Nonlinear Analysis: Real World Applications

Size: px
Start display at page:

Download "Nonlinear Analysis: Real World Applications"

Transcription

1 Nonlinear Analysis: Real World Applications 11 (21) Contents lists available at ScienceDirect Nonlinear Analysis: Real World Applications journal homepage: Fuzzy epidemic model for the transmission of worms in computer network Bimal Kumar Mishra a,, Samir Kumar Pandey b a Department of Applied Mathematics, Birla Institute of Technology, Mesra, Ranchi, , India b Department of Applied Mathematics, Ramchandra Chandravansi Institute of Technology, Bishrampur, Palamau, , India a r t i c l e i n f o a b s t r a c t Article history: Received 3 February 21 Accepted 1 May 21 Keywords: Epidemic model Worms Fuzzy sets/logic Computer network Fuzzy reproductive number An e-epidemic SIRS (susceptible infectious recovered susceptible) model for the fuzzy transmission of worms in computer network is formulated. We have analyzed the comparison between classical basic reproduction number and fuzzy basic reproduction number, that is, when both coincide and when both differ. The three cases of epidemic control strategies of worms in the computer network low, medium, and, high are analyzed, which may help us to understand the attacking behavior and also may lead to control of worms. Numerical methods are employed to solve and simulate the system of equations developed. 21 Elsevier Ltd. All rights reserved. 1. Introduction The growth of Internet technology has thrown severe challenges in form of requirement of a suitable cyber defense system to safeguard the valuable information stored on system and for information in transit. Towards this goal it makes us necessary to study and understand the different type of worms and develop mathematical models to represent their behavior. Worms behave like infectious diseases and are epidemic in nature. A computer worm is a self contained program that is able to spread functional copies of itself or its segment to other computer system without a dependency on another program to host its code. Model s ability to predict worm s behavior depends greatly on the assumptions made in the modeling process. The mathematical models will be generalized to represent the behavior of numerous other worms. The generalized model will be incorporated into a cyber defense system to proactively safeguard the information and information interchange. The action of worms throughout a network can be studied by using epidemiological models for disease propagation [1 1]. Based on the Kermack and McKendrick SIR classical epidemic model [11 13], dynamical models for malicious objects propagation were proposed, providing estimations for temporal evolutions of nodes depending on network parameters considering topological aspects of the network [1 3,14 17]. The kind of approach was applied to propagation schemes [18] and modification of SIR models generated guides for infection prevention by using the concept of epidemiological threshold [1 3,19]. Richard and Mark [2] propose an improved SEI (susceptible exposed infected) model to simulate virus propagation. However, they do not show the length of latency and take into account the impact of anti-virus software. The model SEIR proposed by the authors [21] assumes that recovery hosts have a permanent immunization period with a certain probability, which is not consistent with real situation. In order to overcome limitation, Mishra and Saini [1] present an SEIRS model with latent and temporary immune periods, which can reveal common worm propagation. Recently, more research attention has been paid to the combination of virus propagation model and antivirus countermeasures to study the prevalence of virus, e.g., virus immunization [3,22 26] and quarantine [27 29]. Extending the SEIRS model of [1], Mishra et al. introduced new compartment quarantine and its effect has been analyzed in [3]. Corresponding author. Tel.: addresses: drbimalmishra@gmail.com (B.K. Mishra), samir.phd29@gmail.com (S.K. Pandey) /$ see front matter 21 Elsevier Ltd. All rights reserved. doi:1.116/j.nonrwa

2 4336 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) α ε γ Fig. 1. Schematic diagram for flow of worms in computer network. Transmissions of malicious objects (virus, worms, Trojans) in computer network are analogous to biological infectious diseases and are epidemic in nature. Epidemic systems, in particular those dealing with infectious diseases, have strong non-linearities and should be treated in a different way. These non-linearities are due to the fact that force of epidemic of an infectious agent, depends, among other things, on the fraction of susceptible nodes and fraction of infectious nodes. Both susceptibility and infectiousness are intrinsically fuzzy concepts and are, therefore, ideal subjects for fuzzy logic analysis. The mathematical models of transmission of worms in computer network are always subject to inaccuracies related to the nature of the state variables involved, parameters and/or initial conditions. In these models, the estimation of parameters is usually based on statistical methods, starting from data obtained experimentally to the choice of the method adapted to their identification. In this paper, we have used the concept of Fuzzy Set/Relations Theory which is an extension of the concept of a crisp set. It also deals with the techniques of computing and manipulating with fuzzy sets. Though Fuzzy epidemic models for human infectious disease have been well studied [31 39] but very few applications and research papers, using fuzzy logic, in the transmission of malicious objects in computer network exists in literature. 2. The simple SIRS model A simple classical SIRS model describe the dynamics of directly transmitted worms with interaction among susceptible, infected and recovered nodes in the computer network without neither vital dynamics (i.e. the rates of birth and mortality (reason other than attack of worms) are not considered), nor additional disease fatality rate. The Schematic diagram for the flow of worms in computer network (Fig. 1) model can be represented as: The system of differential equations of such models is given by: ds = αis + γ S di = αis εr dr = εr γ S where, S + I + R = 1, and S is the proportion of susceptible nodes, I is the proportion of infected nodes, R is the proportion of recovered nodes, α is the contact rate, ε is the recovery rate and γ is the rate of susceptible after recovery. We now suppose an extension of the SIRS model incorporating heterogeneities, considering that nodes with different amount of worms contribute differently to the worm propagation. 3. The SIRS fuzzy model We assume that the population heterogeneity is given by the worm load of infected nodes. That is, the higher the worm load, the higher will be the chance of worm transmission. We take α = α(x) measures the chance of a transmission to occur in a meeting between a susceptible and an infected nodes with an amount of worms x. Then some values of α are more possible than others and that turns α into a membership function of a fuzzy number. To obtain the membership function α, we assume when the amount of worms in a node is relatively low, the chance of transmission is negligible and that there is a minimum amount of worms x min needed to cause transmission. Furthermore, for a certain amount of worms x M, the chance of transmission is maximum and equal to one. We also suppose that the amount of worms in a node in a computer is always limited by. Then we define the following membership function, whose representation is depicted in Fig. 2 [39]. α(x) =, if x < x min x x min, if x min < x < x M x M x min 1, if x M < x <. Now, the node s recovery rate ε = ε(x) is also a function of the worm load. The higher the worm load, the longer it will take to recover from infection. i.e., ε should be a decreasing function of x (Fig. 3). That is, ε(x) = ε 1 x + 1 (4) where, ε > is the lowest recovery rate. (1) (2) (3)

