Modelling Activity of a Malicious User in Computer Networks
نویسندگان
چکیده
Abstract In the present study, an extended classification of Internet users penetrating in computer networks and a definition motivation as psychological emotional state main prerequisites for modelling network intruder’s activity are suggested. A mathematical model quadratic function malicious individual’s behavior impact on based three quantified factors, motivation, satisfaction system protection is developed. Numerical simulation experiments unauthorized access its effect onto carried out. The obtained results graphically illustrated discussed.
منابع مشابه
Re-wiring Activity of Malicious Networks
This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily involved in nefarious activities on the Internet, were sequentially de-peered by providers before their final cut-off (as occurred in the well-publicized cases of Atrivo/Intercage). We present the first systematic study o...
متن کاملinvestigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances
در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...
comparison of catalytic activity of heteropoly compounds in the synthesis of bis(indolyl)alkanes.
heteropoly acids (hpa) and their salts have advantages as catalysts which make them both economically and environmentally attractive, strong br?nsted acidity, exhibiting fast reversible multi-electron redox transformations under rather mild conditions, very high solubility in polar solvents, fairly high thermal stability in the solid states, and efficient oxidizing ability, so that they are imp...
15 صفحه اولAn Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth study. In this paper we present a first step towards an assessment based on monitoring network activity (anonymized for user privacy) of 20,000 residential DSL customers in a European urban area, roughly 1,000 users of...
متن کاملA user modelling approach to computer based advice generation
The need for intelligent advice, help and tutoring, generated automatically by computers is widely accepted. Recently, efforts to achieve these requirements have focused upon research into user models and improved user-machine interaction. This thesis develops a mechanism for detecting when an individual has a problem with the computer system, and generates hypotheses which describe possible pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybernetics and Information Technologies
سال: 2022
ISSN: ['1311-9702', '1314-4081']
DOI: https://doi.org/10.2478/cait-2022-0018