DOI: 10.4018/IJISP.2019010102
International Journal of Information Security and Privacy
Volume 13 • Issue 1 • January-March 2019
Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
17
Behavioral Modeling of Malicious
Objects in a Highly Infected Network
Under Quarantine Defence
Yerra Shankar Rao, Gandhi Institute of Excellent Technocrafts, Deuliapatna, India
Prasant Kumar Nayak, C. V. Raman College of Engineering, Mahura, India
Hemraj Saini, Jayppe University of Information Technology, Waknaghat, India
Tarini Charan Panda, Ravenshaw University, Cuttack, India
ABSTRACT
This article describes a highly infected e-epidemic model in a computer network. This article
establishes the Basic reproduction number R0, which explicitly brings out the stability conditions.
Further, the article shows that if R0< 1 then the infected nodes ceases the spreading of malicious
code in computer network as it dies down and consequently establishes the asymptotically stable,
when R0> 1, the alternative aspect is that infected nodes stretch out into the network and becomes
asymptotically unstable. The pivotal, impact of quarantine node on e-epidemic models has been verified
along with its control strategy for a high infected computer network. In the MATLAB simulation,
the quarantine class shows its explicit relationship with respect to high as well as low infected
class, exposed class, and finally, with recovery class in order to yield increasing safety measures on
transmission of malicious codes.
KeywORDS
Basic Reproduction Number, Computer Network, E-Epidemic Model, Quarantine, Stability Condition
INTRODUCTION
Presently a day, number of internet users has increased rapidly and around 41% of the world population
are using internet today. Every internet user knows what malicious code is (popularly called virus) and
its impact to computer security. But many of them don’t know how these viruses enter to computer
and how they spread in the computer network moreover how long these viruses work in computer
system. Answer of first one is that, there are many ways in which a virus can enter in a computer
network, such as e-mail attachments, fraud Websites, contaminated boot software, phishing Schemes,
pirating activist, social network, etc. In these days many people are busy with social network site for
their communication, some popular social network sites are Facebook, twitter, LinkedIn, Google+,
and many more. These social network sites are the latest targets of hackers to deliver computer