3 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) α (x) x min x M Fig. 2. Fuzzy coefficient of worm transmission α = α(x). ε (x) ε x Fig. 3. Recovery fuzzy rate ε = ε(x). γ (x) γ x Fig. 4. Fuzzy rate of susceptibility γ = γ (x). Now, γ = γ (x) is the rate of susceptible after recovery, that is, the recovered nodes may be susceptible again. The higher we use secondary devices and/or internet services, the higher it will be susceptible after recovery. So, it will be increasing function of x (Fig. 4) and we define this function as, γ (x) = 1 γ x where, γ > (and <1) is the lowest susceptibility rate after recovery. We also assume that the amount of worms differ in different nodes of the computer network, that is, x can be seen as a fuzzy number with a triangular shape, according to the following membership function (Fig. 5): ρ(x) = x x 1, if x [ x δ, x + δ] δ, if x [ x δ, x + δ] where the parameter x is a central value and δ gives the dispersion of each one of the fuzzy sets assumed by x. For a fixed x, ρ(x) can has a linguistic meaning such as, low, medium and so on. (5) (6)

4 4338 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) ρ + Fig. 5. Membership function of the variable x, mount of the worms ρ [39]. 4. Solution and equilibrium points To study the evolution of number of infected nodes, that is, if the number of infected nodes increases indefinitely or not, we study the stability of equilibrium points. For this, from the system (1) and Eq. (2), we have ds = αis + γ S di = αis ε(1 S I). Then, for the equilibrium points, we take, ds = and di =, we get three equilibrium points P 1 (1,, ), P 2 (, 1, ) and ( ) ε(α γ ) P 3 α(γ +ε), γ α, γ (α γ ). The analysis of the stability of the system (1) shows that P α(γ +ε) 1, P 2 are unstable but P 3 (with γ α) is asymptotically stable, which indicates that even if the number of infected nodes increases (supposing initially I small), this number will stabilize in γ (α γ ) ε(α γ ). Moreover, of the population will not be affected. α(γ +ε) α(γ +ε) Now, taking into account the worm load, we have, ( ε(x)(α(x) γ (x)) P 3 = α(x)(γ (x) + ε(x)), γ (x) ) γ (x)(α(x) γ (x)),. α(x) α(x)(γ (x) + ε(x)) As γ (x) α(x) < 1, so, a value of bifurcation for x is x, the solution of the equation γ (x) = α(x) will be, x = x M + (1 γ )(x M x min ). And x min x x M. The worm load x is the value of the bifurcation of the model since for the values x < x the model has two unstable equilibrium points P 1 and P 2 and if x > x the model has an asymptotically stable point P 3. In this way, we can think of x as a parameter related to the worm control in the sense that if a worm is transmitted in some number of nodes, it should be noted that, x is not higher than x. (A) (7) 5. The basic reproduction number As we know that, the basic reproduction number (R ) is obtained through the analysis of the stability of the trivial equilibrium point. For the classical SIRS model R = α ε, that is, the worms will not be in nodes if α ε < 1 and it will be if α ε > 1. As in this case, we have taken, α = α(x) and ε = ε(x), then we write, R (x) = α(x) ε(x). To control the worm transmission, we impose max R (x) < 1. But it is better to take an average value of R (x) because it can be an extreme attitude. For this, we consider the distribution of the worm load as given by a triangular fuzzy number ρ(x). Then, we define the fuzzy basic reproduction number, R f = 1 ε FEV[ε R (x)] (8)

