This research introduces the analysis of the request and reply message for infected and victim machine. The problem of the research is cannot focus on specific scanning worm protocol to detect the scanning worm. The Internet worm attacks different destina
展开▼