| Along with the Internet-based computer network and the growing scale of Internet users in computer systems into the growing network of information resources on network resources and people's dependence on computer networks makes the safe operation of a very important change. The existing security problems in the Internet, malicious software occupies the economic losses caused by the largest proportion of malicious software, including computer viruses, worms, Trojan horses, backdoors procedures, logic bombs, and so on. In addition, in reality there are already signs that: malicious software has been as a means of information warfare attacks, the issue of network security has risen to the height of national security. The network worm is the largest against malicious software, almost always to the Internet worm attack will cause enormous economic losses.With the popularity of network worms and portable requirements, the reduction of worm outbreaks are more frequent. Especially in the past few years, more and more Internet worm appeared on its spread, is also growing at a geometric, and the harm caused by worse than previous worms. To guarantee the healthy development of the Internet, actively studying the counter-measures against the worm has become a top priority.From the development of the network worm, network worms are in the development of defense technology, its focus on the following issue areas: network worm scanning strategy and the rapid dissemination mechanisms; The network worm propagation model and simulation testing; Network worm model; Network worm warning blocking technology and research; network worm and the activation mechanism of concealment mechanism; network worm tracking and evidence. The network worm detection and defense is a long-term process, mainly because: network worm variety of ever-changing; Not accurately foresee the new network worm. Therefore, we not only need to grasp the realization of the current network worm mechanism, but also strengthen networks for the future development trend of worms really do take precautionary measures.Instant messaging itself flexible and diverse work patterns, huge user base, the massive amount of information on the working mechanism of IM worms, dissemination and destruction of the ability to have a direct impact, making IM worms as a new type of unique network worm. IM worm could allow an attacker to hijack victims of the client, to the victims of IM contacts send the information annex contains infected, or suspected of fraud hyperlinks. Because these people familiar with the information from, recipients often erroneously believe that click open the attachment or related hyperlink is safe. IM in the commercial area of rapid growth, and the use of IM security technology shortcomings, making it still attracts the attacker's interest. IM worm uses instant communications network to spread, we must first collection of mainframe user contact information, then use instant communication to the loopholes in the agreement or contacts attack, and produced a copy of the worm spread to IM attacks contacts.A representative for the QQ instant messaging software, in the Internet age quickly and easily won the hearts of countless users, and then a more popular at an alarming rate, resulting in the present, the use of network software QQ enrollment has more than one hundred million, but the wind tree from the virus this year in view of attack , has nearly 100 QQ types of the virus. From this we can see that the use of such QQ instant messaging tool to spread the virus, has gradually become a new virus trends.This paper first discusses the worm Survey; IM worm then analyze the basic definition, functional structure and working mechanism and IM worms and other network worms with distinction; Summarized prevent IM worm is the latest technology; Finally, based on the thinking of P2P worms on QQ a number of hot issues and prospects. |