5 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) where FEV is Fuzzy Expected Value. Note that R (x) may be greater than one but ε R (x) 1, so that the value R f is well defined. This is defined as the average number of secondary cases caused by just one infected node introduced into entirely susceptible nodes. To get FEV[ε R (x)] we need to define a fuzzy measure µ and use the possibility measure: µ(a) = sup ρ(x), A R. x A This is a measure tells that the infectivity of a group is the one presented by the node belonging to the group with the maximal infectivity. We now estimate R f assuming that the amount of worms classified as low, medium and high. The fuzzy sets given by the membership function ρ(x) for different cases are: (a) low, if x + δ < x min ; (b) medium, if x δ > x min and x + δ x M ; and (c) high, if x δ > x M. Case (a) It is quite obvious that R f < 1 if x is low. Now, to obtain R f for cases (b) and (c), since R (x) = α(x) ε(x) is an increasing function of x, then H(θ) = µ[x, ] = sup x x ρ(x), where, H(θ) = µ{i(x, t) θ} and FEV[I(x, t)] is the fixed point of H(θ) [38] and x is the solution of the α(x) equation ε ε(x) = θ. Since the fixed point of H(θ) is same as that of FEV[ε R (x)]. Case (b) By the direct calculation, we conclude that, α( x) 1 if θ ε ε( x) H(θ) = ρ(x α( x) ) if ε ε( x) < θ ε α( x + δ). ε( x + δ) α( x + δ) if ε ε( x + δ) < θ 1 Obviously, if δ >, H is a continuous and decreasing function, and in this case, we have that FEV[ε R (x)] is equal to the fixed point of H. Also, we have by direct calculation, α( x) ε x < FEV[ε R (x)] α( x + δ) < ε ε( x + δ) Case (c) As in the previous case, we conclude that, R f > 1 ε( x) > 1. or R ( x) < R f < R ( x + δ). 1 < R f ε( x) < 1 and it guarantees that the worms invade since ε( x+δ) 6. Comparison between R and R f Here we have analyzed the three cases discussed in the previous section related to the three classifications for the amount of infections: low, medium and high worm load. In any of the three cases, we have, α( x) ε( x) < FEV[ε R (x)] α( x + δ) < ε ε( x + δ) or R ( x) < R f < R ( x + δ). As the function R (x) = α(x) is continuous and curved shape based on the Intermediate Value Theorem, there is only one ˆx, ε(x) with x < ˆx < x + δ, so that: R f = R (ˆx) > R ( x). (9) It means that, there is an amount of infection ˆx where R (classical) and the R f (fuzzy) coincide. Moreover, the medium value of the number of secondary cases (R f ) is higher than the number of secondary cases due to the medium amount of infection (R ( x)). 7. Epidemic control strategies The system of Eqs. (1) is the classical mathematical model to study about the worm transmission of SIRS type in a homogeneous system of total number of nodes in computer network. Although we use such a system of equations to model the evolution of worm transmission in a heterogeneous system of nodes, such as the one presented in our model where the nodes are distinguished by the amount of infection and, consequently, they present different rates of contact α(x), of recovery ε(x) and of susceptibility γ (x). We understand (1) as a family of systems depending on the parameter x. However,

6 434 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) POPULATION GROUPS- S, I AND R GRAPHS FOR THE SIR MODEL SUSCEPTIBLE INFECTED REMOVED TIME Fig. 6. Dynamical behavior of the system with α =.4, ε =.2, γ =.24. if we intend to simplify it in the sense of replacing that family of systems by a unique system of equations, with the same outcomes (that is, the same number of secondary cases) that the family as a whole, the above analysis shows that, among the different systems of families, there is one which performs this role, namely, that which parameters are α = α(ˆx), ε = ε(ˆx) and γ = γ (ˆx) and not that which represents the system of nodes with medium amount of infection ˆx. Moreover, according to (9), R ( x) as an indicator of worm control forces us to find out the correct parameter for the total number of nodes as a whole, that is R (ˆx). To justify even more the legitimacy of system (1) with the parameter ˆx, to describe the dynamics of the worms in the total number of nodes as a whole, we will study the control of the worms in the total number of nodes through R (ˆx) = R f : i. For the case where the amount of infection is low, we have ˆx < x + δ x min. Therefore R (ˆx) = and the worm will not establish itself. ii. For the case the amount of infection is high, we have ˆx > x > x + δ x M. Therefore, R (ˆx) = 1 ε( x) the worm will invade. iii. For the case of medium amount of infection we have: a. if x > ˆx then R (ˆx) = α(ˆx) ε(ˆx) < α(x ) ε(x = 1, indicating that the worm will not invade; and ) b. if x < ˆx then R (ˆx) = α(ˆx) ε(ˆx) > α(x ) ε(x = 1 indicating that the worm will invade. ) > 1, indicating that Finally, it is shown that R f is the positive solution of an equation of second degree, with characteristics that allow us to deduce and decrease the medium amount of infection, by the use of continuous run of anti-virus software, for example, and quarantine (decreasing δ) of the infected nodes. 8. Conclusion A compartmental e-epidemic model SIRS for the transmission of worms in computer network is studied. Numerical methods are employed to solve the system (A) and the behavior of the susceptible, infectious, and recovered nodes with respect to time are observed which is depicted in Fig. 6. Stability of the system can be observed from Fig. 6. The parameters, we have used to develop the system of equations, are treated as a membership function depending on x, a fuzzy number, and also the family of system depending on this fuzzy number x. Using this, we get R f (fuzzy basic reproduction number), by the help of R (classical basic reproduction number) and conclude that, by the help of Intermediate Value Theorem, there will be an amount of infected nodes in the computer network, where both R and R f coincides. We also analyzed the three cases of epidemic control strategies as, when the amount of infection will be low, worms will not be in the network, for the high amount of infection, worm will invade and for the medium amount of infection, worm may or may not invade the computer network.

