SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
DOI : 10.5121/ijnsa.2011.3612 161
PREDICTION OF MALICIOUS OBJECTS IN
COMPUTER NETWORK AND DEFENSE
Hemraj Sainia1
, T. C. Panda2
, Minaketan Panda3
1
Department of Computer Science & engineering,
Alwar Institute of Engineering & Technology, India
hemraj1977@yahoo.co.in
2
Department of Applied Mathematics,
Orissa Engineering College, Bhubaneswar, Orissa, India
tc_panda@yahoo.com
3
Engineer, Presales & Planning,
SPANCO TELE, Chandigarh, India
tominaketa@gmail.com
ABSTRACT
The paper envisages defense of critical information used in Computer Networks those are using Network
Topologies such as Star Topology. The first part of the paper develops a model to predict the malicious
traffic from the incoming traffic by using Black Scholes Equations. MATLAB is used to simulate the
developed model for realistic values. However, the second part of the problem provides a framework for
the treatment of predicted malicious traffic with detailed discussion of security measures.
KEYWORDS
Malicious Object, Black Scholes Equations, Star Topology, Anti Malicious Objects, System Hardening,
Friendly-Cooperative Framework
1. INTRODUCTION
Models for malicious object propagation in the computer networks are well discussed in
literature [1, 2, 3, 4, 5] but its propagation in network topology [6, 7, 8] is not adequately
documented. Network topology plays an important role for various factors such as speed of
propagation, server management, band width usage etc. Hence, before deciding the malicious
object’s dynamics, the network topology must be considered.
The paper uses star topology [9] for deciding the dynamics of malicious objects as it is
widely used network topology. A star topology is depicted in figure-1 where the server is
centrally located and connected with the outer world through ISP. The incoming traffic from
ISP having malicious objects and may enter into the network and destroy the network or steal
the information. The work presented in the paper predicts the malicious traffic by using the
Black Scholes Equations [10, 11], which are the most widely used equations to predict the
portfolio of financial market. Cyber Attacks are totally analogous to financial market. The
uncertainty of the option price in the financial market is similar to the uncertainty of the cyber
attacks. Other feature such as input to the financial market is similar to number of cyber
attackers, pattern of change of option price is similar to the change in the rate of malicious
objects, and the effect of strike price is compatible to the effect of Anti Malicious Software
(AMS) [12, 13] i.e. number of malicious objects already restricted by the AMS. In addition, the
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
change in option price is affected by multi factors similar to the number of incoming malicious
objects in the cyber world and these are uncertain for every attack.
The predicted malicious traffic is isolated and cured by security measures and then
again put in to the regular traffic. In addition the information about the malicious traffic is
parallelly transferred to all the connected nodes so that they can make themselves self
[14, 15] enough to face the attack by using the friendly
In addition to Introduction, the paper envisages model formulation as section
friendly cooperative framework for processing the malicious information as section
finally the conclusion and future direction to the work as section
2. MODEL FORMULATION
The normal functioning of the server ensures the smoothness and malicious objects free
environment of the network as far as star topology is concerned. If the server gets down then all
the nodes or clients will also remain in idle condition, and as such cannot communicate each
other as well as with the outer world. Hence, sever is the only gateway for the communication.
The incoming traffic is in the form of packets with destination address. The server
receives the packets first and diverts the packets to the nodes as shown in the figure
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
change in option price is affected by multi factors similar to the number of incoming malicious
objects in the cyber world and these are uncertain for every attack.
The predicted malicious traffic is isolated and cured by security measures and then
n put in to the regular traffic. In addition the information about the malicious traffic is
parallelly transferred to all the connected nodes so that they can make themselves self
[14, 15] enough to face the attack by using the friendly-cooperative-framework.
In addition to Introduction, the paper envisages model formulation as section
friendly cooperative framework for processing the malicious information as section
finally the conclusion and future direction to the work as section-IV.
Figure-1: Star Topology
ORMULATION
The normal functioning of the server ensures the smoothness and malicious objects free
environment of the network as far as star topology is concerned. If the server gets down then all
also remain in idle condition, and as such cannot communicate each
other as well as with the outer world. Hence, sever is the only gateway for the communication.
The incoming traffic is in the form of packets with destination address. The server
he packets first and diverts the packets to the nodes as shown in the figure-2.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
162
change in option price is affected by multi factors similar to the number of incoming malicious
The predicted malicious traffic is isolated and cured by security measures and then
n put in to the regular traffic. In addition the information about the malicious traffic is
parallelly transferred to all the connected nodes so that they can make themselves self-harden
In addition to Introduction, the paper envisages model formulation as section-II,
friendly cooperative framework for processing the malicious information as section-III and
The normal functioning of the server ensures the smoothness and malicious objects free
environment of the network as far as star topology is concerned. If the server gets down then all
also remain in idle condition, and as such cannot communicate each
other as well as with the outer world. Hence, sever is the only gateway for the communication.
The incoming traffic is in the form of packets with destination address. The server
2.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
Figure
Packet-1 is broadcasted to all the nodes after it is received by the server. The concern
node accepts it and other discard. By
suspected traffic and can take security measures. Signature based methods are the most widely
used methods to identify the malicious traffic. But if signature database is not having the
signature of incoming traffic then it cannot be detected. In such a situation we have to use some
of predictable approach, in our case we are using the Black Scholes equations to predict the
malicious traffic.
Let number of incoming packets at any instance t are N, from whic
may be a malicious packet. The connection from star network to its ISP is continuous and so
the packets are continuously transmitting to and fro.
Let the traffic is coming with
malicious and second non-malicious, so, we assume that the probability of being malicious is p
and non-malicious is q, p + q=1. For n spans of time
objects are to be find is given by
t n t= ∆
So, the number of total malicious/non
1 2 3( ) ...x t z z z z= + + + +
Where, iz (I = 1, 2, …, n) is the number of malicious/non
The expectation of total traffic is as under
1 2 3( ( )) ( ) ( ) ( ) ... ( )E x t E z E z E z E z= + + + +
Where,
( )iE z represents the ith time span expectation of being either malicious/
malicious.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
Figure-2: Packet transferring in star Topology
1 is broadcasted to all the nodes after it is received by the server. The concern
node accepts it and other discard. By analyzing the traffic pattern one can separate the
suspected traffic and can take security measures. Signature based methods are the most widely
used methods to identify the malicious traffic. But if signature database is not having the
ng traffic then it cannot be detected. In such a situation we have to use some
of predictable approach, in our case we are using the Black Scholes equations to predict the
Let number of incoming packets at any instance t are N, from which any random packet
may be a malicious packet. The connection from star network to its ISP is continuous and so
the packets are continuously transmitting to and fro.
Let the traffic is coming with /x t∆ ∆ speed. As the traffic is having two parts, one is
malicious, so, we assume that the probability of being malicious is p
malicious is q, p + q=1. For n spans of time t∆ , the total time of which the ma
objects are to be find is given by-
So, the number of total malicious/non-malicious objects in time t is ( )x t and given by
( ) ... nx t z z z z= + + + +
(I = 1, 2, …, n) is the number of malicious/non-malicious objects.
The expectation of total traffic is as under-
1 2 3( ( )) ( ) ( ) ( ) ... ( )nE x t E z E z E z E z= + + + +
represents the ith time span expectation of being either malicious/
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
163
1 is broadcasted to all the nodes after it is received by the server. The concern
analyzing the traffic pattern one can separate the
suspected traffic and can take security measures. Signature based methods are the most widely
used methods to identify the malicious traffic. But if signature database is not having the
ng traffic then it cannot be detected. In such a situation we have to use some
of predictable approach, in our case we are using the Black Scholes equations to predict the
h any random packet
may be a malicious packet. The connection from star network to its ISP is continuous and so
speed. As the traffic is having two parts, one is
malicious, so, we assume that the probability of being malicious is p
, the total time of which the malicious
(a)
and given by-
(1)
(2)
represents the ith time span expectation of being either malicious/non-
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
164
Above equation (2) can be rewritten as-
1
( ( ))
n
i i
i
E x t p x
=
= ∑
(3)
Now,
( )iE z will be given by-
( ) ( ) ( )iE z p x q x= ∆ + − ∆
( )p q x= − ∆ (4)
Where, i=1, 2, …, n so, equation-(3) can be expended by using equation-(4) as follows-
( ( )) ( ) ( ) ... ( )E x t p q x p q x p q x− − ∆ + − ∆ + + − ∆
( ( )) ( )E x t n p q x= − ∆ (5)
The variance of the traffic is calculated as follows, which represents the behavior of
traffic of being malicious/non-malicious.
2 2 2
( ) ( ( )) ( ( ))Var x E x E xσ= = − (6)
Equation-(6) leads that
2 2
( ) ( ( )) ( ( ))i i iVar z E z E z= −
2 2 2
( ) ( ( ) (( ) )p x q x p q x= ∆ + − ∆ − − ∆
2
4 ( )pq x= ∆
0 0
( ) ( )
n n
i i
i i
Var x Var x
= =
=∑ ∑
Or
2
( ( )) 4 ( )Var x t npq x= ∆ (7)
Equation-(5) represents the instantaneous expectation. Now,
0
( )
inst t
p q x
E Limit
t
∆ →
− ∆
=
∆ (8)
Thus from equation-(a) and equation-(8) we have-
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
165
( )
( ( )) .t o t o
t p q
Limit E x t Limit t
t
µ∆ → ∆ →
−
= =
∆ (9)
as the traffic is continuous to the network.
Similarly the instantaneous variance can be given as under-
2
2
0
4 ( )
t
pq x
Limit
t
σ ∆ →
∆
=
∆ or
2 2
0( ( )) 4. . ( )t
t
Var x t Limit pq x t
t
σ∆ →= ∆ =
∆ (10)
Initially there are no malicious objects in the network and the possibility of malicious
objects in the further independently incremented time span does not depend on each other. In
addition we assuming that the value of malicious objects at time t i.e. ( )x t follows normal
distribution [16] with mean .tµ or
2
tσ , which are derived in equation-(9) and equation –(10)
separately.
In other words, the variable ( )x t is a stochastic process with respect to time t.
Now, the traffic is continuous and represented by Standard Normal distribution, which
is given by-
( )x t t
t
µ
σ
−
Φ =
(11)
Φ is a Standard Normal Distribution with mean zero and variance one i.e. ( ) 0E Φ =
and ( ) 0Var Φ = So, from equation-(11)-
( )x t t tµ σ= + Φ
( ) ( ) ( )x t t tµ σω⇒ = + (12)
If 0µ = and 1σ = then
( ) ( )x t tω= , where, ( )tω is a wiener’s process.
Now, as ( )x t , the number of malicious objects in time t, is a stochastic process and
hence ( )x t is said to follow a Geometric Brownian Motion (GBM) [17], which satisfies the
following stochastic deferential equation-
( ) ( ) ( ( ))dx t x t dt x t dµ σ ω= + (13)
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
166
Additionally, the stochastic process ( )x t is an ITO-Process and satisfies the below
equation-
( ) ( ( ), ) ( ( ), )dx t x t t dt x t t dµ σ ω= + (14)
Now, the evolution of malicious objects in the network traffic follows GBM in a long
normal distribution form i.e. the deviation in general behavior is very less within the range say,
5%± .
The change of the incoming malicious objects in the short period of the computation of
the number of incoming malicious objects in the traffic is almost constant.
There is no extra load of malicious objects in the system as the AMS is running to
overcome of it.
By above conclusions, we can say the number of malicious objects represented by
( , )V S t where, S is a stochastic process [18] which represents the last counted number of
malicious objects.
Let present time is t and the number of malicious objects in the network is π which is
given by-
sV ∆−=π , (15)
Where V is the maximum possible value of ( , )V S t and s∆ is the small value changed
in the number of malicious objects.
After time period dt the number of malicious objects will be increased by dπ and
becomes dπ π+ i.e.
( )d V s dπ π π+ = − ∆ +
( ) ( )V dV s ds= + − ∆ + (16)
The change in the value of the number of malicious objects in time dt is πd and given
by-
( )d dπ π π π= + − (17)
By equation (15) to (16)-
d dV dsπ = − ∆ (18)
Since V satisfies GBM. Hence by ITO’s lemma is-
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
167
2
2 2
2
1
2
V V V V
dV s s t sdx
t s s s
σ µ σ
σ
 ∂ ∂ ∂ ∂
= + + ∂ + 
∂ ∂ ∂  (19)
The solution of equation – (19) can be obtained by the following process:-
Let there are k time spans of duration tδ in the total time T to compute the total number
of malicious objects and the Malicious Object Updating (MOU) Step as sδ such that
T
t
k
δ =
,
iS
s
I
δ =
, where 0 i I≤ ≤ .
So, we can get the solution to obtain the number of malicious objects,
( , ) k
i k iV S t V≡
for the already identified malicious objects by AMS, iS
and for kth time span of the total time,
where 0 i I≤ ≤ & 0 k K≤ ≤ , which can be obtained by the following equation-(20).
1
2 2 1 1
2
1 1
21
2 ( )
0
2
k k k k k
i i i i i
i
k k
ki i
i i
V V V V V
S
t s
V V
S V
s
σ
δ δ
µ µ
δ
+
+ −
+ −
 − − +
+ + 
 
 −
− = 
  (20)
Where i=1, 2, …, I-1 and k=0, 1, 2, …., K-1
1
1 1
k k k k
i i i i i i iV AV BV CV+
− += + + (21)
Where
,i iA B
and iC
are constants given by following equation-(22).
2 2
2 2
2 2
;
;
2
i
i
i
T
A I I
K
K T I T
B
K
T
C I I
K
σ µ
σ µ
σ µ
 = − 
 − −
=  
 
 = + 
(22)
3. DEFENDING MECHANISM
Figure-3 shows the MATLAB simulation of the equation-(20) for the number of
malicious objects already identified by AMS as 10.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
Figure-3: Relation among s, S and t
Figure-4: Traffic analysis algorithm
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
168
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
As soon as the prediction of the number of malicious objects increases by a threshold
value, the traffic becomes the suspected one and may be isolated either to ign
the security measures over it as shown in the figure
The threshold value used in figure
represents the maximum number of malicious objects counted at any moment where it goes up
from the maximum number of malicious objects already blocked by AMS.
4. FRIENDLY COOPERATIVE
MALICIOUS INFORMATION
As the suspected traffic is isolated for its diagnostic purpose and once it got a
confirmation to be the malicious then its s
connected nodes. This information is communicated by using friendly cooperative framework
as shown in figure-5.
Figure-5: Friendly cooperative framework for information transfer to all directly
5. CONCLUSION AND FUTURE
The Black Scholes equations are used to predict the behavior of network traffic and the
simulation for already identified malicious objects by AMS at a specific time interval is made,
which is more realistic in the real time scenario. On the basis of simulated results a proposal is
provided to identify the traffic in which the possibility of the number of malicious objects is
beyond a threshold value and will be thus termed as suspected traffic. This suspect
then treated through security measures to make it a regular traffic. In addition, a framework is
also provided to propagate the generated malicious information to all the directly connected
nodes or friendly nodes.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
As soon as the prediction of the number of malicious objects increases by a threshold
value, the traffic becomes the suspected one and may be isolated either to ignore or to deploy
the security measures over it as shown in the figure-4.
The threshold value used in figure-4 can be easily computed from the figure
represents the maximum number of malicious objects counted at any moment where it goes up
ximum number of malicious objects already blocked by AMS.
OOPERATIVE FRAMEWORK FOR PROCESSING THE
NFORMATION
As the suspected traffic is isolated for its diagnostic purpose and once it got a
confirmation to be the malicious then its signature and source has to be spread to all the
connected nodes. This information is communicated by using friendly cooperative framework
5: Friendly cooperative framework for information transfer to all directly
connected nodes.
UTURE DIRECTION TO THE WORK
The Black Scholes equations are used to predict the behavior of network traffic and the
simulation for already identified malicious objects by AMS at a specific time interval is made,
c in the real time scenario. On the basis of simulated results a proposal is
provided to identify the traffic in which the possibility of the number of malicious objects is
beyond a threshold value and will be thus termed as suspected traffic. This suspected traffic is
then treated through security measures to make it a regular traffic. In addition, a framework is
also provided to propagate the generated malicious information to all the directly connected
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
169
As soon as the prediction of the number of malicious objects increases by a threshold
ore or to deploy
4 can be easily computed from the figure-3. It
represents the maximum number of malicious objects counted at any moment where it goes up
ROCESSING THE
As the suspected traffic is isolated for its diagnostic purpose and once it got a
ignature and source has to be spread to all the
connected nodes. This information is communicated by using friendly cooperative framework
5: Friendly cooperative framework for information transfer to all directly
The Black Scholes equations are used to predict the behavior of network traffic and the
simulation for already identified malicious objects by AMS at a specific time interval is made,
c in the real time scenario. On the basis of simulated results a proposal is
provided to identify the traffic in which the possibility of the number of malicious objects is
ed traffic is
then treated through security measures to make it a regular traffic. In addition, a framework is
also provided to propagate the generated malicious information to all the directly connected
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
170
References
[1] Ossama A. Toutonji, Seong-Moo Yoo, and Moongyu Park (2010), “Propagation modeling and
analysis of network worm attack”, In Proceedings of the Sixth Annual Workshop on Cyber Security
and Information Intelligence Research (CSIIRW '10), ACM, New York, NY, USA, , Article 48, 4
pages. DOI=10.1145/1852666.1852719 http://doi.acm.org/10.1145/18526661852719
[2] T. R. Tidwell, K. Fitch Larson, J. Hale (2001), “Modeling Internet Attacks”, Proceedings of
the IEEE Workshop on Information Assurance and Security, Unites States Military Academy,
West Point, NY.
[3] Hemraj Saini, Dinesh Saini (2007), “Malicious Object dynamics in the presence of Anti Malicious
Software”, European Journal of Scientific Research, volume-18, Issue-3, pp.-491-499
[4] Hemraj Saini (2009), “Queuing Model for Malicious Attack Detection”, The Icfai University
Journal of Information Technology, 5(2) 16-28
[5] Hemraj Saini, Dinesh Saini (2008), “VAIN: A Stochastic Model for Dynamics of Malicious
Objects”, ICFAI journal of Systems Management, Vol. 6, No. 1, pp. 14-28
[6] Jean Wairand (1998), “Communication Networks (A first Course”), Second Edition, WCB/McGraw
Hill.
[7] Behrouz, Forouzan (2001), “Introduction to Data Communication and Networking”, 2nd
Edition,
TMH.
[8] Andrew S Tanenbaum, Computer Networks, 4th
, (2002), Prentice Hall PTR.
[9] FitzGerald, Jerry, Alan Dennis (1999), “Business Data Communications and Networking”, 6th
ed.,
New York: John Wiley & Sons.
[10] R. Company, E. Navarro, J. Ramón Pintos, E. Ponsoda (2008), “Numerical solution of linear and
nonlinear Black-Scholes option pricing equations” Comput. Math. Appl., 56, 3 813-821. DOI=
http://dx.doi.org/10.1016/j.camwa.2008. 02.010
[11] G. Barles, H. M. Soner (1998), “Option pricing with transaction costs and a nonlinear Black-
Scholes equation”. Finance Stochast., v2. 369-397.
[12] K. Lakkaraju, and A. Slagell (2008), “Evaluating the utility of anonymized network traces for
intrusion detection”, In Proceedings of the 4th international Conference on Security and Privacy in
Communication Netowrks (Istanbul, Turkey, September 22 - 25. SecureComm '08. ACM, New
York, NY, 1-8. DOI= http://doi.acm.org /10.1145/1460877.1460899
[13] Nick Clemente (2007), “System Hardening The Process of Defending and Securing Today's
Information Systems”, Journal of Security Education, 2(4) 89 – 118
[14] Hemraj Saini, Dinesh Kumar Saini (2007), “Proactive cyber Defense and Reconfigurable
Framework of Cyber Security”, International journal named International Review on Computer and
Software, 2(2) 89-97
[15] H. Saini, D. K. Saini (2006), “Cyber Defense Architecture in Campus Wide Network”, 3rd
International Conference on Quality, Reliability and INFOCOM Technology (Trends and Future),
Indian National Science Academy, New Delhi (INDIA), 2-4 December, Souvenir pp. 62
[16] M. G. Kendall, A. Stuart (1977), “The advanced theory of statistics”, Griffin.
[17] A. Borodin, P. Salminen (2002), Handbook of Brownian Motion - Facts and Formulae, 2nd
Edn.,
Birkhauser Verlag.
[18] L. Arnold (1974), “Stochastic differential equations”, Wiley (Translated from Russian).
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
Hemraj Saini is a faculty member in the Department of Computer Science &
Engineering, Alwar Institute of Engineering & Technology, Alwar,
He received his B.Tech. in CS&E from NIT Hamirpur (H.P.) and M.Tech. degree in
Information Technology from the Pun
respectively. He has submitted his Ph.D. in Utkal University, Vani Vihar,
Bhubaneswar. His main professional interests are in Mathematical Modeling,
Simulation, Cyber Defense, Network Security and Intelligen
T. C. Panda is a Retd. Professor of Mathematics (Berhampur University, India),
Founder Professor of Mathematics & Computer Sc. (Mizoram Central University,
India) and currently associated as Principal with Orissa Engineering College,
Bhubaneswar, Orissa, India-752050. He received his Masters from Banaras Hindu
University in 1968 and Ph. D. from Berhampur University in 1975. His main interests
are Fluid Dynamics, Air Pollution Modeling, Monsoon Dynamics, Numerical Weather
Prediction, Meso-Scale Modeling, Remote Sensing Techniques, Numerical Solution of
Partial Differential Equations and Cyber Defense.
Minaketan Panda is an Engineer SPANCO
received his B.Tech. in E&TCE from ABIT, Cuttack (Orissa.) and M.Tech.
Computer Science & Engineering from the IIIT, Bhubaneswar, Orissa in 2005 and
2009 respectively. His main professional interests are in Networking, Enterprise
Resource Planning, mobile Computing, Cyber Defense, Network Security and
Intelligent Techniques.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
is a faculty member in the Department of Computer Science &
Alwar Institute of Engineering & Technology, Alwar, India – 752050.
He received his B.Tech. in CS&E from NIT Hamirpur (H.P.) and M.Tech. degree in
Information Technology from the Punjabi University Patiala, Punjab in 1999 and 2005
respectively. He has submitted his Ph.D. in Utkal University, Vani Vihar,
Bhubaneswar. His main professional interests are in Mathematical Modeling,
Simulation, Cyber Defense, Network Security and Intelligent Techniques
a Retd. Professor of Mathematics (Berhampur University, India),
Founder Professor of Mathematics & Computer Sc. (Mizoram Central University,
India) and currently associated as Principal with Orissa Engineering College,
752050. He received his Masters from Banaras Hindu
University in 1968 and Ph. D. from Berhampur University in 1975. His main interests
are Fluid Dynamics, Air Pollution Modeling, Monsoon Dynamics, Numerical Weather
le Modeling, Remote Sensing Techniques, Numerical Solution of
Partial Differential Equations and Cyber Defense.
is an Engineer SPANCO-TELE, a multinational company. He
received his B.Tech. in E&TCE from ABIT, Cuttack (Orissa.) and M.Tech. degree in
Computer Science & Engineering from the IIIT, Bhubaneswar, Orissa in 2005 and
2009 respectively. His main professional interests are in Networking, Enterprise
Resource Planning, mobile Computing, Cyber Defense, Network Security and
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
171

More Related Content

What's hot

Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior csandit
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet aIJCNCJournal
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...eSAT Journals
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKIJCI JOURNAL
 
DoS Forensic Exemplar Comparison to a Known Sample
DoS Forensic Exemplar Comparison to a Known SampleDoS Forensic Exemplar Comparison to a Known Sample
DoS Forensic Exemplar Comparison to a Known SampleCSCJournals
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...ijcsit
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...chennaijp
 

What's hot (17)

B035410013
B035410013B035410013
B035410013
 
E0392031034
E0392031034E0392031034
E0392031034
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
 
DoS Forensic Exemplar Comparison to a Known Sample
DoS Forensic Exemplar Comparison to a Known SampleDoS Forensic Exemplar Comparison to a Known Sample
DoS Forensic Exemplar Comparison to a Known Sample
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
7 ijcse-01229
7 ijcse-012297 ijcse-01229
7 ijcse-01229
 

Similar to PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE

INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolImpact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolZac Darcy
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETA NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETIJNSA Journal
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETA NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETIJNSA Journal
 
TWIN-NODE NEIGHBOUR ATTACK ON AODV BASED WIRELESS AD HOC NETWORK
TWIN-NODE NEIGHBOUR ATTACK ON AODV BASED WIRELESS AD HOC NETWORKTWIN-NODE NEIGHBOUR ATTACK ON AODV BASED WIRELESS AD HOC NETWORK
TWIN-NODE NEIGHBOUR ATTACK ON AODV BASED WIRELESS AD HOC NETWORKIJCNCJournal
 
Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc Network
Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc NetworkTwin-Node Neighbour Attack on AODV based Wireless Ad Hoc Network
Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc NetworkIJCNCJournal
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONIJNSA Journal
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...ieijjournal
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 

Similar to PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE (20)

INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolImpact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing Protocol
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETA NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETA NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
 
TWIN-NODE NEIGHBOUR ATTACK ON AODV BASED WIRELESS AD HOC NETWORK
TWIN-NODE NEIGHBOUR ATTACK ON AODV BASED WIRELESS AD HOC NETWORKTWIN-NODE NEIGHBOUR ATTACK ON AODV BASED WIRELESS AD HOC NETWORK
TWIN-NODE NEIGHBOUR ATTACK ON AODV BASED WIRELESS AD HOC NETWORK
 
Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc Network
Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc NetworkTwin-Node Neighbour Attack on AODV based Wireless Ad Hoc Network
Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc Network
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
K1803036872
K1803036872K1803036872
K1803036872
 
1716 1719
1716 17191716 1719
1716 1719
 
1716 1719
1716 17191716 1719
1716 1719
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 DOI : 10.5121/ijnsa.2011.3612 161 PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE Hemraj Sainia1 , T. C. Panda2 , Minaketan Panda3 1 Department of Computer Science & engineering, Alwar Institute of Engineering & Technology, India hemraj1977@yahoo.co.in 2 Department of Applied Mathematics, Orissa Engineering College, Bhubaneswar, Orissa, India tc_panda@yahoo.com 3 Engineer, Presales & Planning, SPANCO TELE, Chandigarh, India tominaketa@gmail.com ABSTRACT The paper envisages defense of critical information used in Computer Networks those are using Network Topologies such as Star Topology. The first part of the paper develops a model to predict the malicious traffic from the incoming traffic by using Black Scholes Equations. MATLAB is used to simulate the developed model for realistic values. However, the second part of the problem provides a framework for the treatment of predicted malicious traffic with detailed discussion of security measures. KEYWORDS Malicious Object, Black Scholes Equations, Star Topology, Anti Malicious Objects, System Hardening, Friendly-Cooperative Framework 1. INTRODUCTION Models for malicious object propagation in the computer networks are well discussed in literature [1, 2, 3, 4, 5] but its propagation in network topology [6, 7, 8] is not adequately documented. Network topology plays an important role for various factors such as speed of propagation, server management, band width usage etc. Hence, before deciding the malicious object’s dynamics, the network topology must be considered. The paper uses star topology [9] for deciding the dynamics of malicious objects as it is widely used network topology. A star topology is depicted in figure-1 where the server is centrally located and connected with the outer world through ISP. The incoming traffic from ISP having malicious objects and may enter into the network and destroy the network or steal the information. The work presented in the paper predicts the malicious traffic by using the Black Scholes Equations [10, 11], which are the most widely used equations to predict the portfolio of financial market. Cyber Attacks are totally analogous to financial market. The uncertainty of the option price in the financial market is similar to the uncertainty of the cyber attacks. Other feature such as input to the financial market is similar to number of cyber attackers, pattern of change of option price is similar to the change in the rate of malicious objects, and the effect of strike price is compatible to the effect of Anti Malicious Software (AMS) [12, 13] i.e. number of malicious objects already restricted by the AMS. In addition, the
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 change in option price is affected by multi factors similar to the number of incoming malicious objects in the cyber world and these are uncertain for every attack. The predicted malicious traffic is isolated and cured by security measures and then again put in to the regular traffic. In addition the information about the malicious traffic is parallelly transferred to all the connected nodes so that they can make themselves self [14, 15] enough to face the attack by using the friendly In addition to Introduction, the paper envisages model formulation as section friendly cooperative framework for processing the malicious information as section finally the conclusion and future direction to the work as section 2. MODEL FORMULATION The normal functioning of the server ensures the smoothness and malicious objects free environment of the network as far as star topology is concerned. If the server gets down then all the nodes or clients will also remain in idle condition, and as such cannot communicate each other as well as with the outer world. Hence, sever is the only gateway for the communication. The incoming traffic is in the form of packets with destination address. The server receives the packets first and diverts the packets to the nodes as shown in the figure International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 change in option price is affected by multi factors similar to the number of incoming malicious objects in the cyber world and these are uncertain for every attack. The predicted malicious traffic is isolated and cured by security measures and then n put in to the regular traffic. In addition the information about the malicious traffic is parallelly transferred to all the connected nodes so that they can make themselves self [14, 15] enough to face the attack by using the friendly-cooperative-framework. In addition to Introduction, the paper envisages model formulation as section friendly cooperative framework for processing the malicious information as section finally the conclusion and future direction to the work as section-IV. Figure-1: Star Topology ORMULATION The normal functioning of the server ensures the smoothness and malicious objects free environment of the network as far as star topology is concerned. If the server gets down then all also remain in idle condition, and as such cannot communicate each other as well as with the outer world. Hence, sever is the only gateway for the communication. The incoming traffic is in the form of packets with destination address. The server he packets first and diverts the packets to the nodes as shown in the figure-2. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 162 change in option price is affected by multi factors similar to the number of incoming malicious The predicted malicious traffic is isolated and cured by security measures and then n put in to the regular traffic. In addition the information about the malicious traffic is parallelly transferred to all the connected nodes so that they can make themselves self-harden In addition to Introduction, the paper envisages model formulation as section-II, friendly cooperative framework for processing the malicious information as section-III and The normal functioning of the server ensures the smoothness and malicious objects free environment of the network as far as star topology is concerned. If the server gets down then all also remain in idle condition, and as such cannot communicate each other as well as with the outer world. Hence, sever is the only gateway for the communication. The incoming traffic is in the form of packets with destination address. The server 2.
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 Figure Packet-1 is broadcasted to all the nodes after it is received by the server. The concern node accepts it and other discard. By suspected traffic and can take security measures. Signature based methods are the most widely used methods to identify the malicious traffic. But if signature database is not having the signature of incoming traffic then it cannot be detected. In such a situation we have to use some of predictable approach, in our case we are using the Black Scholes equations to predict the malicious traffic. Let number of incoming packets at any instance t are N, from whic may be a malicious packet. The connection from star network to its ISP is continuous and so the packets are continuously transmitting to and fro. Let the traffic is coming with malicious and second non-malicious, so, we assume that the probability of being malicious is p and non-malicious is q, p + q=1. For n spans of time objects are to be find is given by t n t= ∆ So, the number of total malicious/non 1 2 3( ) ...x t z z z z= + + + + Where, iz (I = 1, 2, …, n) is the number of malicious/non The expectation of total traffic is as under 1 2 3( ( )) ( ) ( ) ( ) ... ( )E x t E z E z E z E z= + + + + Where, ( )iE z represents the ith time span expectation of being either malicious/ malicious. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 Figure-2: Packet transferring in star Topology 1 is broadcasted to all the nodes after it is received by the server. The concern node accepts it and other discard. By analyzing the traffic pattern one can separate the suspected traffic and can take security measures. Signature based methods are the most widely used methods to identify the malicious traffic. But if signature database is not having the ng traffic then it cannot be detected. In such a situation we have to use some of predictable approach, in our case we are using the Black Scholes equations to predict the Let number of incoming packets at any instance t are N, from which any random packet may be a malicious packet. The connection from star network to its ISP is continuous and so the packets are continuously transmitting to and fro. Let the traffic is coming with /x t∆ ∆ speed. As the traffic is having two parts, one is malicious, so, we assume that the probability of being malicious is p malicious is q, p + q=1. For n spans of time t∆ , the total time of which the ma objects are to be find is given by- So, the number of total malicious/non-malicious objects in time t is ( )x t and given by ( ) ... nx t z z z z= + + + + (I = 1, 2, …, n) is the number of malicious/non-malicious objects. The expectation of total traffic is as under- 1 2 3( ( )) ( ) ( ) ( ) ... ( )nE x t E z E z E z E z= + + + + represents the ith time span expectation of being either malicious/ International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 163 1 is broadcasted to all the nodes after it is received by the server. The concern analyzing the traffic pattern one can separate the suspected traffic and can take security measures. Signature based methods are the most widely used methods to identify the malicious traffic. But if signature database is not having the ng traffic then it cannot be detected. In such a situation we have to use some of predictable approach, in our case we are using the Black Scholes equations to predict the h any random packet may be a malicious packet. The connection from star network to its ISP is continuous and so speed. As the traffic is having two parts, one is malicious, so, we assume that the probability of being malicious is p , the total time of which the malicious (a) and given by- (1) (2) represents the ith time span expectation of being either malicious/non-
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 164 Above equation (2) can be rewritten as- 1 ( ( )) n i i i E x t p x = = ∑ (3) Now, ( )iE z will be given by- ( ) ( ) ( )iE z p x q x= ∆ + − ∆ ( )p q x= − ∆ (4) Where, i=1, 2, …, n so, equation-(3) can be expended by using equation-(4) as follows- ( ( )) ( ) ( ) ... ( )E x t p q x p q x p q x− − ∆ + − ∆ + + − ∆ ( ( )) ( )E x t n p q x= − ∆ (5) The variance of the traffic is calculated as follows, which represents the behavior of traffic of being malicious/non-malicious. 2 2 2 ( ) ( ( )) ( ( ))Var x E x E xσ= = − (6) Equation-(6) leads that 2 2 ( ) ( ( )) ( ( ))i i iVar z E z E z= − 2 2 2 ( ) ( ( ) (( ) )p x q x p q x= ∆ + − ∆ − − ∆ 2 4 ( )pq x= ∆ 0 0 ( ) ( ) n n i i i i Var x Var x = = =∑ ∑ Or 2 ( ( )) 4 ( )Var x t npq x= ∆ (7) Equation-(5) represents the instantaneous expectation. Now, 0 ( ) inst t p q x E Limit t ∆ → − ∆ = ∆ (8) Thus from equation-(a) and equation-(8) we have-
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 165 ( ) ( ( )) .t o t o t p q Limit E x t Limit t t µ∆ → ∆ → − = = ∆ (9) as the traffic is continuous to the network. Similarly the instantaneous variance can be given as under- 2 2 0 4 ( ) t pq x Limit t σ ∆ → ∆ = ∆ or 2 2 0( ( )) 4. . ( )t t Var x t Limit pq x t t σ∆ →= ∆ = ∆ (10) Initially there are no malicious objects in the network and the possibility of malicious objects in the further independently incremented time span does not depend on each other. In addition we assuming that the value of malicious objects at time t i.e. ( )x t follows normal distribution [16] with mean .tµ or 2 tσ , which are derived in equation-(9) and equation –(10) separately. In other words, the variable ( )x t is a stochastic process with respect to time t. Now, the traffic is continuous and represented by Standard Normal distribution, which is given by- ( )x t t t µ σ − Φ = (11) Φ is a Standard Normal Distribution with mean zero and variance one i.e. ( ) 0E Φ = and ( ) 0Var Φ = So, from equation-(11)- ( )x t t tµ σ= + Φ ( ) ( ) ( )x t t tµ σω⇒ = + (12) If 0µ = and 1σ = then ( ) ( )x t tω= , where, ( )tω is a wiener’s process. Now, as ( )x t , the number of malicious objects in time t, is a stochastic process and hence ( )x t is said to follow a Geometric Brownian Motion (GBM) [17], which satisfies the following stochastic deferential equation- ( ) ( ) ( ( ))dx t x t dt x t dµ σ ω= + (13)
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 166 Additionally, the stochastic process ( )x t is an ITO-Process and satisfies the below equation- ( ) ( ( ), ) ( ( ), )dx t x t t dt x t t dµ σ ω= + (14) Now, the evolution of malicious objects in the network traffic follows GBM in a long normal distribution form i.e. the deviation in general behavior is very less within the range say, 5%± . The change of the incoming malicious objects in the short period of the computation of the number of incoming malicious objects in the traffic is almost constant. There is no extra load of malicious objects in the system as the AMS is running to overcome of it. By above conclusions, we can say the number of malicious objects represented by ( , )V S t where, S is a stochastic process [18] which represents the last counted number of malicious objects. Let present time is t and the number of malicious objects in the network is π which is given by- sV ∆−=π , (15) Where V is the maximum possible value of ( , )V S t and s∆ is the small value changed in the number of malicious objects. After time period dt the number of malicious objects will be increased by dπ and becomes dπ π+ i.e. ( )d V s dπ π π+ = − ∆ + ( ) ( )V dV s ds= + − ∆ + (16) The change in the value of the number of malicious objects in time dt is πd and given by- ( )d dπ π π π= + − (17) By equation (15) to (16)- d dV dsπ = − ∆ (18) Since V satisfies GBM. Hence by ITO’s lemma is-
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 167 2 2 2 2 1 2 V V V V dV s s t sdx t s s s σ µ σ σ  ∂ ∂ ∂ ∂ = + + ∂ +  ∂ ∂ ∂  (19) The solution of equation – (19) can be obtained by the following process:- Let there are k time spans of duration tδ in the total time T to compute the total number of malicious objects and the Malicious Object Updating (MOU) Step as sδ such that T t k δ = , iS s I δ = , where 0 i I≤ ≤ . So, we can get the solution to obtain the number of malicious objects, ( , ) k i k iV S t V≡ for the already identified malicious objects by AMS, iS and for kth time span of the total time, where 0 i I≤ ≤ & 0 k K≤ ≤ , which can be obtained by the following equation-(20). 1 2 2 1 1 2 1 1 21 2 ( ) 0 2 k k k k k i i i i i i k k ki i i i V V V V V S t s V V S V s σ δ δ µ µ δ + + − + −  − − + + +     − − =    (20) Where i=1, 2, …, I-1 and k=0, 1, 2, …., K-1 1 1 1 k k k k i i i i i i iV AV BV CV+ − += + + (21) Where ,i iA B and iC are constants given by following equation-(22). 2 2 2 2 2 2 ; ; 2 i i i T A I I K K T I T B K T C I I K σ µ σ µ σ µ  = −   − − =      = +  (22) 3. DEFENDING MECHANISM Figure-3 shows the MATLAB simulation of the equation-(20) for the number of malicious objects already identified by AMS as 10.
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 Figure-3: Relation among s, S and t Figure-4: Traffic analysis algorithm International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 168
  • 9. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 As soon as the prediction of the number of malicious objects increases by a threshold value, the traffic becomes the suspected one and may be isolated either to ign the security measures over it as shown in the figure The threshold value used in figure represents the maximum number of malicious objects counted at any moment where it goes up from the maximum number of malicious objects already blocked by AMS. 4. FRIENDLY COOPERATIVE MALICIOUS INFORMATION As the suspected traffic is isolated for its diagnostic purpose and once it got a confirmation to be the malicious then its s connected nodes. This information is communicated by using friendly cooperative framework as shown in figure-5. Figure-5: Friendly cooperative framework for information transfer to all directly 5. CONCLUSION AND FUTURE The Black Scholes equations are used to predict the behavior of network traffic and the simulation for already identified malicious objects by AMS at a specific time interval is made, which is more realistic in the real time scenario. On the basis of simulated results a proposal is provided to identify the traffic in which the possibility of the number of malicious objects is beyond a threshold value and will be thus termed as suspected traffic. This suspect then treated through security measures to make it a regular traffic. In addition, a framework is also provided to propagate the generated malicious information to all the directly connected nodes or friendly nodes. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 As soon as the prediction of the number of malicious objects increases by a threshold value, the traffic becomes the suspected one and may be isolated either to ignore or to deploy the security measures over it as shown in the figure-4. The threshold value used in figure-4 can be easily computed from the figure represents the maximum number of malicious objects counted at any moment where it goes up ximum number of malicious objects already blocked by AMS. OOPERATIVE FRAMEWORK FOR PROCESSING THE NFORMATION As the suspected traffic is isolated for its diagnostic purpose and once it got a confirmation to be the malicious then its signature and source has to be spread to all the connected nodes. This information is communicated by using friendly cooperative framework 5: Friendly cooperative framework for information transfer to all directly connected nodes. UTURE DIRECTION TO THE WORK The Black Scholes equations are used to predict the behavior of network traffic and the simulation for already identified malicious objects by AMS at a specific time interval is made, c in the real time scenario. On the basis of simulated results a proposal is provided to identify the traffic in which the possibility of the number of malicious objects is beyond a threshold value and will be thus termed as suspected traffic. This suspected traffic is then treated through security measures to make it a regular traffic. In addition, a framework is also provided to propagate the generated malicious information to all the directly connected International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 169 As soon as the prediction of the number of malicious objects increases by a threshold ore or to deploy 4 can be easily computed from the figure-3. It represents the maximum number of malicious objects counted at any moment where it goes up ROCESSING THE As the suspected traffic is isolated for its diagnostic purpose and once it got a ignature and source has to be spread to all the connected nodes. This information is communicated by using friendly cooperative framework 5: Friendly cooperative framework for information transfer to all directly The Black Scholes equations are used to predict the behavior of network traffic and the simulation for already identified malicious objects by AMS at a specific time interval is made, c in the real time scenario. On the basis of simulated results a proposal is provided to identify the traffic in which the possibility of the number of malicious objects is ed traffic is then treated through security measures to make it a regular traffic. In addition, a framework is also provided to propagate the generated malicious information to all the directly connected
  • 10. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 170 References [1] Ossama A. Toutonji, Seong-Moo Yoo, and Moongyu Park (2010), “Propagation modeling and analysis of network worm attack”, In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10), ACM, New York, NY, USA, , Article 48, 4 pages. DOI=10.1145/1852666.1852719 http://doi.acm.org/10.1145/18526661852719 [2] T. R. Tidwell, K. Fitch Larson, J. Hale (2001), “Modeling Internet Attacks”, Proceedings of the IEEE Workshop on Information Assurance and Security, Unites States Military Academy, West Point, NY. [3] Hemraj Saini, Dinesh Saini (2007), “Malicious Object dynamics in the presence of Anti Malicious Software”, European Journal of Scientific Research, volume-18, Issue-3, pp.-491-499 [4] Hemraj Saini (2009), “Queuing Model for Malicious Attack Detection”, The Icfai University Journal of Information Technology, 5(2) 16-28 [5] Hemraj Saini, Dinesh Saini (2008), “VAIN: A Stochastic Model for Dynamics of Malicious Objects”, ICFAI journal of Systems Management, Vol. 6, No. 1, pp. 14-28 [6] Jean Wairand (1998), “Communication Networks (A first Course”), Second Edition, WCB/McGraw Hill. [7] Behrouz, Forouzan (2001), “Introduction to Data Communication and Networking”, 2nd Edition, TMH. [8] Andrew S Tanenbaum, Computer Networks, 4th , (2002), Prentice Hall PTR. [9] FitzGerald, Jerry, Alan Dennis (1999), “Business Data Communications and Networking”, 6th ed., New York: John Wiley & Sons. [10] R. Company, E. Navarro, J. Ramón Pintos, E. Ponsoda (2008), “Numerical solution of linear and nonlinear Black-Scholes option pricing equations” Comput. Math. Appl., 56, 3 813-821. DOI= http://dx.doi.org/10.1016/j.camwa.2008. 02.010 [11] G. Barles, H. M. Soner (1998), “Option pricing with transaction costs and a nonlinear Black- Scholes equation”. Finance Stochast., v2. 369-397. [12] K. Lakkaraju, and A. Slagell (2008), “Evaluating the utility of anonymized network traces for intrusion detection”, In Proceedings of the 4th international Conference on Security and Privacy in Communication Netowrks (Istanbul, Turkey, September 22 - 25. SecureComm '08. ACM, New York, NY, 1-8. DOI= http://doi.acm.org /10.1145/1460877.1460899 [13] Nick Clemente (2007), “System Hardening The Process of Defending and Securing Today's Information Systems”, Journal of Security Education, 2(4) 89 – 118 [14] Hemraj Saini, Dinesh Kumar Saini (2007), “Proactive cyber Defense and Reconfigurable Framework of Cyber Security”, International journal named International Review on Computer and Software, 2(2) 89-97 [15] H. Saini, D. K. Saini (2006), “Cyber Defense Architecture in Campus Wide Network”, 3rd International Conference on Quality, Reliability and INFOCOM Technology (Trends and Future), Indian National Science Academy, New Delhi (INDIA), 2-4 December, Souvenir pp. 62 [16] M. G. Kendall, A. Stuart (1977), “The advanced theory of statistics”, Griffin. [17] A. Borodin, P. Salminen (2002), Handbook of Brownian Motion - Facts and Formulae, 2nd Edn., Birkhauser Verlag. [18] L. Arnold (1974), “Stochastic differential equations”, Wiley (Translated from Russian).
  • 11. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 Hemraj Saini is a faculty member in the Department of Computer Science & Engineering, Alwar Institute of Engineering & Technology, Alwar, He received his B.Tech. in CS&E from NIT Hamirpur (H.P.) and M.Tech. degree in Information Technology from the Pun respectively. He has submitted his Ph.D. in Utkal University, Vani Vihar, Bhubaneswar. His main professional interests are in Mathematical Modeling, Simulation, Cyber Defense, Network Security and Intelligen T. C. Panda is a Retd. Professor of Mathematics (Berhampur University, India), Founder Professor of Mathematics & Computer Sc. (Mizoram Central University, India) and currently associated as Principal with Orissa Engineering College, Bhubaneswar, Orissa, India-752050. He received his Masters from Banaras Hindu University in 1968 and Ph. D. from Berhampur University in 1975. His main interests are Fluid Dynamics, Air Pollution Modeling, Monsoon Dynamics, Numerical Weather Prediction, Meso-Scale Modeling, Remote Sensing Techniques, Numerical Solution of Partial Differential Equations and Cyber Defense. Minaketan Panda is an Engineer SPANCO received his B.Tech. in E&TCE from ABIT, Cuttack (Orissa.) and M.Tech. Computer Science & Engineering from the IIIT, Bhubaneswar, Orissa in 2005 and 2009 respectively. His main professional interests are in Networking, Enterprise Resource Planning, mobile Computing, Cyber Defense, Network Security and Intelligent Techniques. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 is a faculty member in the Department of Computer Science & Alwar Institute of Engineering & Technology, Alwar, India – 752050. He received his B.Tech. in CS&E from NIT Hamirpur (H.P.) and M.Tech. degree in Information Technology from the Punjabi University Patiala, Punjab in 1999 and 2005 respectively. He has submitted his Ph.D. in Utkal University, Vani Vihar, Bhubaneswar. His main professional interests are in Mathematical Modeling, Simulation, Cyber Defense, Network Security and Intelligent Techniques a Retd. Professor of Mathematics (Berhampur University, India), Founder Professor of Mathematics & Computer Sc. (Mizoram Central University, India) and currently associated as Principal with Orissa Engineering College, 752050. He received his Masters from Banaras Hindu University in 1968 and Ph. D. from Berhampur University in 1975. His main interests are Fluid Dynamics, Air Pollution Modeling, Monsoon Dynamics, Numerical Weather le Modeling, Remote Sensing Techniques, Numerical Solution of Partial Differential Equations and Cyber Defense. is an Engineer SPANCO-TELE, a multinational company. He received his B.Tech. in E&TCE from ABIT, Cuttack (Orissa.) and M.Tech. degree in Computer Science & Engineering from the IIIT, Bhubaneswar, Orissa in 2005 and 2009 respectively. His main professional interests are in Networking, Enterprise Resource Planning, mobile Computing, Cyber Defense, Network Security and International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 171