Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published June 16, 2021 | Version v1
Journal article Open

NUMERICAL MODEL FOR CYBER ATTACK IN CYBERSPACE

Creators

  • 1. Narula Institute of Technology

Description

This research emphasizes to establish an e-VEIRS (vulnerable, exhibited, infected, restored) widespread computer network model to examine the spread of malicious program in a computer network and deduce the estimated threshold requirement to explore the balance and stability of the model. The author has simulated the outputs of several parameters applied in the model and Runge-Kutta Fehlberg fourth-fifth order method is applied to obtain the solution of equations developed. They have examined the stability of the level of crime to reach equilibrium and discovered the crucial value of the threshold to determine if the contagious free equilibrium is asymptotically stable on a global scale and endemic equilibrium is asymptotically stable. on a local scale. Simulation output applying MATLAB comply with the actual situations.

Files

IJCRT2106362.pdf

Files (1.1 MB)

Name Size Download all
md5:70f17eb0feb637904ceec6b1860dcc75
1.1 MB Preview Download