DOI: 10.4018/IJISP.2019010102 International Journal of Information Security and Privacy Volume 13 • Issue 1 • January-March 2019 Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. 17 Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence Yerra Shankar Rao, Gandhi Institute of Excellent Technocrafts, Deuliapatna, India Prasant Kumar Nayak, C. V. Raman College of Engineering, Mahura, India Hemraj Saini, Jayppe University of Information Technology, Waknaghat, India Tarini Charan Panda, Ravenshaw University, Cuttack, India ABSTRACT This article describes a highly infected e-epidemic model in a computer network. This article establishes the Basic reproduction number R0, which explicitly brings out the stability conditions. Further, the article shows that if R0< 1 then the infected nodes ceases the spreading of malicious code in computer network as it dies down and consequently establishes the asymptotically stable, when R0> 1, the alternative aspect is that infected nodes stretch out into the network and becomes asymptotically unstable. The pivotal, impact of quarantine node on e-epidemic models has been verified along with its control strategy for a high infected computer network. In the MATLAB simulation, the quarantine class shows its explicit relationship with respect to high as well as low infected class, exposed class, and finally, with recovery class in order to yield increasing safety measures on transmission of malicious codes. KeywORDS Basic Reproduction Number, Computer Network, E-Epidemic Model, Quarantine, Stability Condition INTRODUCTION Presently a day, number of internet users has increased rapidly and around 41% of the world population are using internet today. Every internet user knows what malicious code is (popularly called virus) and its impact to computer security. But many of them don’t know how these viruses enter to computer and how they spread in the computer network moreover how long these viruses work in computer system. Answer of first one is that, there are many ways in which a virus can enter in a computer network, such as e-mail attachments, fraud Websites, contaminated boot software, phishing Schemes, pirating activist, social network, etc. In these days many people are busy with social network site for their communication, some popular social network sites are Facebook, twitter, LinkedIn, Google+, and many more. These social network sites are the latest targets of hackers to deliver computer