7 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) References [1] Bimal Kumar Mishra, D.K. Saini, SEIRS epidemic model with delay for transmission of malicious objects in computer network, Appl. Math. Comput. 188 (2) (27) [2] Bimal Kumar Mishra, Dinesh Saini, Mathematical models on computer viruses, Appl. Math. Comput. 187 (2) (27) [3] Bimal Kumar Mishra, Navnit Jha, Fixed period of temporary immunity after run of anti-malicious software on computer nodes, Appl. Math. Comput. 19 (2) (27) [4] E. Gelenbe, Dealing with software viruses: a biological paradigm, Inform. Secur. Tech. Rep. 12 (4) (27) [5] Erol Gelenbe, Keeping viruses under control, in: Computer and Information Sciences ISCIS 25, 2th International Symposium, in: Lecturer Notes in Computer Science, vol. 3733, Springer, 25. [6] Erol Gelenbe, Varol Kaptan, Yu Wang, Biological metaphors for agent behavior, in: Computer and Information Sciences ISCIS 24, 19th International Symposium, in: Lecturer Notes in Computer Science, vol. 328, Springer-Verlag, 24, pp [7] J.R.C. Piqueira, F.B. Cesar, Dynamic models for computer virus propagation, Math. Probl. Eng. doi:1.1155/28/ [8] J.R.C. Piqueira, B.F. Navarro, L.H.A. Monteiro, Epidemiological models applied to virus in computer network, J. Comput. Sci. 1 (1) (25) [9] S. Forest, S. Hofmeyr, A. Somayaji, T. Longstaff, Self-nonself discrimination in a computer, in: Proceeding of IEEE Symposium on Computer Security and Privacy, 1994, pp [1] Y. Wang, C.X. Wang, Modeling the effect of timing parameters on virus propagation, in: 23 ACM Workshop on Rapid Malcode, ACM, 23, pp [11] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 115 (1927) [12] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 138 (1932) [13] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 141 (1933) [14] C.C. Zou, W.B. Gong, D. Towsley, L.X. Gao, The monitoring and early detection of internet worms, IEEE/ACM Trans. Netw. 13 (5) (25) [15] J.O. Kephart, S.R. White, D.M. Chess, Computers and epidemiology, IEEE Spectr. (1993) [16] M.J. Keeling, K.T.D. Eames, Network and epidemic models, J. R. Soc. Interface 2 (4) (25) [17] Ma.M. Williamson, J. Leill, An epidemiological model of virus spread and cleanup, [18] M.E.J. Newman, S. Forrest, J. Balthrop, networks and the spread of computer virus, Phys. Rev. E 66 (22) [19] M. Draief, A. Ganesh, L. Massouili, Thresholds for virus spread on network, Ann. Appl. Probab. 18 (2) (28) [2] W.T. Richard, J.C. Mark, Modeling virus propagation in peer-to-peer networks, in: IEEE International Conference on Information, Communication and Signal Processing, ICICS, 25, pp [21] Ping Yan, Shengqiang Liu, SEIR epidemic model with delay, J. Aust. Math. Soc. Ser. B 48 (1) (26) [22] J.O. Kephart, A biologically inspired immune system for computers, in: Proceeding of International Joint Conference on Artificial Intelligence, [23] N. Madar, T. Kalisky, R. Cohen, D. Ben Avraham, S. Havlin, Immunization and epidemic dynamics in complex networks, Eur. Phys. J. B 38 (24) [24] R. Pastor-Satorras, A. Vespignani, Epidemics and immunization in scale-free networks, in: Handbook of Graphs and Network: From the Genome to the Internet, Wiley-VCH, Berlin, 22. [25] R.M. May, A.L. Lloyd, Infection dynamics on scale-free networks, Phys. Rev. E 64 (66112) (21) 1 3. [26] S. Datta, H. Wang, The effectiveness of vaccinations on the spread of -borne computer virus, in: IEEE CCECE/CCGEL, IEEE, 25, pp [27] C.C. Zou, W. Gong, D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, in: Proceeding of the ACM CCS Workshop on Rapid Malcode, ACM, 23, pp [28] D. Moore, C. Shannon, G.M. Voelker, S. Savage, Internet quarantine: requirements for containing self-propagating code, in: Proceeding of IEEE INFOCOM 23, IEEE, 23. [29] T. Chen, N. Jamil, Effectiveness of quarantine in worm epidemic, in: IEEE International Conference on Communications 26, IEEE, 26, pp [3] Bimal K. Mishra, Navnit Jha, SEIQRS model for the transmission of malicious objects in computer network, Appl. Math. Model. 34 (21) [31] G.J. Klir, B. Yuan, Fuzzy Sets and Fuzzy Logic, Prentice Hall, Upper Saddle River, [32] E. Massad, M.N. Burattini, N.R.S. Ortega, Fuzzy logic and measles vaccination: designing a control strategy, Int. J. Epidemiol. 28 (3) (1999) [33] N.R.S. Ortega, P.C. Sallum, E. Massad, Fuzzy dynamical systems in epidemic modelling, Kybernetes 29 (12) (2) [34] K.J. Rothman, S. Greenland, Modern Epidemiology, Lippincott-Raven, Philadelphia, [35] G. Shafer, Belief functions and possibility measures, in: Bezdek J.C. (Ed.), Analysis of Fuzzy Information Mathematics and Logic, vol. 1, USA, 1987, pp [36] R.R. Yager, D.P. Filev, Essentials of Fuzzy Modeling and Control, Wiley-Interscience, New York, [37] J. Yen, R. Langari, Fuzzy Logic: Intelligence, Control, and Information, Prentice-Hall, New Jersey, [38] E. Massad, et al., Fuzzy Logic in Action: Applications and Epidemiology and Beyond, in: STUDFUZZ, vol. 232, Springer-Verlag, Berlin, Heidelberg, 28. [39] L.C. Barros, R.C. Bassanezi, M.B.F. Leite, The epidemiological models SI with a fuzzy transmission, Comput. Math. Appl. 45 (23)

