Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
The Effect of Internet Protocol Addressing Requirement For Scan-based Worms in Multigroup Computer Network Models
ChukwuNonso Henry Nwokoye, Kenneth Obiakor, Ikechukwu Umeh
Pages - 139 - 153 | Revised - 31-08-2020 | Published - 01-10-2020
MORE INFORMATION
KEYWORDS
Computer Network, Worms, IPV6, Epidemic Model, Differential Equations, Cybersecurity.
ABSTRACT
In recent times, epidemic differential equation models have been used to understand the patterns of malicious objects’ propagation in networks. This is necessary since malware attacks on information and communication technology infrastructure have become numerous and threatening to cyberspace. Our study herein posits that older multigroup epidemic computer network models are somewhat not to clear on the type of worm propagated, thereby presenting a generalized conclusions on its behavior. However, it has been observed that the internet protocol (IP) address space has been ignored in several formulations of these models. Therefore, we evaluate the effect of applying the IPV6 address configuration to dthe following models; SI1I2I3RS, S1S2S3IR, E-S1S2I1I2RS and SI1I2RS. This is due to the fact that some worm types (scan-based) either randomly or locally search the address space for vulnerabilities in the network. Using the Runge-Kutta numerical method, we performed numerical simulations in order to highlight existent differences and variations (as time histories and 3 dimensional phase plots) for the presence and absence of the IPV6 address format. The study also showed the impact of the incidence functions used in these epidemic models. Through this study, we were able to present a clear understanding of the dynamics of the computer network, and how IPV6 configuration affect susceptibility and multiple infections (scan-based worms inclusive).
A. N. Ali. "Comparison study between IPV4 & IPV6". International Journal of Computer Science Issues, Vol. 9, pp. 314 - 317, 2012. | |
B. K. Mishra and A. Prajapati. "Dynamic Model on the Transmission of Malicious Codes in Network." I. J. Computer Network and Information Security, vol. 10, pp. 17-23, 2013. | |
B. K. Mishra and D. K. Saini. "Mathematical Models on Computer Viruses". Applied Mathematics and Computation, Vol. 187, pp. 926-936, 2007. | |
B. K. Mishra and D. K. Saini. "SEIRS Epidemic Model with Delay for Transmission of Malicious Objects in Computer Network". Applied Mathematics and Computation, Vol. 188, pp. 1476-1482. 2007. | |
B. K. Mishra and G. M. Ansari. "Differential Epidemic Model of Virus and Worms in Computer Network". International Journal of Network Security, vol.14, pp. 149-155, 2012. | |
B. K. Mishra and N. Jha. "Fixed Period of Temporary Immunity after Run of Anti-Malicious Software on Computer Nodes". Applied Mathematics and Computation, Vol. 190, pp. 1207-1212, 2007. | |
B. K. Mishra and P. K. Nayak. "Epidemic Model for Active Infectious Nodes in Computer Sub-Networks". International Journal of Signal Control and Engineering Applications, vol. 2, pp. 56-60, 2009. | |
B. K. Mishra and S. K. Pandey. "Dynamic Model of Worm Propagation in Computer Network". Applied Mathematical. Modelling, vol. 38, pp. 2173-2179, 2013. | |
B. K. Mishra and S.K. Pandey. "Dynamic Model of Worms with Vertical Transmission in Computer Network." Applied Mathematics and Computation, vol. 217, pp. 8438-8446, 2011. | |
B. K. Mishra, A. K. Singh. "SIjRS E-Epidemic Model With Multiple Groups of Infection In Computer Network". International Journal of Nonlinear Science, vol.13, pp.357-362, 2012. | |
B. K. Mishra, U. Kumar and G. Sahoo. "Fixed Length of Infective Period for Attacking Worms in Computer Network". International Journal of Applied Engineering Research and Development, vol. 2, pp. 19-31, 2012. | |
B. K. Mishra. "Mathematical Model on Attack of Worm and Virus in Computer Network". International Journal of Future Generation Communication and Networking, vol. 9, pp. 245-254, 2016. | |
C. H. Nwokoye and I. Umeh. "Analytic-Agent Cyber Dynamical Systems Analysis and Design Methodology for Modeling Temporal/Spatial Factors of Malware Propagation in Wireless Sensor Networks". MethodsX, vol. 5, pp. 1373-1398, 2018. | |
