Worm virus

美 [wɜːrm ˈvaɪrəs]英 [wɜːm ˈvaɪrəs]
  • 网络蠕虫病毒
Worm virusWorm virus
  1. In Network Security Worm Virus Technology and Guard Measure Research

    网络安全中蠕虫病毒技术与防范措施研究

  2. The Research of Entrap Worm Virus Based on The Intrusion Detection System

    基于入侵检测模型的蠕虫病毒诱捕系统的研究

  3. Early Warning Technology of Network Worm Virus in Campus Network Environment

    校园网络环境下网络蠕虫病毒的预警技术

  4. Study in the Mechanism of the E-mail Worm Virus

    邮件蠕虫病毒机理研究

  5. The analysis of worm virus for computer

    对蠕虫计算机病毒的分析

  6. Research of Worm Virus 's Propagation Mechanism

    蠕虫病毒的传播机制研究

  7. A Methodology of Detecting the Symbian OS Worm Virus Based on Abnormal Behavior

    基于行为异常的SymbianOS蠕虫病毒检测方法研究

  8. Nonautonomous propagation mathematical model for worm virus

    网络蠕虫传播的非自治数学模型研究

  9. Moreover , introduces present technologies and methods on defending worm virus and junk mail based on HONEY Technology .

    并从HONEY技术主动防御蠕虫病毒和主动防御垃圾邮件两个方面对当前的技术和方法进行了详细地介绍。

  10. Danger And Countermeasure of Worm Virus

    蠕虫病毒的危害与防治对策

  11. Trough setting router , it can control the rumor , blasting wave and worm virus which attack ports 135,139,445,1434 , etc.

    通过路由器设置,可以对攻击135、139、445、1434等端口的流言、冲击波、蠕虫病毒进行控制;

  12. Then we described the technical principles related to the system , such as CISCO NetFlow technology , technology of detecting DDoS and worm virus based on NetFlow .

    接着介绍了与系统设计实现相关的原理和技术,包括CiscoNetFlow技术,以及应用NetFlow技术检测分析DDoS和蠕虫病毒等网络异常流量的方法;

  13. This article intending to give an introduction to the commonness of worm virus and make a technical discusstion about worm virus prevention and cure .

    本文就蠕虫系列计算机病毒及作共性介绍,并就病毒的清除作技术性探讨。

  14. The pure script virus mainly is the macro-virus . This paper divided the mix type virus into the mail-virus and worm virus , and then analyzed thoroughly the essential characteristics and spreading means of these three kinds of different viruses .

    纯脚本型病毒主要是宏病毒,本文又把混合型病毒分为:邮件病毒、蠕虫病毒,然后透彻地分析了这三种不同病毒的本质特征和传播手段。

  15. This paper analysed the principle of worm virus and buffer overrun , and presented an experimental scheme of worm virus exploiting buffer overrun that aims at the difficulties of experimental teaching of computer virus to students of information security specialty at present .

    摘要分析了蠕虫病毒和缓冲区溢出的基本原理,针对目前在信息安全专业中开展计算机病毒实践教学的难点,给出了一个缓冲区溢出蠕虫病毒的实验设计方案。

  16. The subject aims at studying the function of internet worm virus and prevention 's methods , and making a systemic design and program which control the spread of internet worm virus by DNS service machine at the base of analysis of the typical internet worm virus samples .

    本课题在典型蠕虫病毒样本剖析的基础上,深入研究了网络蠕虫病毒的作用机理及防治策略,并给出了利用DNS服务器抑制网络蠕虫病毒传播的系统设计与实现方案。

  17. The CD rings which composed by the98 ~ 111bit amino acid residues in the area of domain II of E protein rich in glycine and has great hydrophobic , and the sequence composition in almost all the worm virus is highly conservative .

    其中E蛋白Ⅱ区中第98-111位氨基酸残基组成的cd环,富含甘氨酸且具有很强的疏水性,序列组成在几乎所有的虫媒黄病毒中高度保守。

  18. And the security and stability is fragile . On the one hand , the demand ( high bandwidth and low delay ) of the users is increasing . On the other hand , the security threatens ( DDoS , worm virus and malware ) are much more .

    一方面,校园网用户对网络性能要求(如高带宽,低延迟等)不断增加;另一方面,校园网中的安全威胁(如DDoS、蠕虫、恶意代码等)也越来越多。

  19. Location and Technical ANALYSIS of Varietal Worm and Virus Signatures Based on Trap Server

    基于TRAPSERVER变形病毒特征码的分析与定位技术

  20. The flowage of the network worm and virus causes great damage for the network users .

    网络蠕虫和病毒肆虐,给网络用户造成了巨大的损失。

  21. Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus .

    此类型攻击中使用的系统可能以多种方式被破坏并受到蠕虫或病毒感染。

  22. For example , a company that implements a VPN system using IPSEC isn 't immune from a worm or virus if its virus scanner only inspects email at the firewall border .

    例如,一个实现了使用IPSEC的VPN系统的公司,如果其病毒扫描程序只审查防火墙边界的电子邮件,就不能对蠕虫或病毒免疫。

  23. A Trojan virus , like a Trojan horse , is a program that appears safe & but smuggles in a worm or virus . Attackers often use tracking cookies in conjunction with Web bugs .

    特洛伊病毒,就跟特洛伊木马一样,看上去安全&其实暗藏杀机。攻击者使用它来传输病毒,蠕虫和特洛伊木马到用户的工作站。

  24. According to the simulation , the spreading speed of the cooperation of the worm and virus becomes faster after they combine with each other , and then it infects the whole network at once . Thus the harm of it is obvious .

    通过仿真可以看出,蠕虫与病毒结合后的共生传播速度明显加快,并很快感染整个网络,共生的危害性可见一斑。

  25. Epidemic behavior between worm and biological virus is similar , so it would be possible to apply the mathematical models of biological viruses spread to computer worm propagation model research .

    蠕虫的传播和生物病毒的传播在行为上有着相似的特点,因此可以将研究生物病毒传播模式的数学工具应用到计算机蠕虫的传播模型的研究上。

  26. As time past , virus changing , the main principle changed from spreading of worm and destroy of virus to a combined new composite with all functions of virus , worm and trojan , called malware .

    随着时间的推移,病毒的类型也在转变,从之前的以破坏为目的的病毒和蠕虫为主,转变成结合有病毒、蠕虫和木马功能的新型木马。

  27. During its spread process , the worm is infected by the virus ; both of them are interdependent and spread together . Thus forms the phenomena of the worm and virus cooperating with each other , which is known as cooperation .

    蠕虫在传播过程中被病毒感染,两者相互依存共同传播,这就形成了蠕虫和病毒合作互利的现象,我们称之为共生。