Mathematical Model on Attack of Worm and Virus in Computer Network
نویسنده
چکیده
To curb the impact and transmission of worms and virus for simple mass action incidence rate in computer networks, SI1I2RS (Susceptible, Infectious due to worm, Infectious due to virus, Recovered and Susceptible) model have been formed. Basic reproduction number, endemic equilibrium state and their stability are discussed for the simple mass action incidence. For locally and globally asymptotically stability of the infection free equilibrium state, Liapunov function is used. Numerical methods have been used to solve and simulate the system which will help us to understand the attacking behavior and transmission dynamics of malicious object in computer network, and efficiency of antivirus software.
منابع مشابه
Development of a Model for Predicting Heart Attack Based on Fog Computing
Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...
متن کاملDevelopment of a Model for Predicting Heart Attack Based on Fog Computing
Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...
متن کاملNeuron Mathematical Model Representation of Neural Tensor Network for RDF Knowledge Base Completion
In this paper, a state-of-the-art neuron mathematical model of neural tensor network (NTN) is proposed to RDF knowledge base completion problem. One of the difficulties with the parameter of the network is that representation of its neuron mathematical model is not possible. For this reason, a new representation of this network is suggested that solves this difficulty. In the representation, th...
متن کاملEfficient Method for Detecting Worm Virus based Bloom- like Connection Behavior
The effort required for detecting worm viruses, that threaten the reliability and stability of network resources, is in the process of advancing, demanding increasingly sophisticated resources. Pattern-based worm virus detection systems use detection methods, which focus on pattern analysis for specific worm viruses. In the event of a different attack method, or a new attack occurs, current sys...
متن کاملAn Approach against a Computer Worm Attack
Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm attack on network assets and functionality. Traditional epidemic worm modeling does not take into consideration the real network topology or network actual defense measures. In this paper, we reviewed the network defense systems from different perspectives for defini...
متن کامل