Area Computation of Internet Traffic Share Problem with Special Reference to Cyber Crime Environment

نویسندگان

  • Sharad Gangele
  • Dr. Diwakar Shukla
چکیده

Abstract— Cybercrime is a fast growing area of research, it covers any illegal activity that uses a computer as its primary means of commission. More and more criminals are exploiting the speed, convenience and anonymity of the internet to commit a diverse range of criminal activities. In the same line Naldi (2002) proposed internet traffic share problem in a new look by using markov chain. This model was extended by Shukla, Thakur and Tiwari (2010) by introducing a new cyber crime state .The importance of this state is that user performs cyber crime after successful call connectivity. In this model they developed mathematical relationship between traffic share of cyber criminals and blocking probability of operators. This relationship produces a probability function which exist a definite bounded area. This bounded area contains a lot of network parameters and is required to be estimated. An attempt has been made to analyze such kind of area by using trapezoidal method usually applies in numerical analysis. It is found that this area is inversely proportional to the probability of attraction for cyber crime and other parameter. It supports to elaborate the relationship among traffic share of cyber crime and many network parameters.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach for Area Estimation towards Conjunction Control of Internet Traffic Sharing by Using Simpson 1/3 Rule

In present scenario of research, network congestion is one of the most interesting area. Congestion in internet is a long-standing problem and in modern days internet service providers use congestion control and congestion avoidance techniques to avoid congestion collapse. Internet congestion appears when a large volume of data is being routed on low bandwidth lines or across networks that have...

متن کامل

Fear of Cyber Crime among College Students in the United States: An Exploratory Study

A literature review on fear of crime suggests perceived crime seriousness, perceived risk of victimization, and victimization experience as the three major predictors for fear of crime. In the present study I test these factors on cyber crimes as their relationships with fear of cyber crime are generally unexplored in the literature. Precisely, four cyber crimes are chosen, including online sca...

متن کامل

Two-Call and Rest State Based Internet Traffic Sharing Analysis in Two Market Environment

Internet is the superhighway of information and used as an effective resource for advertising and marketing by the users in daily life. Usually, these kinds of services are managed by service providers. Owing to demands of same kind of services by the users, internet traffic load and traffic share of operators oscillated. Naldi (2002) made a pioneering contribution to the model based internet t...

متن کامل

Cyber Crime based Curve Fitting Analysis in Internet Traffic Sharing in Computer Network

Many well-developed countries are having broadband services for there network connection but under developed countries are still having the dial-up-setup connection network. The cyber crime users are growing fast in the entire world and correspondingly the cyber criminals are also growing. The crime is performed by the users cyber only when the connectivity through internet is made. This paper ...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014