Study of Virus Propagation Model Under the Cloud

Study of Virus Propagation Model Under the Cloud Tongrang Fan, Yanjing Li, Feng Gao School of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang, 543, China Fantr29@26.com, 532465444 @qq.com, f.gao@live.com bstract. The

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

The Effect of Infection Time on Internet Worm Propagation

The Effect of Infection Time on Internet Worm Propagation The Effect of Infection Time on Internet Worm Propagation Erika Rice The Effect of Infection Time oninternet Worm Propagation p 1 Background Worms are self propagating programs that spread over a network,

More information

Stability analysis of a novel VEISV propagation model of computer worm attacks

Stability analysis of a novel VEISV propagation model of computer worm attacks ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 10 (2014) No. 3, pp. 163-174 Stability analysis of a novel VEISV propagation model of computer worm attacks M. Javidi 1, N. Nyamorady

More information

Applications of improved grey prediction model for power demand forecasting

Applications of improved grey prediction model for power demand forecasting Energy Conversion and Management 44 (2003) 2241 2249 www.elsevier.com/locate/enconman Applications of improved grey prediction model for power demand forecasting Che-Chiang Hsu a, *, Chia-Yon Chen b a

More information

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Lin Cai and Roberto Rojas-Cessa Abstract Peer-to-peer (P2P) networking is used by users with

More information

Intelligent Worms: Searching for Preys

Intelligent Worms: Searching for Preys Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School

More information

An Approach against a Computer Worm Attack

An Approach against a Computer Worm Attack 48 An Approach against a Computer Worm Attack Ossama Toutonji and Seong-Moo Yoo University of Alabama in untsville, Department of Electrical and Computer Engineering, untsville, Alabama 35899, USA {toutono;

More information

Research Article Adaptive Human Behavior in a Two-Worm Interaction Model

Research Article Adaptive Human Behavior in a Two-Worm Interaction Model Discrete Dynamics in ature and Society Volume 22, Article ID 828246, 3 pages doi:.55/22/828246 Research Article Adaptive Human Behavior in a Two-Worm Interaction Model Li-Peng Song,, 2 Xie Han,, 2 Dong-Ming

More information

arxiv:cond-mat/0207387v3 [cond-mat.dis-nn] 10 Dec 2003

arxiv:cond-mat/0207387v3 [cond-mat.dis-nn] 10 Dec 2003 Efficient Immunization Strategies for Computer Networs and Populations Reuven Cohen, Shlomo Havlin, and Daniel ben-avraham 2 Minerva Center and Department of Physics, Bar-Ilan University, Ramat-Gan, 529,

More information

Using Real Data in an SIR Model

Using Real Data in an SIR Model Using Real Data in an SIR Model D. Sulsky June 21, 2012 In most epidemics it is difficult to determine how many new infectives there are each day since only those that are removed, for medical aid or other

More information

Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks

Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu

More information

Epidemic Enhancement in Partially Immune Populations

Epidemic Enhancement in Partially Immune Populations in Partially Immune Populations Juliet R. C. Pulliam 1 *, Jonathan G. Dushoff 1,2, Simon A. Levin 1, Andrew P. Dobson 1 1 Department of Ecology and Evolutionary Biology, Princeton University, Princeton,

More information

Einführung in die Mathematische Epidemiologie: Introduction to Mathematical Epidemiology: Deterministic Compartmental Models

Einführung in die Mathematische Epidemiologie: Introduction to Mathematical Epidemiology: Deterministic Compartmental Models Einführung in die Mathematische Epidemiologie: Introduction to Mathematical Epidemiology: Deterministic Compartmental Models Nakul Chitnis Universität Basel Mathematisches Institut Swiss Tropical and Public

More information

Feedback Email Worm Defense System for Enterprise Networks

Feedback Email Worm Defense System for Enterprise Networks Feedback Email Worm Defense System for Enterprise Networks Cliff C. Zou*, Weibo Gong*, Don Towsley *Dept. Electrical & Computer Engineering Dept. Computer Science University of Massachusetts, Amherst Technical

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

Disease Transmission Networks

Disease Transmission Networks Dynamics of Disease Transmission Networks Winfried Just Ohio University Presented at the workshop Teaching Discrete and Algebraic Mathematical Biology to Undergraduates MBI, Columbus, OH, July 31, 2013

More information

Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS)

Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Tiffany Tachibana Computer Science and lnformation Technology California State University, Monteray Bay ttachibana@csumb.edu

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Coordination in Network Security Games

Coordination in Network Security Games Coordination in Network Security Games Marc Lelarge INRIA - ENS Paris, France Email: marc.lelarge@ens.fr Abstract Malicious softwares or malwares for short have become a major security threat. While originating

