Cyber Crime based Curve Fitting Analysis in Internet Traffic Sharing in Computer Network
نویسندگان
چکیده
Many well-developed countries are having broadband services for there network connection but under developed countries are still having the dial-up-setup connection network. The cyber crime users are growing fast in the entire world and correspondingly the cyber criminals are also growing. The crime is performed by the users cyber only when the connectivity through internet is made. This paper extends the approach of interrelationship between traffic sharing and blocking probability of network between operators subject to conditions the user attracts for cyber crimes. The Markov chain model based approach provides a complicated relationship. This paper adopts a simplified form of same relationship assuming linearity among variables. Least square method is used to generate linear relationship in presence of cyber crime using coefficient of determination and 99 percents confidence interval it has been proved that the approximation is best.
منابع مشابه
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملArea Computation of Internet Traffic Share Problem with Special Reference to Cyber Crime Environment
Abstract— Cybercrime is a fast growing area of research, it covers any illegal activity that uses a computer as its primary means of commission. More and more criminals are exploiting the speed, convenience and anonymity of the internet to commit a diverse range of criminal activities. In the same line Naldi (2002) proposed internet traffic share problem in a new look by using markov chain. Thi...
متن کاملLeast Square based Curve Fitting in Internet Access Traffic Sharing in Two Operator Environment
In Internet service market, at many places the competition occurs among internet service providers. The network suffers from congestion and users have priority to prefer that network having lowest congestion. During the repeated connecting attempt process the user has to maintain call-by-call effort. In this paper Markov chain model is used to establish a relationship between internet access tr...
متن کاملA Collaborative Event Processing System for Protection of Critical Infrastructures from Cyber Attacks
We describe an Internet-based collaborative environment that protects geographically dispersed organizations of a critical infrastructure (e.g., financial institutions, telco providers) from coordinated cyber attacks. A specific instance of a collaborative environment for detecting malicious inter-domain port scans is introduced. This instance uses the open source Complex Event Processing (CEP)...
متن کاملIntelligent Traffic Management System for Prioritizing Emergency Vehicles in a Smart City (TECHNICAL NOTE)
Traffic congestion worldwide has led to loss of human lives due to failure in transporting accident victims, critical patients, medical equipment and medicines on time. With the unending growth in vehicular traffic everywhere, Internet of Things (IOT) and Vehicular Ad Hoc Network (VANET) have embarked as a promising platform for an Intelligent Traffic Management System (ITMS). Many researches h...
متن کامل