earticle

논문검색

Predator-Prey Models on Interaction between Computer Worms, Trojan Horse and Antivirus Software Inside a Computer System

초록

영어

In this paper an attempt has been made to develop Predator- prey Models on interaction between Computer worms, Trojan horse and antivirus software inside a computer system. Five mathematical models are proposed to study the Predator-prey system inside a computer system. In mathematical model 1, the prey consists of uninfected files, whereas, the predator consists of computer worms. In mathematical model 2, the infected files constitute the prey and anti-virus software is the predator. In mathematical model 3, Effect of new or updated antivirus software on such computer worms which are quarantine or not completely recovered by the lower version of installed antivirus software in the system is studied which switches the rate of infection to zero. In mathematical model 4, Reactivation of computer worms when they are in the latent class is mathematically formulated. In mathematical model 5, we have attempt to develop and understand the recent attack of the Trojan horse Backdoor. Kihomchi and Trojan.Zbot!gen74 and its removal by newly available tool NPE.exe. The stability of the result is stated in terms of the Jacobian of the system and the basic reproduction number is also well defined for all models. Numerical methods and MATLAB are employed to solve and simulate the system of equations developed and analysis of the models gives remarkable exposure.

목차

Abstract
 1. Introduction
 2. Formulation of the Model
  2.1. Formulation of Model 1: Initial phase of an Infection
  2.2 Formulation of Model II: Secondary Phase of Infection (Effect of antivirus software)
  2.3 Formulation of Model III: Effect of New Antivirus Aoftware on such Worms which are Quarantine
  2.4 Formulation of Model IV: Reactivation of Computer Worms after they are in Latent Class
  2.5 Formulation of Model V: Recent Attack by Trojan Horse Backdoor.Kihomchi and Trojan.Zbot!gen74 and its Mathematical Approach
 3. Discussion and Conclusion
 References

저자정보

  • Munna Kumar Research Scholar,Department of Mathematics, Utkal University, Bhubaneswar, Orissa, India
  • Bimal Kumar Mishra Department of Applied Mathematics, Birla Institute of Technology Mesra, Ranchi, India
  • T. C. Panda Former Principal, Orissa Engineering College, Bhubaneswar Orissa, India

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.