More information

REQUIREMENTS ON WORM MITIGATION TECHNOLOGIES IN MANETS

REQUIREMENTS ON WORM MITIGATION TECHNOLOGIES IN MANETS REQUIREMENTS ON WORM MITIGATION TECHNOLOGIES IN MANETS Robert G. Cole and Nam Phamdo JHU Applied Physics Laboratory {robert.cole,nam.phamdo}@jhuapl.edu Moheeb A. Rajab and Andreas Terzis Johns Hopkins

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

Model-Based Analysis of Two Fighting Worms

Model-Based Analysis of Two Fighting Worms ICCCE '6, Kuala Lumpur, alaysia, ay 26, Vol-I, Page 157-163. odel-based Analysis of Two Fighting Worms Zakiya. Tamimi 1 1 Faculty of Information Technology Arab American University- Jenin Jenin, Palestine,

More information

Pareto Set, Fairness, and Nash Equilibrium: A Case Study on Load Balancing

Pareto Set, Fairness, and Nash Equilibrium: A Case Study on Load Balancing Pareto Set, Fairness, and Nash Equilibrium: A Case Study on Load Balancing Atsushi Inoie, Hisao Kameda, Corinne Touati Graduate School of Systems and Information Engineering University of Tsukuba, Tsukuba

More information

Determining optimal window size for texture feature extraction methods

Determining optimal window size for texture feature extraction methods IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec

More information

Estimation of effective vaccination rate: pertussis in New Zealand as a case study

Estimation of effective vaccination rate: pertussis in New Zealand as a case study Journal of Theoretical Biology 224 (2003) 269 275 Estimation of effective vaccination rate: pertussis in New Zealand as a case study A. Korobeinikov a, *,1, P.K. Maini a,2, W.J. Walker b a Centre for Mathematical

More information

Biology and Computer Science, Northeastern University, Boston, MA 02115. Massachusetts Institute of Technology, Cambridge, MA 02139.

Biology and Computer Science, Northeastern University, Boston, MA 02115. Massachusetts Institute of Technology, Cambridge, MA 02139. NEW GENERATION OF MOBILE PHONE VIRUSES AND CORRESPONDING COUNTERMEASURES Pu Wang 1,2,3, Marta C. González 1,3, Ronaldo Menezes 4 & Albert-LászlóBarabási 1,5 1 Center for Complex Network Research, Department

More information

A New Nature-inspired Algorithm for Load Balancing

A New Nature-inspired Algorithm for Load Balancing A New Nature-inspired Algorithm for Load Balancing Xiang Feng East China University of Science and Technology Shanghai, China 200237 Email: xfeng{@ecusteducn, @cshkuhk} Francis CM Lau The University of

More information

How to Explain (and Overcome) 2% Barrier in Teaching Computer Science: Fuzzy Ideas Can Help

How to Explain (and Overcome) 2% Barrier in Teaching Computer Science: Fuzzy Ideas Can Help How to Explain (and Overcome) 2% Barrier in Teaching Computer Science: Fuzzy Ideas Can Help Olga Kosheleva 1 and Vladik Kreinovich 2 1 Department of Teacher Education 2 Department of Computer Science University

More information

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM Walid Mohamed Alsharafi and Mohd Nizam Omar Inter Networks Research Laboratory, School of Computing, College

More information

Network protection against worms and cascading failures using modularity partitioning

Network protection against worms and cascading failures using modularity partitioning Network protection against worms and cascading failures using modularity partitioning Jasmina Omić Network Architectures and Services Delft University of Technology Delft, Netherlands Email: J.Omic@tudelft.nl

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

Least Effort Strategies for Cybersecurity

Least Effort Strategies for Cybersecurity GORMAN, KULKARNI, SCHINTLER, AND STOUGH: LEAST EFFORT STRATEGIES FOR CYBERSECURITY 1 Least Effort Strategies for Cybersecurity Sean P. Gorman*, Rajendra G. Kulkarni, Laurie A. Schintler, Ph.D., and Roger

More information

Bifurcation analysis in a delayed computer virus model with the effect of external computers

Bifurcation analysis in a delayed computer virus model with the effect of external computers Zhang and Bi Advances in Difference Equations (215) 215:317 DOI 1.1186/s13662-15-652-y R E S E A R C H Open Access Bifurcation analysis in a delayed computer virus model with the effect of external computers

More information

BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS

BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,

More information

How To Find Influence Between Two Concepts In A Network

How To Find Influence Between Two Concepts In A Network 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing

More information

Optimization of PID parameters with an improved simplex PSO

Optimization of PID parameters with an improved simplex PSO Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Optimal worm-scanning method using vulnerable-host distributions

Optimal worm-scanning method using vulnerable-host distributions Optimal worm-scanning method using vulnerable-host distributions Zesheng Chen and Chuanyi Ji School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 3332 Email: {zchen,

More information

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya (LKaya@ieee.org) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper

More information

Mathematical Approaches to Infectious Disease Prediction and Control

Mathematical Approaches to Infectious Disease Prediction and Control Mathematical Approaches to Infectious Disease Prediction and Control Nedialko B. Dimitrov Operations Research Department, Naval Postgraduate School, Monterey, California ned@alumni.cs.utexas.edu Lauren

