We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Modeling and Minimization of Cyber Attacks through Optimization Technique

by Narander Kumar, Rashmi Singh, Vipin Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 99 - Number 1
Year of Publication: 2014
Authors: Narander Kumar, Rashmi Singh, Vipin Saxena
10.5120/17339-7471

Narander Kumar, Rashmi Singh, Vipin Saxena . Modeling and Minimization of Cyber Attacks through Optimization Technique. International Journal of Computer Applications. 99, 1 ( August 2014), 30-34. DOI=10.5120/17339-7471

@article{ 10.5120/17339-7471,
author = { Narander Kumar, Rashmi Singh, Vipin Saxena },
title = { Modeling and Minimization of Cyber Attacks through Optimization Technique },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 99 },
number = { 1 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume99/number1/17339-7471/ },
doi = { 10.5120/17339-7471 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:27:04.713157+05:30
%A Narander Kumar
%A Rashmi Singh
%A Vipin Saxena
%T Modeling and Minimization of Cyber Attacks through Optimization Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 99
%N 1
%P 30-34
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the daily routine work on the internet, the people are using the services like email, money transfer, accessing of web pages, social networking, downloads, communication on network, etc. Hackers are hacking the web pages, emails, etc which are reported in the cyber police station. The present work is based upon the cyber attacks in the Indian scenario and different cyber attacks have been identified and these attacks are optimized by applying a well known optimization technique known as Hungarian method which is based upon that the number of person are affected with minimization losses delete. A well known Unified Modeling Language (UML) modeling is also used to design the UML activity model which is validated through a Finite State Machine (FSM) technique and observed that the proposed method is optimized method for getting minimum losses across the network which is based upon distributed computing network.

References
  1. Booch G. , Rambaugh J. , and Jacobson I. , "The Unified Modeling Language User Guide", Twelfth Indian Reprint, Pearson Education, 2004. Strategies.
  2. Booch G. , Rumbaugh J. , and Jacobson I. , "The Unified Modeling Language User Guide", China Machine Press,Beijing, 2006.
  3. OMG, "Unified Modeling Language (UML)-Version1. 5", OMG document formal/2003-3-01, (2003), Needham, MA.
  4. OMG, "Unified Modeling Language Specification", http://www. omg. org (Accessed on 12th Sept. 2012), 1997.
  5. Phua C. , Gayler R. , Lee V. and Miles K. S. , "On the Communal Analysis Suspicion Scoring for Identity Crime in Streaming Credit Applications". An European Journal of Operational Research, Vol. 195, 2009, pp. 595-612.
  6. Baber C. , Smith P. , Bulter M. , Cross J. , and Hunter J. , "Mobile Technology for Crime Scene Examination". An International Journal of Human Computer Studies, Vol. 67, 2009 pp. 464-474.
  7. Cetin B. , Yaman E. , and Peker A. , "Cyber Victim and Bullying Scale : A Study of Validity and Reliability". An International Journal of Computer & Education. Vol. 57, 2011, pp. 2261-2271.
  8. Duman E. and Ozcelik M. H. , "Detecting Credit Card and Fraud by Genetic Algorithm and Scatter Search". An International Journal of Expert Systems with Applications. Vol. 38, 2011, pp. 13057-13063.
  9. Jamieson R. , Land L. P. W. , Winchester D. , Stephens G. , Steel A. , Maurushat A. , and Sarre R. "Addressing Identity Crime in Crime Management Information Systems: Definitions Classification, and Empirics" Computer Law & Security Review. Vol. 28, 2012, pp 381-395.
  10. Solms R. V. and Niekerk J. V. "From Information Security to Cyber Security". Elsevier publication of Computer & Security. Vol. 38, 2013, pp. 97-102.
  11. Tehrani P. M. , Manap N. A. , and Taji H. "Cyber Terrorism Challenges: The Need For A Global Response to A Multi-Jurisdictional Crime. " Elsevier publication of Computer Law &security review. Vol. 29, 2013, pp. 207-215.
  12. Maskun , Manuputty A. , Noor S. M. , and Sumardi J. "Cyber Security: Rule of Use Internet Safely?". Procedia Social and Behavioural Sciences. Vol. 103, 2013, pp. 255-261.
Index Terms

Computer Science
Information Sciences

Keywords

Modeling Cyber Attacks Hungarian Optimization UML and FSM