Advertisement

Effect of Vaccination in the Computer Network for Distributed Attacks – A Dynamic Model

  • Yerra Shankar Rao
  • Hemraj SainiEmail author
  • Geetanjali RatheeEmail author
  • Tarini Charan Panda
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1046)

Abstract

In this reviewed endeavour, a mathematical model is formulated to assess the spread of a distributed attack over a computer network for critical targeted resources. In this paper a mathematical model is formulated, the two sources susceptible, vaccinated, infected, recovered nanonodes in the target population (e-\( S_{t} V_{t} I_{t} R_{t} \)) and susceptible, infected, susceptible nanonodes in the attacking population (e-SIS) epidemic model generated in order to propagate malicious object in the network. Further the analysis of the model has been concentrated upon the basic reproduction number. Where threshold value has effectively examined the stability of the network system. This work is verified for both asymptotical stable, that is the basic reproduction number less than on when the infection free equilibrium express the stability and basic reproduction number is more than one when endemic equilibrium is stable. A very general recognized control mechanism is regarded as vaccination strategy, which is deployed in order to defend the malicious object in the computer network. Finally we examine the effect of vaccination on performance of the controlling strategy of malicious objects in the network. The simulated result produced has become compatible with the overall theoretical analysis.

Keywords

Reproduction number Stability Vaccination Malicious objects DDoS attack 

References

  1. 1.
    Gan, C., Xiaofan, Y., Qingyi, Z., Li, H.: The spread of computer virus under external computers. Nonlinear Dyn. 73(3), 1615–1620 (2013)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Gelenbe, E., Gellman, M., Loukas, G.: Defending networks against denial-of-service attacks. In: Unmanned/Unattended Sensors and Sensor Networks, vol. 5611, pp. 233–244. International Society for Optics and Photonics (2004)Google Scholar
  3. 3.
    Li, M.Y., Graef, J.R., Wang, L., Karsai, J.: Global dynamics of an SEIR model with a varying total population size. Math. Biosci. 160, 191–213 (1999)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Kermac, W.O., McKendrick, A.G.: Contribution of mathematical theory to epidemic. Proc. R. Soc. Lond. Ser. Contain. Pap. Math. Phys. Character 14(843), 94–122 (1933)CrossRefGoogle Scholar
  5. 5.
    Haldar, K., Mishra, B.K.: A mathematical model for the distributed attack on the target resources in the computer network. Commun. Nonlinear Sci. Simul. 19, 3149–3160 (2014)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Mishra, B.K., Haldar, K.: e-epidemic models on attack and defence of malicious objects in networks, theories and simulations of complex social system. In: Dabbaghian, V., Mago, V. (eds.) Theories and Simulations of Complex Social Systems. Intelligent System Reference Library, vol. 52, pp. 117–143. Springer, Heidelberg (2014).  https://doi.org/10.1007/978-3-642-39149-1_9CrossRefGoogle Scholar
  7. 7.
    Song, X., Chen, L.: Optimal harvesting and stability for two species competitive system with stage structure. Math. Biosci. 170, 173–186 (2001)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Toutonji, O., Yoo, S.M.: Passive benign worm propagation modelling with dynamic quarantine defence. KSII Trans. Internet Inf. Syst. 3(1), 96–107 (2009)CrossRefGoogle Scholar
  9. 9.
    Mishra, B.K.: Jha, N: SEIORS model for the transmission of malicious objects in computer network. Appl. Math. Model. 34, 710–715 (2010)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Wang, L., Li, M.Y.: A criteria for stability of matrices. Math. Anal. Appl. 225, 249–264 (1998)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Dagon, D., Zou, C., Lee, W.: Modelling bonnet propagation using time zones. In: Proceedings of 13th Network and Distributed System Security Symposium NDSS, vol. 6, pp. 2–13 (2006)Google Scholar