More information

Diána H. Knipl PhD student University of Szeged, Hungary

Diána H. Knipl PhD student University of Szeged, Hungary ANTI-GRAVITY MODELS FOR EPIDEMIC SPREAD OF INFECTIOUS DISEASES ON LONG DISTANCE TRAVEL NETWORKS Diána H. Knipl PhD student University of Szeged, Hungary Based on the joint work with G. Röst (U of Szeged)

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6

OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 Virender Kumar Department of Electronics & Communication Engineering, HCTM Technical Campus, Kaithal, India gangotrahctm@gmail.com ABSTRACT Mobile

More information

Towards Better Definitions and Measures of Internet Security (Position Paper)

Towards Better Definitions and Measures of Internet Security (Position Paper) Towards Better Definitions and Measures of Internet Security (Position Paper) J. Aspnes and J. Feigenbaum Yale University {aspnes,feigenbaum}@cs.yale.edu M. Mitzenmacher and D. Parkes Harvard University

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Spectral Flatness Measurements for Detection of C-Worms

Spectral Flatness Measurements for Detection of C-Worms Spectral Flatness Measurements for Detection of C-Worms Rajesh Jaladi #1, Mr. Rakesh Nayak #`2 #1M.tech Student,Dept of CSE, 1 Sri Vasavi Engineering College, Tadepalligudem, Andhra Pradesh, #2Assoc.Professor,Dept

More information

Fuzzy regression model with fuzzy input and output data for manpower forecasting

Fuzzy regression model with fuzzy input and output data for manpower forecasting Fuzzy Sets and Systems 9 (200) 205 23 www.elsevier.com/locate/fss Fuzzy regression model with fuzzy input and output data for manpower forecasting Hong Tau Lee, Sheu Hua Chen Department of Industrial Engineering

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

Dynamic Quarantine of Internet Worms

Dynamic Quarantine of Internet Worms The International Conference on Dependable Systems and Networks (DSN-24). Palazzo dei Congressi, Florence, Italy. June 28th - July, 24. Dynamic Quarantine of Internet Worms Cynthia Wong, Chenxi Wang, Dawn

More information

Time series analysis as a framework for the characterization of waterborne disease outbreaks

Time series analysis as a framework for the characterization of waterborne disease outbreaks Interdisciplinary Perspectives on Drinking Water Risk Assessment and Management (Proceedings of the Santiago (Chile) Symposium, September 1998). IAHS Publ. no. 260, 2000. 127 Time series analysis as a

More information

A Service Revenue-oriented Task Scheduling Model of Cloud Computing

A Service Revenue-oriented Task Scheduling Model of Cloud Computing Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

A Robust Method for Solving Transcendental Equations

A Robust Method for Solving Transcendental Equations www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,

More information

The Theory of Concept Analysis and Customer Relationship Mining

The Theory of Concept Analysis and Customer Relationship Mining The Application of Association Rule Mining in CRM Based on Formal Concept Analysis HongSheng Xu * and Lan Wang College of Information Technology, Luoyang Normal University, Luoyang, 471022, China xhs_ls@sina.com

More information

Mathematical Modeling of Dengue - Temperature Effect on Vectorial Capacity

Mathematical Modeling of Dengue - Temperature Effect on Vectorial Capacity Mathematical Modeling of Dengue - Temperature Effect on Vectorial Capacity Jing Helmersson 2012 Supervisor: Joacim Rocklöv Abstract Background As climate change and globalization continues, the vector

More information

Statistical Forecasting of High-Way Traffic Jam at a Bottleneck

Statistical Forecasting of High-Way Traffic Jam at a Bottleneck Metodološki zvezki, Vol. 9, No. 1, 2012, 81-93 Statistical Forecasting of High-Way Traffic Jam at a Bottleneck Igor Grabec and Franc Švegl 1 Abstract Maintenance works on high-ways usually require installation

More information

An Experimental Study of the Performance of Histogram Equalization for Image Enhancement

An Experimental Study of the Performance of Histogram Equalization for Image Enhancement International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 216 E-ISSN: 2347-2693 An Experimental Study of the Performance of Histogram Equalization

More information

Identification of TV Programs Based on Provider s Logo Analysis

Identification of TV Programs Based on Provider s Logo Analysis AUTOMATYKA 2010 Tom 14 Zeszyt 3/1 Marta Chodyka*, W³odzimierz Mosorow** Identification of TV Programs Based on Provider s Logo Analysis 1. Introduction The problem of an easy access of underage persons

More information

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,

More information

GA as a Data Optimization Tool for Predictive Analytics

GA as a Data Optimization Tool for Predictive Analytics GA as a Data Optimization Tool for Predictive Analytics Chandra.J 1, Dr.Nachamai.M 2,Dr.Anitha.S.Pillai 3 1Assistant Professor, Department of computer Science, Christ University, Bangalore,India, chandra.j@christunivesity.in

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

The Optimistic Total Order Protocol

The Optimistic Total Order Protocol From Spontaneous Total Order to Uniform Total Order: different degrees of optimistic delivery Luís Rodrigues Universidade de Lisboa ler@di.fc.ul.pt José Mocito Universidade de Lisboa jmocito@lasige.di.fc.ul.pt

More information

A Performance Comparison of Five Algorithms for Graph Isomorphism

A Performance Comparison of Five Algorithms for Graph Isomorphism A Performance Comparison of Five Algorithms for Graph Isomorphism P. Foggia, C.Sansone, M. Vento Dipartimento di Informatica e Sistemistica Via Claudio, 21 - I 80125 - Napoli, Italy {foggiapa, carlosan,

