International Journal of Computer Applications (0975 – 8887) Volume 99– No.1, August 2014 30 Modeling and Minimization of Cyber Attacks through Optimization Technique Narander Kumar, Rashmi Singh and Vipin Saxena Department of Computer Science Babasaheb Bhimrao Ambedkar University Lucknow (U.P.),226025, India ABSTRACT In the daily routine work on the internet, the people are using the services like email, money transfer, accessing of web pages, social networking, downloads, communication on network, etc. Hackers are hacking the web pages, emails, etc which are reported in the cyber police station. The present work is based upon the cyber attacks in the Indian scenario and different cyber attacks have been identified and these attacks are optimized by applying a well known optimization technique known as Hungarian method which is based upon that the number of person are affected with minimization losses delete. A well known Unified Modeling Language (UML) modeling is also used to design the UML activity model which is validated through a Finite State Machine (FSM) technique and observed that the proposed method is optimized method for getting minimum losses across the network which is based upon distributed computing network. Keywords Modeling, Cyber Attacks, Hungarian, Optimization, UML and FSM 1. RELATED WORK In the present paper, a well known Platform Independent language is used to construct various UML models. UML stands for Unified Modeling Language and invented by Booch et al. [1-2]. They described all the important diagrams related to static and dynamic representation of the research problem. OMG [3-4] is the Object Management Group who has released various versions of UML. The modeling is necessary for representing the research problem in the pictorial way and thereafter coder develops the code for the proposed model. Since, the present work is related to the Cyber Security models therefore let us describe some important contribution done by the researchers in these field. Communal Analysis Suspicion Scoring (CASS) for generating numeric suspicion scores are well described by Phua et al.[5] for the streaming of the credit card applications. Baber et al.[6] stated that computer conditions(tablets and computers) lead to faster performance when compared with paper conditions while there was no difference in content and quality of reports. Cetin et al.[7] described the recent developments in technology used by youngsters which are increasingly creating environments in which students can exhibit bullying behaviors in schools via electronic devices. Cyber bullying and Cyber victim can be used as scale for determining the level of exposure to or exhibiting cyber bullying behaviors among students in high school. Daman and Ozecilik[8] described a novel combination of the two well known meta heuristic approaches, namely the Genetic algorithm and the Scatter search which can be applied to improve the credit card fraud detection solution. Jamieson et al.[9] described a deep understanding of identification of crime by using the concept of hierarchical classes and explained clear structure for crime management. All these are defined as per the current status of law and proposed a solution for the minimization of the crime. Solms and Niekerk[10] described that Information security is the protection of information, which is an asset, from possible harm resulting from various threats and vulnerabilities. Cyber security, on the other hand, is not necessarily only the protection of cyberspace, but also the protection of these function in cyberspace and any of their assets that can be reached via cyberspace. Tehrane et al. [11] described Cyber terrorism is a transnational crime; it should be subjected to universal jurisdiction through multinational cooperation. The most suitable method to counter future transnational crimes such as cyber terrorism is universal jurisdiction. Maskun et al. [12] stated that Internet has become a global phenomenon; numerous advantages and disadvantages (crimes) which are being gotten and committed through the internet. To cope with both advantages and disadvantages, cyber security is needed to guarantee people to use internet safely. The present work is based upon the identification of the major cyber attacks which are faced by the users in the daily routine work and losses due to attacks are computed and thereafter an optimization technique is used for the minimization of the losses. UML is also used for a model based on the minimization of the losses and the model is also validated through the FSM technique. 2. UML MODELING A UML activity diagram is designed for the minimization of individual loss to the department and also consolidated loss to the organization. The steps involved for the minimization of losses are summarized below: Step 1: Identify the types of page which should fit within a rectangle of Cyber Attacks & let us consider there are N; Step 2: Categorize and fix the Priority of Cyber attacks which can be minimized for loss i.e. arrange in the decreasing order which shows that the maximum loss shall be minimized first; Step 3: If the prioritized losses are already minimized then go to step 1 else follow the next step 4; Step 4: Compute % loss to the user; Step 5: Design a matrix of N*N order where N is the different types of Cyber Attacks;