Editorial Notes
NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICIA 2016 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
ABSTRACT
The "information warfare" can hit and completely break down critical IT infrastructure of an organization or a country. Cybercrime has many types, but, in this paper we have focused on DDoS attack into a computer network to spread bots throughout the network. DDoS attack can be used to sabotage a service or as a cover for bots delivery. In this paper an epidemic SIS -- SEIRS model is proposed to represent the propagation of bots in computer network through DDoS attack. A mathematical model is also formulated to represent the dynamism of the members of different compartments of the model. The model provides an epidemic framework consisting of two sub frameworks to represent the internal class of nodes and external class of nodes. Numerical methods are employed to solve and simulate the system of equations developed. Results of numerical simulations are obtained using MATLAB.
- B.K. Mishra, S.K. Pandey, Dynamic Model of worms with vertical transmission in computer network, Appl. Math. Comput. 217 (21) (2011) 8438--8446.Google Scholar
- B.K. Mishra, S.K. Pandey, Fuzzy epidemic model for the transmission of worms in computer network, Nonlinear Anal.: Real world Appl. 11 (2010) 4335--4341.Google Scholar
- B.K. Mishra, S.K. Pandey, Effect of antivirus software on infectious nodes in computer network: a mathematical model, Phys. Lett. A 376 (2012) 2389--2393.Google ScholarCross Ref
- B. Samanta, S. K. Pandey; Attacking Behaviour of Computer Worms on Computer Network: A Dynamic Model; IJRASET; Vol. 2 Issue XII, Dec 2014.Google Scholar
- Erol Gelenbe, Varol Kaptan, YuWang, Biological metaphors for agent behaviour, in: Computer and Information Sciences ISCIS 2004, 19th International Symposium, in: Lecturer Notes in Computer Science, vol. 3280, Springer-Verlag, 2004, pp. 667--675.Google ScholarCross Ref
- J.R.C. Piqueira, B.F. Navarro, L.H.A. Monteiro, Epidemiological models applied to virus in computer network, J. Comput. Sci. 1 (1), 2005, 31--34.Google ScholarCross Ref
- Y. Wang, C. X. Wang, Modelling the effect of timing parameters on virus propagation, in: 2003 ACM Workshop on Rapid Malcode, ACM, 2003, pp. 61--66. Google ScholarDigital Library
- S. Forest, S. Hofmeyr, A. Somayaji, T. Longstaff, Self-nonself discrimination in a computer, in: Proceeding of IEEE Symposium on Computer Security and Privacy, 1994, pp. 202--212. Google ScholarDigital Library
- Bimal K. Mishra, Navnit Jha, SEIQRS model for the transmission of malicious objects in computer network, Appl. Math. Model. 34 (2010) 710--715.Google ScholarCross Ref
- S. Yasin, K. Haseeb, R. Qureshi; "Cryptography Based Computer Security: A Review"; IJCSI; VOL. 9, Issue 2, No 1, March 2012.Google Scholar
- W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 115, 1927, 700--721.Google ScholarCross Ref
- W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 138, 1932, 55--83.Google ScholarCross Ref
- W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 141, 1933, 94--122.Google ScholarCross Ref
- N. Godbole, S. Belapure, "Cyber Security-Understanding Cyber Crimes, Computer Forensics and Legal Perspectives", 2015 Ed., Wiley India Pvt. Ltd., pp. 14.Google Scholar
- http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html#8Google Scholar
- http://www.cisco.com/c/en/us/products/collateral/security/traffic-anomaly-detector-xt-5600a/prod_white_paper0900aecd8011e927.htmlGoogle Scholar
- D. N. Shah, "Mark Stamp's Information Security Principles and Practices", 2014 Ed., Wiley India Pvt. Ltd, pp. 341--342.Google Scholar
Recommendations
Dynamic game model of botnet DDoS attack and defense
Botnet has become a popular technique for deploying Internet crimes. The command of botnet has evolved into a major way for attackers to launch Distributed Denial of Service attacks on network servers. Modelized analysis methods need to be studied for ...
Botnet in DDoS Attacks: Trends and Challenges
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due to rapid development of computer networks and associated infrastructure, and millions of software applications, large and small, addressing all varieties of tasks. ...
A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis
NSS '10: Proceedings of the 2010 Fourth International Conference on Network and System SecurityDistributed Denial of Service (DDoS) attack is one of main threats to Internet security. Due to the spatio-temporal properties of the attack, it is possible to detect the attack at its early stage. In this paper, we propose a novel method of DDoS threat ...
Comments