Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/28584
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Falaye, Adeyinka A. | - |
dc.contributor.author | Oluyemi, Etuk Stella | - |
dc.contributor.author | Ale, Seun | - |
dc.contributor.author | Abdullahi, Muhammad Bashir | - |
dc.contributor.author | Uchenna, Ugwuoke Cosmas | - |
dc.contributor.author | Awogbemi, Femi | - |
dc.date.accessioned | 2024-05-20T13:57:17Z | - |
dc.date.available | 2024-05-20T13:57:17Z | - |
dc.date.issued | 2017-09 | - |
dc.identifier.citation | A. A. Falaye, E. S. Oluyemi, S. Ale, M. B. Abdullahi, U. C. Uchenna and F. Awogbemi, "Quantitative model for dynamic propagation and countermeasure of malicious cyber attack on the mobile wireless network," 2017 Intelligent Systems Conference (IntelliSys), London, UK, 2017, pp. 1095-1102, doi: 10.1109/IntelliSys.2017.8324266. | en_US |
dc.identifier.issn | 978-1-5090-6435-9 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/28584 | - |
dc.description.abstract | One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studies the behavioral dynamics of the Vulnerable, infected and the recovered terminals on the mobile wireless network and the effectiveness of an antivirus security signature as countermeasure and the effect of lack of anti-virus update. Solving for stability, we found out that its Eigen values gives a negative value which means that the equilibrium point is in a stable state. We analyzed the differential equations using Homotopy Perturbation Method (HPM). The simulation to evaluate the consequence of different countermeasure options were carried on a mathematical-tool platform called maple. From our results we discovered that if security patches are fixed on our mobile devices and there is regular antivirus update on the devices, then financial fraud, privacy inversion and running of scam can be curtailed to a significant level. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Homotopy perturbation method | en_US |
dc.subject | SIR model | en_US |
dc.subject | Malicious ware | en_US |
dc.subject | Stability | en_US |
dc.subject | Equilibrium introduction | en_US |
dc.title | Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
44a 2017 Quantitative Model for Dynamic Propagation.pdf | 292.76 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.