  12. 12.
    Bailey, N.: The mathematical theory of epidemic. Wiley, New York (1957)Google Scholar
  13. 13.
    LaSalle, J.: The Stability of Dynamical Systems. Regional to Conference Series in Applied Mathematics. SIAM, Philadelphia (1976)CrossRefGoogle Scholar
  14. 14.
    Mishra, B.K., Pandey, S.K.: Dynamic model of worms with vertical transmission in computer network. Appl. Math. Comput. 217, 8438–8446 (2011)MathSciNetzbMATHGoogle Scholar
  15. 15.
    Rao, Y.S., Rauta, A.K., Saini, H., Panda, T.C.: Mathematical model for the cyber attack in the computer network. Int. J. Bus. Data Commun. Netw. 13(1), 58–65 (2017).  https://doi.org/10.4018/ijbdcn.2017010105CrossRefGoogle Scholar
  16. 16.
    Nayak, P.K., Rao, Y.S., Panda, T.C.: Calculation of basic reproduction number by graph reduction method and stability analysis in SEIQRS E epidemic model in computer network. J. Eng. Appl. Sci. 12(23), 7332–7338 (2017)Google Scholar
  17. 17.
    Rauta, A.K., Rao, Y.S., Panda, T.C., Saini, H.: A probabilistic approach using poisson process for detecting the existence of unknown computer virus in real time. Int. J. Eng. Sci. 4, 47–51 (2015)Google Scholar
  18. 18.
    Rao, Y.S., Rauta, A.K., Saini, H., Panda, T.C.: Influence of educational qualification on different types of cyber crime: a statistical interpretation. Indian J. Sci. Technol. 9(32), 1–7 (2016)Google Scholar
  19. 19.
    Saini, H., Rao, Y.S., Panda, T.C.: Cyber-crimes and their impacts: a review. Int. J. Eng. Res. Appl. 2, 202–209 (2012)Google Scholar
  20. 20.
    Liu, X., Takeuchi, Y.: SVIR epidemic model with vaccination strategies. J. Theor. Biol. 253, 1–11 (2008)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Driessche, P.V.D., Watmough, J.: Reproduction numbers and sub threshold endemic equilibria for compartmental models of diseases transmission. Math. Biosci. 180, 29–48 (2002)MathSciNetCrossRefGoogle Scholar
  22. 22.
  23. 23.
    Kribs-Zaleta, C., Velasco-Hernandez, J.: A simple vaccination model with multiple endemic states. Math. Biosci. 164, 183–201 (2000)CrossRefGoogle Scholar
  24. 24.
    Gan, C., Yang, X., Liu, W., Zhu, Q., Zhang, X.: An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate. Appl. Math. Comput. 222, 265–274 (2013)MathSciNetzbMATHGoogle Scholar
  25. 25.
    Anwar, S.: Wireless nanosensor networks: a basic review. Int. J. Emerg. Technol. Adv. Eng. 5(12), 151–154 (2015)Google Scholar
  26. 26.
    Mishra, B.K., Tyagi, I.: Defending against malicious threats in wireless sensor network: a mathematical model. Int. J. Inf. Technol. Comput. Sci. 6, 12–19 (2014)Google Scholar
  27. 27.
    Peng, M., Mou, H.: A novel computer virus model and its stability. J. Netw. 9, 367–374 (2014)Google Scholar
  28. 28.
    Yang, L.X., Yang, X., Tang, Y.Y.: A bi-virus competing spreading model with generic infection rates. IEEE Trans. Netw. Sci. Eng. 5, 2–13 (2018)CrossRefGoogle Scholar
  29. 29.
    Zheng, R., Lu, W., Xu, S.: Preventive and reactive cyber defense dynamics is globally stable. IEEE Trans. Netw. Sci. Eng. 5, 156–170 (2018)MathSciNetCrossRefGoogle Scholar
  30. 30.
    Yang, L.X., Li, P., Yang, X., Wu, Y., Tang, Y.Y.: On the competition of two conflicting messages. Nonlinear Dyn. 91, 1853–1869 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of MathematicsGandhi Institute of Excellent TechnocratsBhubaneswarIndia
  2. 2.Department of Computer Science and EngineeringJaypee University of Information TechnologyWakanghatIndia
  3. 3.Department of MathematicsRevenshaw UniversityCuttackIndia

Personalised recommendations