C. H. Nwokoye and I. Umeh. "The SEIQR-V model: On a More Accurate Analytical Characterization of Malicious Threat Defense". International Journal of Information Technology and Computer Science, vol. 9, No. 12, pp.28-37, 2017. | |
C. H. Nwokoye, C. Umeugoji, I. Umeh. "Evaluating degrees of differential infections on sensor networks' features using the SEjIjR-V epidemic model". Egyptian Computer Science Journal, vol. 44, pp. 86 - 97, 2020. | |
C. H. Nwokoye, I. Umeh and O. Ositanwosu. "Characterization of heterogeneous malware contagions in wireless sensor networks: A case of uniform random distribution." presented at the Proceedings of ICT4SD (ICT Analysis and Applications Vol. 2), India, 2020. | |
C. H. Nwokoye, N. N. Mbeledogu and I. A. Ejimofor, "The Impact of Sensor Area Types on Worm Propagation using SEIR and SEIR-V Models: A Preliminary Investigation". International Journal of Wireless and Microwave Technologies, vol. 7, pp. 33 - 45. 2017. | |
C. H. Nwokoye, N. N. Mbeledogu, I. Umeh and I. A. Ejimofor. "Modeling the Effect of Network Access Control and Sensor Random Distribution on Worm Propagation". International Journal of Modern Education and Computer Science, Vol. 9, pp. 49-57, 2017. | |
C. H. Nwokoye, V. E. Ejiofor and C. G. Ozoegwu, "Pre-Quarantine Approach for Defence against Propagation of Malicious Objects in Networks". International Journal of Computer Network and Information Security, vol. 9, pp. 43 - 52, 2017. | |
C. H. Nwokoye, V. E. Ejiofor, M. Onyesolu and B. Ekechukwu, "Towards Modeling Malicious Agents in Decentralized Wireless Sensor Networks: A Case of Vertical Worm Transmissions and Containment". International Journal of Computer Networks and Information Security, vol.9, pp. 12-21, 2017. | |
C. H. Nwokoye, V. E. Ejiofor, R. Orji, N. N. Mbeledogu and I. Umeh. "Investigating the Effect of Uniform Random Distribution of Nodes in Wireless Sensor Networks using an epidemic worm model". Computing Research and Innovation, Ibadan, Nigeria, 2016. | |
D. K. Saini. "A Mathematical Model for the Effect of Malicious Object on Computer Network Immune System". Applied Mathematical Modelling, vol. 35, pp. 3777-3787, 2011. | |
H. Yuan and G. Chen, "Network Virus Epidemic Model with Point-To-Group Information Propagation". Applied Mathematics and Computation, Vol. 206, No. 3, pp. 357 - 367, 2008. | |
J. R. Piqueira and F. B. Cesar. "Dynamic Models for Computer Virus Propagation." Mathematics Prob. Engineering, vol. 940, pp. 1 - 11, 2008. | |
J. R. Piqueira, B. F. Navarro and L. H. Monteiro. "Epidemiological Models Applied to Virus in Computer Network". Journal of Computer Science, Vol. 1, pp. 31-34, 2005. | |
L. Song, Z. Jin, G. Sun, J. Zhang and X. Han. "Influence of Removable Devices on Computer Worms: Dynamic Analysis and Control Strategies". Computers and Mathematics with Applications, Vol. 61, pp 1823-1829, 2011. | |
M. A. Safi and S. M. Garba. "Global Stability Analysis of SEIR Model with Holling Type II Incidence Function." Journal of Math. Biology, vol. 2012, pp. 1 - 8, 2012. | |
M. Kumara, B. K. Mishra and N. Anwar. "E-epidemic Model on Highly Infectious Nodes in the Computer Network." International Journal of Computer Science & Engineering Technology, vol. 4, pp. 1216-1223, 2013. | |
Piqueira, J. C. and V. O. Araujo. "A Modified Epidemiological Model for Computer Viruses". Applied Mathematics and Computation, vol. 213, pp. 355-360, 2009. | |
V. Chebyshev, F. Sinitsyn, D. Parinov, B. Larin, O. Kupreev and E. Lopatin. "IT threat evolution Q2 2019 Statistics." 2019. https://securelist.com/it-threat-evolution-q2-2019-statistics/92053/ [Jul. 30, 2020]. | |
Y. Wang, S. Wen, Y. Xiang, and W. Zhou. "Modeling the Propagation of Worms in Networks: A Survey." IEEE Communications Surveys & Tutorials, Vol. 16, No. 2, pp. 942 - 960, 2014. | |
Dr. ChukwuNonso Henry Nwokoye
Open Studies Unit,
Nigeria Correctional Service,
Awka - Nigeria
chinonsonwokoye@gmail.com
Mr. Kenneth Obiakor
Department of Pharmaceutical and Medicinal Chemistry,
Nnamdi Azikiwe University,
Awka - Nigeria
Mr. Ikechukwu Umeh
Department of Computer Science,
Nnamdi Azikiwe University,
Awka - Nigeria
|
|
|
|
View all special issues >> | |
|
|