More information

Bio-inspired mechanisms for efficient and adaptive network security

Bio-inspired mechanisms for efficient and adaptive network security Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany dressler@informatik.uni-erlangen.de

More information

ISSH 2011 ABM Track - Hands-on Exercise

ISSH 2011 ABM Track - Hands-on Exercise ISSH 2011 ABM Track - Hands-on Exercise Authors: Shawn Brown, University of Pittsburgh, stbrown@psc.edu John Grefenstette, University of Pittsburgh, gref@pitt.edu Nathan Stone, Pittsburgh Supercomputing

More information

An Evaluation of Network Survivability When Defense Levels Are Discounted by the Accumulated Experience of Attackers

An Evaluation of Network Survivability When Defense Levels Are Discounted by the Accumulated Experience of Attackers An Evaluation of Network Survivability When Defense Levels Are Discounted by the Accumulated Experience of Attackers Frank Yeong-Sung Lin National Tatiwan University, Taiwan yslin@im.ntu.edu.tw Pei-Yu

More information

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila

More information

Scale-free user-network approach to telephone network traffic analysis

Scale-free user-network approach to telephone network traffic analysis Scale-free user-network approach to telephone network traffic analysis Yongxiang Xia,* Chi K. Tse, WaiM.Tam, Francis C. M. Lau, and Michael Small Department of Electronic and Information Engineering, Hong

More information

How To Balance A Web Server With Remaining Capacity

How To Balance A Web Server With Remaining Capacity Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

A Local Stability of Mathematical Models for Cancer Treatment by Using Gene Therapy

A Local Stability of Mathematical Models for Cancer Treatment by Using Gene Therapy International Journal of Modeling Optimization, Vol 5, No 3, June 2015 A Local Stability of Mathematical Models for Cancer Treatment by Using Gene Therapy Dwi Lestari Ratnasari Dwi Ambarwati Abstract This

More information

Peer to Peer Networks for Defense Against Internet Worms

Peer to Peer Networks for Defense Against Internet Worms Peer to Peer etworks for Defense Against Internet Worms Srinivas Shakkottai Dept. of Electrical and Computer Engineering and Coordinated Science Laboratory University of Illinois at Urbana-Champaign sshakkot@uiuc.edu

More information

Research Article Worms Propagation Modeling and Analysis in Big Data Environment

Research Article Worms Propagation Modeling and Analysis in Big Data Environment Distributed Sensor Networks Volume 2015, Article ID 985856, 8 pages http://dxdoiorg/101155/2015/985856 Research Article Worms Propagation Modeling and Analysis in Big Data Environment Song He, 1 Can Zhang,

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Response time behavior of distributed voting algorithms for managing replicated data

Response time behavior of distributed voting algorithms for managing replicated data Information Processing Letters 75 (2000) 247 253 Response time behavior of distributed voting algorithms for managing replicated data Ing-Ray Chen a,, Ding-Chau Wang b, Chih-Ping Chu b a Department of

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,

More information

Review Study on Techniques for Network worm Signatures Automation

Review Study on Techniques for Network worm Signatures Automation Review Study on Techniques for Network worm Signatures Automation 1 Mohammed Anbar, 2 Sureswaran Ramadass, 3 Selvakumar Manickam, 4 Syazwina Binti Alias, 5 Alhamza Alalousi, and 6 Mohammed Elhalabi 1,

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks Junli Yuan *, Sujoy Roy, Qibin Sun Institute for Infocomm Research (I 2 R), 21 Heng Mui Keng Terrace,

More information

On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex?

On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? Hiroyuki Ohsaki and Masayuki Murata Graduate School of Information Science and Technology Osaka

More information

New Approach to Analysis of the Switching Current Data in Ferroelectric Thin Films

New Approach to Analysis of the Switching Current Data in Ferroelectric Thin Films Ferroelectrics, 291: 27 35, 2003 Copyright c Taylor & Francis Inc. ISSN: 0015-0193 print / 1563-5112 online DOI: 10.1080/00150190390222510 New Approach to Analysis of the Switching Current Data in Ferroelectric

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection

More information

Intelligent Agents Serving Based On The Society Information

Intelligent Agents Serving Based On The Society Information Intelligent Agents Serving Based On The Society Information Sanem SARIEL Istanbul Technical University, Computer Engineering Department, Istanbul, TURKEY sariel@cs.itu.edu.tr B. Tevfik AKGUN Yildiz Technical

More information

Ultrasonic Detection Algorithm Research on the Damage Depth of Concrete after Fire Jiangtao Yu 1,a, Yuan Liu 1,b, Zhoudao Lu 1,c, Peng Zhao 2,d

Ultrasonic Detection Algorithm Research on the Damage Depth of Concrete after Fire Jiangtao Yu 1,a, Yuan Liu 1,b, Zhoudao Lu 1,c, Peng Zhao 2,d Advanced Materials Research Vols. 368-373 (2012) pp 2229-2234 Online available since 2011/Oct/24 at www.scientific.net (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.368-373.2229

More information

COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS

COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,

More information

Edge-based active queue management

Edge-based active queue management Edge-based active queue management L. Zhu, N. Ansari, G. Cheng and K. Xu Abstract: In the paper, a new framework of active queue management, namely, edge-based active queue management (), is proposed.

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information