Security

Queuing Theory Based Models for Studying Intrusion Evolution and Elimination in Computer Networks

Free registration required

Executive Summary

This paper presents two virus propagation and elimination models that take into account the traffic and server characteristics of the network computers. The first of these models partitions the network nodes into perimeter and non-perimeter nodes. Incoming/ outgoing traffic of the network passes through the perimeter of the network, where the perimeter is defined as the set of the servers which are connected directly to the internet. Thus, the model behaves as an open network of M/M/1 queues. It studies burst intrusions (e.g. Denial of Service Attacks) at the network perimeter and how the intrusion evolves given that, in parallel with the intrusion, anti-virus tasks also propagate in the network and kill intruder tasks.

  • Format: PDF
  • Size: 277.5 KB