Modelling Activity of a Malicious User in Computer Networks

نویسندگان

چکیده

Abstract In the present study, an extended classification of Internet users penetrating in computer networks and a definition motivation as psychological emotional state main prerequisites for modelling network intruder’s activity are suggested. A mathematical model quadratic function malicious individual’s behavior impact on based three quantified factors, motivation, satisfaction system protection is developed. Numerical simulation experiments unauthorized access its effect onto carried out. The obtained results graphically illustrated discussed.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Re-wiring Activity of Malicious Networks

This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily involved in nefarious activities on the Internet, were sequentially de-peered by providers before their final cut-off (as occurred in the well-publicized cases of Atrivo/Intercage). We present the first systematic study o...

متن کامل

investigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances

در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...

comparison of catalytic activity of heteropoly compounds in the synthesis of bis(indolyl)alkanes.

heteropoly acids (hpa) and their salts have advantages as catalysts which make them both economically and environmentally attractive, strong br?nsted acidity, exhibiting fast reversible multi-electron redox transformations under rather mild conditions, very high solubility in polar solvents, fairly high thermal stability in the solid states, and efficient oxidizing ability, so that they are imp...

15 صفحه اول

An Assessment of Overt Malicious Activity Manifest in Residential Networks

While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth study. In this paper we present a first step towards an assessment based on monitoring network activity (anonymized for user privacy) of 20,000 residential DSL customers in a European urban area, roughly 1,000 users of...

متن کامل

A user modelling approach to computer based advice generation

The need for intelligent advice, help and tutoring, generated automatically by computers is widely accepted. Recently, efforts to achieve these requirements have focused upon research into user models and improved user-machine interaction. This thesis develops a mechanism for detecting when an individual has a problem with the computer system, and generates hypotheses which describe possible pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybernetics and Information Technologies

سال: 2022

ISSN: ['1311-9702', '1314-4081']

DOI: https://doi.org/10.2478/cait-2022-0018