Computer Network

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 258597 Experts worldwide ranked by ideXlab platform

Bimal Kumar Mishra - One of the best experts on this subject based on the ideXlab platform.

  • effect of anti virus software on infectious nodes in Computer Network a mathematical model
    Physics Letters A, 2012
    Co-Authors: Bimal Kumar Mishra, Samir Kumar Pandey
    Abstract:

    Abstract An e-epidemic model of malicious codes in the Computer Network through vertical transmission is formulated. We have observed that if the basic reproduction number is less than unity, the infected proportion of Computer nodes disappear and malicious codes die out and also the malicious codes-free equilibrium is globally asymptotically stable which leads to its eradication. Effect of anti-virus software on the removal of the malicious codes from the Computer Network is critically analyzed. Analysis and simulation results show some managerial insights that are helpful for the practice of anti-virus in information sharing Networks.

  • two quarantine models on the attack of malicious objects in Computer Network
    Mathematical Problems in Engineering, 2012
    Co-Authors: Bimal Kumar Mishra, Aditya Kumar Singh
    Abstract:

    SEIQR (Susceptible, Exposed, Infectious, Quarantined, and Recovered) models for the transmission of malicious objects with simple mass action incidence and standard incidence rate in Computer Network are formulated. Threshold, equilibrium, and their stability are discussed for the simple mass action incidence and standard incidence rate. Global stability and asymptotic stability of endemic equilibrium for simple mass action incidence have been shown. With the help of Poincare Bendixson Property, asymptotic stability of endemic equilibrium for standard incidence rate has been shown. Numerical methods have been used to solve and simulate the system of differential equations. The effect of quarantine on recovered nodes is analyzed. We have also analyzed the behavior of the susceptible, exposed, infected, quarantine, and recovered nodes in the Computer Network.

  • two quarantine models on the attack of malicious objects in Computer Network
    Mathematical Problems in Engineering, 2012
    Co-Authors: Bimal Kumar Mishra, Aditya Kumar Singh
    Abstract:

    SEIQR (Susceptible, Exposed, Infectious, Quarantined, and Recovered) models for the transmission of malicious objects with simple mass action incidence and standard incidence rate in Computer Network are formulated. Threshold, equilibrium, and their stability are discussed for the simple mass action incidence and standard incidence rate. Global stability and asymptotic stability of endemic equilibrium for simple mass action incidence have been shown. With the help of Poincare Bendixson Property, asymptotic stability of endemic equilibrium for standard incidence rate has been shown. Numerical methods have been used to solve and simulate the system of differential equations. The effect of quarantine on recovered nodes is analyzed. We have also analyzed the behavior of the susceptible, exposed, infected, quarantine, and recovered nodes in the Computer Network.

  • dynamic model of worms with vertical transmission in Computer Network
    Applied Mathematics and Computation, 2011
    Co-Authors: Bimal Kumar Mishra, Samir Kumar Pandey
    Abstract:

    An e-epidemic SEIRS model for the transmission of worms in Computer Network through vertical transmission is formulated. It has been observed that if the basic reproduction number is less than or equal to one, the infected part of the nodes disappear and the worm dies out, but if the basic reproduction number is greater than one, the infected nodes exists and the worms persist at an endemic equilibrium state. Numerical methods are employed to solve and simulate the system of equations developed. We have analyzed the behavior of the susceptible, exposed, infected and recovered nodes in the Computer Network with real parametric values.

  • dynamic model of worms with vertical transmission in Computer Network
    Applied Mathematics and Computation, 2011
    Co-Authors: Bimal Kumar Mishra, Samir Kumar Pandey
    Abstract:

    An e-epidemic SEIRS model for the transmission of worms in Computer Network through vertical transmission is formulated. It has been observed that if the basic reproduction number is less than or equal to one, the infected part of the nodes disappear and the worm dies out, but if the basic reproduction number is greater than one, the infected nodes exists and the worms persist at an endemic equilibrium state. Numerical methods are employed to solve and simulate the system of equations developed. We have analyzed the behavior of the susceptible, exposed, infected and recovered nodes in the Computer Network with real parametric values.

Samir Kumar Pandey - One of the best experts on this subject based on the ideXlab platform.

  • dynamic model on ddos attack in Computer Network
    International Conference on Informatics and Analytics, 2016
    Co-Authors: Upendra Kumar, Samir Kumar Pandey
    Abstract:

    The "information warfare" can hit and completely break down critical IT infrastructure of an organization or a country. Cybercrime has many types, but, in this paper we have focused on DDoS attack into a Computer Network to spread bots throughout the Network. DDoS attack can be used to sabotage a service or as a cover for bots delivery. In this paper an epidemic SIS -- SEIRS model is proposed to represent the propagation of bots in Computer Network through DDoS attack. A mathematical model is also formulated to represent the dynamism of the members of different compartments of the model. The model provides an epidemic framework consisting of two sub frameworks to represent the internal class of nodes and external class of nodes. Numerical methods are employed to solve and simulate the system of equations developed. Results of numerical simulations are obtained using MATLAB.

  • effect of anti virus software on infectious nodes in Computer Network a mathematical model
    Physics Letters A, 2012
    Co-Authors: Bimal Kumar Mishra, Samir Kumar Pandey
    Abstract:

    Abstract An e-epidemic model of malicious codes in the Computer Network through vertical transmission is formulated. We have observed that if the basic reproduction number is less than unity, the infected proportion of Computer nodes disappear and malicious codes die out and also the malicious codes-free equilibrium is globally asymptotically stable which leads to its eradication. Effect of anti-virus software on the removal of the malicious codes from the Computer Network is critically analyzed. Analysis and simulation results show some managerial insights that are helpful for the practice of anti-virus in information sharing Networks.

  • dynamic model of worms with vertical transmission in Computer Network
    Applied Mathematics and Computation, 2011
    Co-Authors: Bimal Kumar Mishra, Samir Kumar Pandey
    Abstract:

    An e-epidemic SEIRS model for the transmission of worms in Computer Network through vertical transmission is formulated. It has been observed that if the basic reproduction number is less than or equal to one, the infected part of the nodes disappear and the worm dies out, but if the basic reproduction number is greater than one, the infected nodes exists and the worms persist at an endemic equilibrium state. Numerical methods are employed to solve and simulate the system of equations developed. We have analyzed the behavior of the susceptible, exposed, infected and recovered nodes in the Computer Network with real parametric values.

  • dynamic model of worms with vertical transmission in Computer Network
    Applied Mathematics and Computation, 2011
    Co-Authors: Bimal Kumar Mishra, Samir Kumar Pandey
    Abstract:

    An e-epidemic SEIRS model for the transmission of worms in Computer Network through vertical transmission is formulated. It has been observed that if the basic reproduction number is less than or equal to one, the infected part of the nodes disappear and the worm dies out, but if the basic reproduction number is greater than one, the infected nodes exists and the worms persist at an endemic equilibrium state. Numerical methods are employed to solve and simulate the system of equations developed. We have analyzed the behavior of the susceptible, exposed, infected and recovered nodes in the Computer Network with real parametric values.

  • fuzzy epidemic model for the transmission of worms in Computer Network
    Nonlinear Analysis-real World Applications, 2010
    Co-Authors: Bimal Kumar Mishra, Samir Kumar Pandey
    Abstract:

    Abstract An e-epidemic SIRS (susceptible–infectious–recovered–susceptible) model for the fuzzy transmission of worms in Computer Network is formulated. We have analyzed the comparison between classical basic reproduction number and fuzzy basic reproduction number, that is, when both coincide and when both differ. The three cases of epidemic control strategies of worms in the Computer Network–low, medium, and, high–are analyzed, which may help us to understand the attacking behavior and also may lead to control of worms. Numerical methods are employed to solve and simulate the system of equations developed.

L I Chunlian - One of the best experts on this subject based on the ideXlab platform.

  • overview of modeling and simulation of attack and defense of Computer Network
    Computer Simulation, 2013
    Co-Authors: L I Chunlian
    Abstract:

    Because of the sensitivity,real- time and large- scale of Computer Network applications,it is is hard to make the research work directly. Using the methods of modeling and simulation to analyze Computer Network security is a good way. These methods not only can avoid affecting and destroying actual Computer Networks,but also are flexible,repeatable and high- efficiency. At first,the related work on the methods of modeling and simulation of Network attack and defense based on analysis of graph and Network worm behaviors was presented. And then the effect evaluation methods of Network attack and defense based on cascading failure were analyzed,and some typical systems facing the analyzing of Network security were introduced. In the end,the problems and challenges of current research were discussed and some suggestions for future research were put forward.

Chunhe Xia - One of the best experts on this subject based on the ideXlab platform.

  • A SDN-based deployment framework for Computer Network Defense Policy
    2015 4th International Conference on Computer Science and Network Technology (ICCSNT), 2015
    Co-Authors: Jinghua Gao, Chunhe Xia, Shuguang Wang, Huajun Zhang
    Abstract:

    Computer Network Defense Policy is a kind of policy-based Network management method which aims to achieve specific security objectives. Although it brings much efficiency in the field of Computer Network defense, it can't be widely used because the existing Computer Network Defense Policy models are all proposed on P2DRR architecture and lack specific deployment framework as well as methods. In this paper, we utilize programmability and centralized control of software defined Networking and propose a SDN-based deployment framework. Also, we come up with defense selection method and “traffic steering” method for policy deployment. The implementation and experiments in cloud environment shows that under the proposed framework, we can execute the process of policy resolution and configuration deployment automatically and correctly.

  • a Computer Network defense policy refinement method
    ICoC, 2013
    Co-Authors: Zhao Wei, Chunhe Xia, Yang Luo, Qing Wei
    Abstract:

    The existing methods of policy refinement in Computer Network defense (CND) can only support the refinement of access control policy, but not the policies of protection, detection, response, and recovery. To solve this problem, we constructed a Computer Network defense policy refinement model and its formalism specification. An algorithm of defense policy refinement is designed. At last, the effectiveness of our methods was verified through one experiment cases of the composition policies with intrusion detection, vulnerabilities detection, and access control.

  • Research on Computer Network defense policy conflict detection
    2012 World Congress on Information and Communication Technologies, 2012
    Co-Authors: Chao Yuan, Xiaoyan Liang, Chunhe Xia
    Abstract:

    Policy is an essential part of Computer Network defense, which also has important guidance effect in the deployment, implementation, and configuration of the defense system. Thus, the possibility of conflicts existing in defense policies is becoming more and more crucial for ensuring the security of policies themselves. In this paper, we use a Computer Network defense policy specification language called CNDPSL, according to a model called CNDPM, to describe Computer Network defense policies, which can provide a uniform method of specifying policies of protection, detection and response. First, this article analyses conflicts existing in defense policies and shows the classification of these conflicts. Then, it gives a Computer Network defense policy detection model. Finally, this article shows a prototype system of Computer Network defense policy conflict detection, and validates the effectiveness of the prototype system with experiments.

  • The consistency verification of Computer Network Defense Policy and measures
    2012 World Congress on Information and Communication Technologies, 2012
    Co-Authors: Xiaoyan Liang, Chunhe Xia
    Abstract:

    Computer Network Defense Policy is the rules of Computer Network and security devices. In order to achieve specific security objectives, the Network need to choose the defensive measures under certain conditions. In order to generate the measures implemented by the device, it usually requires manual or automated translation from high-level Network defense policy. In the translation process, due to the presence of semantic loss, man-made understanding mistakes, device machinery, etc., the high-level policy requirements cannot be completely satisfied. This will result in hiding Network security risks or vulnerabilities. Through analysis of the consistency between high-level policy and low-level measures, and pointing out the lack and redundancy between the policy and measures, it can guide the further translation of policy on the device. This paper presents a novel formal and automated method to verify the consistency. When errors are detected, we will point out the location of the misconfiguration. The same time, based on SMT solving tools, it has been implemented in a prototype of consistency verifier. Experiments demonstrate that this tool is able to check the consistency and have good scalability and efficiency.

  • a tactical intelligence production model of Computer Network self organizing operations
    International Conference on Intelligent Computing, 2010
    Co-Authors: Shan Yao, Jian Jiao, Chunhe Xia
    Abstract:

    In this paper, we define the concepts of target's information and intelligence activities for Computer Network Self-organizing Operations, propose a tactical intelligence production model of Computer Network self-organization operation and prove its reachability. In order to verify the model, we present the evaluating, analysis and interpreting algorithm based on rule-based reasoning. Then, we design and implement the tactical intelligence production prototype to verify the validity of the CNSOO-TIPM and algorithms. The experiment results show that the prototype provides timely and accurate intelligence information for the CNO decision and meets the most basic needs of cooperative operations between the CNO agents.

Hriadeľ Ondřej - One of the best experts on this subject based on the ideXlab platform.

  • Computer Network Design for Service Desk Office
    Vysoké učení technické v Brně. Fakulta podnikatelská, 2017
    Co-Authors: Hriadeľ Ondřej
    Abstract:

    This bachelor thesis puts forward a Computer Network for service desk offices of arising branch office of an international company. First part of this thesis analyzes current state of Computer Network, software and hardware demands as well as investor requirements. Second part introduces general information of Computer Network which are needed for designing the concept, which is elaborated in the third part. Concrete cabling solutions, device choice and economic evaluation of the whole proposed concept are included

  • Computer Network Design for Service Desk Office
    Vysoké učení technické v Brně. Fakulta podnikatelská, 2017
    Co-Authors: Hriadeľ Ondřej
    Abstract:

    Tato bakalářská práce navrhuje počítačovou síť pro kanceláře technické podpory nově vznikající pobočky zahraniční firmy. První část práce analyzuje aktuální stav počítačové sítě, požadavky na software a hardware a také požadavky investora. Druhá část práce představuje obecné informace o počítačových sítích potřebné k vypracování návrhu. Ten je vypracován ve třetí části práce. Součástí návrhu jsou konkrétní řešení kabeláže, zařízení, ale také ekonomické zhodnocení celého návrhu.This bachelor thesis puts forward a Computer Network for service desk offices of arising branch office of an international company. First part of this thesis analyzes current state of Computer Network, software and hardware demands as well as investor requirements. Second part introduces general information of Computer Network which are needed for designing the concept, which is elaborated in the third part. Concrete cabling solutions, device choice and economic evaluation of the whole proposed concept are included.