Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Modeling and Minimization of Cyber Attacks through Optimization Technique

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 99 - Number 1
Year of Publication: 2014
Narander Kumar
Rashmi Singh
Vipin Saxena

Narander Kumar, Rashmi Singh and Vipin Saxena. Article: Modeling and Minimization of Cyber Attacks through Optimization Technique. International Journal of Computer Applications 99(1):30-34, August 2014. Full text available. BibTeX

	author = {Narander Kumar and Rashmi Singh and Vipin Saxena},
	title = {Article: Modeling and Minimization of Cyber Attacks through Optimization Technique},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {99},
	number = {1},
	pages = {30-34},
	month = {August},
	note = {Full text available}


In the daily routine work on the internet, the people are using the services like email, money transfer, accessing of web pages, social networking, downloads, communication on network, etc. Hackers are hacking the web pages, emails, etc which are reported in the cyber police station. The present work is based upon the cyber attacks in the Indian scenario and different cyber attacks have been identified and these attacks are optimized by applying a well known optimization technique known as Hungarian method which is based upon that the number of person are affected with minimization losses delete. A well known Unified Modeling Language (UML) modeling is also used to design the UML activity model which is validated through a Finite State Machine (FSM) technique and observed that the proposed method is optimized method for getting minimum losses across the network which is based upon distributed computing network.


  • Booch G. , Rambaugh J. , and Jacobson I. , "The Unified Modeling Language User Guide", Twelfth Indian Reprint, Pearson Education, 2004. Strategies.
  • Booch G. , Rumbaugh J. , and Jacobson I. , "The Unified Modeling Language User Guide", China Machine Press,Beijing, 2006.
  • OMG, "Unified Modeling Language (UML)-Version1. 5", OMG document formal/2003-3-01, (2003), Needham, MA.
  • OMG, "Unified Modeling Language Specification", http://www. omg. org (Accessed on 12th Sept. 2012), 1997.
  • Phua C. , Gayler R. , Lee V. and Miles K. S. , "On the Communal Analysis Suspicion Scoring for Identity Crime in Streaming Credit Applications". An European Journal of Operational Research, Vol. 195, 2009, pp. 595-612.
  • Baber C. , Smith P. , Bulter M. , Cross J. , and Hunter J. , "Mobile Technology for Crime Scene Examination". An International Journal of Human Computer Studies, Vol. 67, 2009 pp. 464-474.
  • Cetin B. , Yaman E. , and Peker A. , "Cyber Victim and Bullying Scale : A Study of Validity and Reliability". An International Journal of Computer & Education. Vol. 57, 2011, pp. 2261-2271.
  • Duman E. and Ozcelik M. H. , "Detecting Credit Card and Fraud by Genetic Algorithm and Scatter Search". An International Journal of Expert Systems with Applications. Vol. 38, 2011, pp. 13057-13063.
  • Jamieson R. , Land L. P. W. , Winchester D. , Stephens G. , Steel A. , Maurushat A. , and Sarre R. "Addressing Identity Crime in Crime Management Information Systems: Definitions Classification, and Empirics" Computer Law & Security Review. Vol. 28, 2012, pp 381-395.
  • Solms R. V. and Niekerk J. V. "From Information Security to Cyber Security". Elsevier publication of Computer & Security. Vol. 38, 2013, pp. 97-102.
  • Tehrani P. M. , Manap N. A. , and Taji H. "Cyber Terrorism Challenges: The Need For A Global Response to A Multi-Jurisdictional Crime. " Elsevier publication of Computer Law &security review. Vol. 29, 2013, pp. 207-215.
  • Maskun , Manuputty A. , Noor S. M. , and Sumardi J. "Cyber Security: Rule of Use Internet Safely?". Procedia Social and Behavioural Sciences. Vol. 103, 2013, pp. 255-261.