Mathematical Model on Attack of Worm and Virus in Computer Network

被引:3
|
作者
Mishra, Binay Kumar [1 ]
机构
[1] Veer Kunwar Singh Univ, Dept Phys, Ara, India
关键词
Epidemic model; Malicious Objects; Computer Network; Threshold; Global Stability;
D O I
10.14257/ijfgcn.2016.9.6.23
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To curb the impact and transmission of worms and virus for simple mass action incidence rate in computer networks, SI1I2RS (Susceptible, Infectious due to worm, Infectious due to virus, Recovered and Susceptible) model have been formed. Basic reproduction number, endemic equilibrium state and their stability are discussed for the simple mass action incidence. For locally and globally asymptotically stability of the infection free equilibrium state, Liapunov function is used. Numerical methods have been used to solve and simulate the system which will help us to understand the attacking behavior and transmission dynamics of malicious object in computer network, and efficiency of antivirus software.
引用
收藏
页码:245 / 254
页数:10
相关论文
共 50 条
  • [21] Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack
    Kumar, Muthukrishnan Senthil
    Veeramani, C.
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, 2014, 246 : 293 - 303
  • [22] The Implementation of Anti-attack AES Mathematical Model in Library Network Encryption
    Shen, Yufen
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1790 - 1792
  • [23] Stochastic SIRS Model of Computer Virus Propagation in the Network
    Yang, Hua
    Yang, Huai-Qing
    Huang, Feng-Hua
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 388 - 392
  • [24] OPTIMAL CONTROL OF A COMPUTER VIRUS MODEL WITH NETWORK ATTACKS
    Pei, Hongyue
    Pei, Yongzhen
    Liang, Xiyin
    Zhu, Meixia
    [J]. COMMUNICATIONS IN MATHEMATICAL BIOLOGY AND NEUROSCIENCE, 2016,
  • [25] A Computer Network Attack Taxonomy and Ontology
    van Heerden, R. P.
    Irwin, B.
    Burke, I. D.
    Leenen, L.
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2012, 2 (03) : 12 - 25
  • [26] A mathematical model for the effect of malicious object on computer network immune system
    Saini, Dinesh Kumar
    [J]. APPLIED MATHEMATICAL MODELLING, 2011, 35 (08) : 3777 - 3787
  • [27] A Discrete Dynamic Model for Computer Worm Propagation
    Liu, Wanping
    Liu, Chao
    Liu, Xiaoyang
    [J]. DIFFERENCE EQUATIONS, DISCRETE DYNAMICAL SYSTEMS AND APPLICATIONS, 2015, 150 : 119 - 131
  • [28] Attack of the Sasser worm
    不详
    [J]. NEW SCIENTIST, 2004, 182 (2446) : 7 - 7
  • [29] A Mathematical View of Network-based Suppressions of Worm Epidemics
    Jamil, Nasir
    Chen, Thomas M.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 932 - +
  • [30] Worm propagation model in mobile network
    Chen, Zhide
    Wang, Meng
    Xu, Li
    Wu, Wei
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1134 - 1144