Mathematical Model for Cyber Attack in Computer Network

Mathematical Model for Cyber Attack in Computer Network

Yerra Shankar Rao, Aswin Kumar Rauta, Hemraj Saini, Tarini Charana Panda
DOI: 10.4018/IJBDCN.2017010105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This investigation focuses to develop an e-SEIRS (susceptible, exposed, infectious, recovered) epidemic computer network model to study the transmission of malicious code in a computer network and derive the approximate threshold condition (basic reproduction number) to examine the equilibrium and stability of the model. The authors have simulated the results for various parameters used in the model and Runge-Kutta Fehlberg fourth-fifth order method is employed to solve system of equations developed. They have studied the stability of crime level to equilibrium and found the critical value of threshold value determining whether or not the infectious free equilibrium is globally asymptotically stable and endemic equilibrium is locally asymptotically stable. The simulation results using MATLAB agree with the real life situations.
Article Preview
Top

Introduction

The advancement of society with the usage of computer software and hardware has created a new sort of crime in all domains known as cyber crime which is a new form of crime in the 21th century across the globe. So, criminal investigation is a major topic for research in the present scenario to many academicians and practitioners. Improvements of correspondence systems have made computers more critical in our day by day life. Diverse kind of specialized gadgets expanded human reliance on computers. Unfortunately, with the advancement of internet and other communication network, some mischievous individuals who differ in their opportunity cost for committing crime by various means of technological through computers involves in malicious activities. Links of computer networks and their communication channels spreads an infection and preventing the networks from doing its proper functionality which causes a huge loss to the society. Thus, the indefinite number of existing malicious codes and their appearance has a vital risk factor for every individuals and large sectors. Computer viruses or malicious objects such as worms and Trojan horses travel through a process in the computer networks which resembles to the way toward spreading plagues through a populace. The diseases that can be transmitted by vectors when managing with public health are comparable to the Virtual viruses that can propagate in a system of interacting computers. Therefore, concerning this similarity an epidemic model like SEIR has been adopted and used to study the action of malicious objects through networks.

Transmission of malevolent codes in computer network is pandemic in nature, and different epidemiological models for disease propagation have been studied by many researchers (Mishra & Saini, 2007; Mishra & Nayak, 2009; Zou et al., 2003) for the activity of malicious objects during a network. The dynamic models for malicious objects transmission were developed on the basis of classical SIR model developed by Karmack and Kendrick (Kermack & McKendrick, 1933; Lahrouz et al., 2012) and provided the assessments for temporal advancements of infected nodes depending on network metrics which considered the topological facets of the network (Mishra & Saini, 2007; Zou et al., 2005; Kermack & McKendrick, 1932; Yan & Liu, 2006). This approach was also applied to e-mail circulation schemes (Piqueira et al., 2005) and alteration by using the theory of epidemiological threshold (Mishra & Saini, 2007; Draief et al., 2008; Gan et al., 2013) of SIR models produced the guides for infection anticipation. Richard et al, (Richard & Mark, 2005) simulated virus propagation using an enhanced SEI (susceptible-exposed-infected) model. Recently, the combination of antivirus countermeasures to revise the prevalence of virus and virus propagation models such as: virus immunization (Mishra & Nayak, 2009; Hale, 1980; Kephart et al., 1993; Kermack & McKendrick,1927; Chen & Jamil, 2006; Yang et al., 2013; Hua & Guoqing, 2008; Zhu et al., 2012; Zhu et al., 2013) has become the growing research area for providing attentive solutions.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2025): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2024)
Volume 18: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 17: 2 Issues (2021)
Volume 16: 2 Issues (2020)
Volume 15: 2 Issues (2019)
Volume 14: 2 Issues (2018)
Volume 13: 2 Issues (2017)
Volume 12: 2 Issues (2016)
Volume 11: 2 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing