Skip to main content

Cyber Attack and Control Techniques

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 339))

Abstract

We have developed an Susceptible-Exposed-Infectious-Undetected-Recovered (SEIUR) model. The main feature of this model is the introduction of undetected class. This class is introduced due to the use of un-updated version of antivirus. Optimal control technique is one of the most efficient techniques to plan strategies for better implementation of resources. We have formulated the model and also developed some theoretical results supported by numerical simulation for implementation of control variable in the model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Mishra, B.K., Pandey, K.: Dynamic model of worm propagation in computer network. Appl. Math. Model. Elsevier 38, 2173–2179 (2014)

    Article  MathSciNet  Google Scholar 

  2. Mishra, B.K., Prajapati, A.: Dynamic model on the transmission of malicious codes in network, I. J. Comput. Netw. Inf. Secur. 10, 17–23 (2013)

    Google Scholar 

  3. Wang, F., Zhang, Y., Wang, C., Ma, J., Moon, S.: Stability analysis of SEIQV epidemic model for rapid spreading worms. Comput. Secur. 29(4), 410–418 (2010)

    Article  Google Scholar 

  4. Huang, C.Y., Sun, C.T.: Effect of resource limitation and cost influence on computer virus epidemic dynamics and tipping point. Article id-473136, Hindawi. Interf. 2(4), 295–307 (2012)

    Google Scholar 

  5. Sadiq, S.F., Khan, M.A., Islam S., Zaman, G., Jung, H., Khan, S.K.: Optimal control of an epidemic model of leptospirosis with nonlinear saturated incidences. Annu. Res. Rev. Biol. 4(3), 560–576 (2014)

    Google Scholar 

  6. Laarabi, H., Rachik, M., Kahlaoui, O.E., Labriji, E.H.: Optimal vaccination strategies of an sir epidemic model with a saturated treatment. Univ. J. Appl. Math. 1(3), 185–191 (2013)

    Google Scholar 

  7. Ullah, R., Zaman, G., Islam, S., Ahmad, I.: Dynamical features and vaccination strategies in an SEIR epidemic model. Res. J. Recent Sci. Int. Sci. Congr. Assoc. 2(10), 48–56 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Apeksha Prajapati .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Prajapati, A., Mishra, B.K. (2015). Cyber Attack and Control Techniques. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 339. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2250-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2250-7_16

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2249-1

  • Online ISBN: 978-81-322-2250-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics