NUMERICAL MODEL FOR CYBER ATTACK IN CYBERSPACE
Description
This research emphasizes to establish an e-VEIRS (vulnerable, exhibited, infected, restored) widespread computer network model to examine the spread of malicious program in a computer network and deduce the estimated threshold requirement to explore the balance and stability of the model. The author has simulated the outputs of several parameters applied in the model and Runge-Kutta Fehlberg fourth-fifth order method is applied to obtain the solution of equations developed. They have examined the stability of the level of crime to reach equilibrium and discovered the crucial value of the threshold to determine if the contagious free equilibrium is asymptotically stable on a global scale and endemic equilibrium is asymptotically stable. on a local scale. Simulation output applying MATLAB comply with the actual situations.
Files
IJCRT2106362.pdf
Files
(1.1 MB)
Name | Size | Download all |
---|---|---|
md5:70f17eb0feb637904ceec6b1860dcc75
|
1.1 MB | Preview Download |