CFP last date
20 May 2024
Reseach Article

Article:Dynamics for Proactive Defense through Self-hardening in the Presence or Absence of Anti Malicious Software

by Hemraj Saini, T. C. Panda, Bimal Kumar Mishra, Minaketan Panda
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 14
Year of Publication: 2010
Authors: Hemraj Saini, T. C. Panda, Bimal Kumar Mishra, Minaketan Panda
10.5120/296-460

Hemraj Saini, T. C. Panda, Bimal Kumar Mishra, Minaketan Panda . Article:Dynamics for Proactive Defense through Self-hardening in the Presence or Absence of Anti Malicious Software. International Journal of Computer Applications. 1, 14 ( February 2010), 76-80. DOI=10.5120/296-460

@article{ 10.5120/296-460,
author = { Hemraj Saini, T. C. Panda, Bimal Kumar Mishra, Minaketan Panda },
title = { Article:Dynamics for Proactive Defense through Self-hardening in the Presence or Absence of Anti Malicious Software },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 14 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 76-80 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number14/296-460/ },
doi = { 10.5120/296-460 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:42:15.161845+05:30
%A Hemraj Saini
%A T. C. Panda
%A Bimal Kumar Mishra
%A Minaketan Panda
%T Article:Dynamics for Proactive Defense through Self-hardening in the Presence or Absence of Anti Malicious Software
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 14
%P 76-80
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In computer networks, the computers can be categorized into two categories, one is susceptible or healthy and another is infected. The susceptible computers can have the Anti Malicious Software (AMS) or can not have to protect themselves from the malicious objects. In addition they can have a costly action to self-harden themselves against the malicious objects for proactive defense. The utility cost of being susceptible or infected is the major concern of this paper. The paper considers the role of AMS and the self-hardening action to find out the lifetime utility of a computer. This lifetime utility is beneficial to take the decision, whether the self-hardening/AMS has to be implemented in the computer network or not as it is costly action to protect the computer network from malicious objects.

References
  1. Bimal Kumar Mishra, Dinesh Saini (2007), “Mathematical models on computer viruses”, Applied Mathematics and Computation 187 (2007) 929–936
  2. Bimal Kumar Mishra, Dinesh Kumar Saini (2007), “SEIRS epidemic model with delay for transmission of malicious objects in computer network”, Applied Mathematics and Computation 188 (2007) 1476–1482
  3. Hemraj Saini, Dinesh Kumar Saini (2007), “Malicious Objects Dynamics in the presence of Anti Malicious Objects”, European Journal of Scientific Research 18(3) 491-499
  4. Hemraj Saini (2009), “Queuing Model for Malicious Attack Detection” , The Icfai University Journal of Information Technology 5(2) 16-28
  5. Hemraj Saini, Dinesh Kumar Saini (2008),” VAIN: A Stochastic Model for Dynamics of Malicious Objects” ICFAI journal of Systems Management 6(1) 14-28
  6. Lakkaraju, K. and Slagell, A. (2008), “Evaluating the utility of anonymized network traces for intrusion detection”, In Proceedings of the 4th international Conference on Security and Privacy in Communication Netowrks (Istanbul, Turkey, September 22 - 25, 2008). SecureComm '08. ACM, New York, NY, 1-8. DOI= http://doi.acm.org/10.1145/1460877.1460899
  7. Michèle Cohen (2004), “Security level, potential level, expected utility: A three-criteria decision model under risk”, Theory and Decision, Springer Netherlands 33(2) 101-134
  8. Hemraj Saini, Dinesh Kumar Saini (2007), “Proactive cyber Defense and Reconfigurable Framework of Cyber Security”, International journal named International Review on Computer and Software, 2(2) 89-97
  9. Hemraj Saini, Dinesh Kumar Saini (2006), “CYBER DEFENSE ARCHITECTURE IN CAMPUS WIDE NETWORK”, 3rd International Conference on Quality, Reliability and INFOCOM Technology (Trends and Future), Indian National Science Academy, New Delhi (INDIA), 2-4 December, 2006. Souvenir pp. 62
  10. Nick Clemente (2007), “System Hardening The Process of Defending and Securing Today's Information Systems”, Journal of Security Education, 2(4) 89 – 118
  11. Yasuda, K. Kanazawa, T. (2003), “Proximate optimality principle based Tabu Search”, Systems, Man and Cybernetics, 2003. IEEE International Conference on, vol.-2 1560- 1565
  12. Ross, S.: Introduction to Stochastic Dynamic Programming. Academic Press, New York(1983)
Index Terms

Computer Science
Information Sciences

Keywords

Malicious Objects Anti Malicious Objects System Hardening Computer Utility Prevalence