Having classified the attack information of the attacked objections, one can create the signature of the intrusion data in the same class with LCS (longest commonsubstring) algorithm.
并根据目标对攻击信息进行分类,用LCS算法在同类攻击数据中生成网络病毒的特征。
2
Well, one very common task is determining whether or not a given substring can be found anywhere within that value.