and simulations prove the efficiency of this approach.
建立了基于图的网络划分的模型,并提出了一种适于抑制蠕虫传播的网络划分的算法。
The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.
实验结果表明,蠕虫型木马可以在网络攻防中发挥积极作用。
A worm is a small piece of software that USES computer network and security holes to replicate itself.
蠕中病毒是一种小软件,它利用计算机网络和安全漏洞来进行自我复制。
The worm significantly slows network connectivity. The most vulnerable systems are those on which trivial or no passwords are in use.
明显降低网络连接速度,另外没有密码和密码简单的电脑很容易受到攻击。
The cooperative design of worm gear over network is realized using ASP components technique, and the 3d worm gear solid image is produced on line.
通过对asp组件技术的运用,实现对蜗杆零件的网络化协同设计,在网上在线生成蜗杆的三维实体。
SDNBC is composing of two parts: Network Admission Control sub-system and Worm Detecting sub-system.
基于客户端的自防御网络系统主要由两个子系统组成:网络准入子系统和蠕虫检测子系统。
SDNBC is composing of two parts: Network Admission Control sub-system and Worm Detecting sub-system.
基于客户端的自防御网络系统主要由两个子系统组成:网络准入子系统和蠕虫检测子系统。
应用推荐