Presently available network security components like Firewalls, Anti-Virus programs and Intrusion Detection Systems (IDS) cannot cope with the wide range of malicious attacks and zero day exploits on computer networks and systems. Multi-exploit worms like Nimda, Trojan horses, and polymorphic...