Research Article
BibTex RIS Cite
Year 2020, Volume: 4 Issue: 4, 165 - 169, 28.12.2020

Abstract

References

  • [1] Kalashinkov, A. O. (2014). Example of using game-theoretic approach in problems, Cybersecurity Issues, 1(2), ss. 49-54.
  • [2] Saini, D. K. (2011). A Mathematical Model for the Effect of Malicious Object on Computer Network Immune System, Applied Mathematical Modeling, 35, ss. 3777-3787. DOI:10.1016/.2011.02.025
  • [3] Saini, D.K. (2012). Cyber Defense: Mathematical Modelling and Simulation, International Journal of Applied Physics and Mathematics, 2(5), ss. 312-315.
  • [4] Saini, D. K., Mishra, B. K. (2007). Design Patterns and their effect on Software Quality, ACCST Research Journal, 5(1), ss. 356-365.
  • [5] Saini, D. K., Gupta, N. (2007). Fault Detection Effectiveness in GUI Components of Java Environment through Smoke Test, Journal of Information Technology, ISSN 0973-2896, 3(3), ss. 7-17.
  • [6] Saini, D. K., Saini, H. (2008). VAIN: A Stochastic Model for Dynamics of Malicious Objects, Journal of Systems Management, 6(1), ss. 14- 28.
  • [7] Stasuk, O.I., Goncharova, L.L, (2017). Differential mathematical models to investigate the computer network architecture of an all-mode Systems of control over a distance of railways, Cybernetics and Systems Analysis, 53(1), ss. 157-164.

Mathematical Modeling in Cyber Defense

Year 2020, Volume: 4 Issue: 4, 165 - 169, 28.12.2020

Abstract

With the development of technological developments in addition to internet technology, the necessity of cyber defense systems has emerged for the protection of valuable or valuable information stored in the cyber environment. It is important to understand the behavior of malicious objects with the increasing threat of cyber attacks in recent years. Mathematical modeling is required for this. In this study, a mathematical modeling process and a cyber defense system modeling principle are given. Since the attacks on the computer are completely stochastic, a Cyber Defense System Design Model based on the detection of the behavior of malicious objects with the help of the probability distribution function and differential equations has been proposed.

References

  • [1] Kalashinkov, A. O. (2014). Example of using game-theoretic approach in problems, Cybersecurity Issues, 1(2), ss. 49-54.
  • [2] Saini, D. K. (2011). A Mathematical Model for the Effect of Malicious Object on Computer Network Immune System, Applied Mathematical Modeling, 35, ss. 3777-3787. DOI:10.1016/.2011.02.025
  • [3] Saini, D.K. (2012). Cyber Defense: Mathematical Modelling and Simulation, International Journal of Applied Physics and Mathematics, 2(5), ss. 312-315.
  • [4] Saini, D. K., Mishra, B. K. (2007). Design Patterns and their effect on Software Quality, ACCST Research Journal, 5(1), ss. 356-365.
  • [5] Saini, D. K., Gupta, N. (2007). Fault Detection Effectiveness in GUI Components of Java Environment through Smoke Test, Journal of Information Technology, ISSN 0973-2896, 3(3), ss. 7-17.
  • [6] Saini, D. K., Saini, H. (2008). VAIN: A Stochastic Model for Dynamics of Malicious Objects, Journal of Systems Management, 6(1), ss. 14- 28.
  • [7] Stasuk, O.I., Goncharova, L.L, (2017). Differential mathematical models to investigate the computer network architecture of an all-mode Systems of control over a distance of railways, Cybernetics and Systems Analysis, 53(1), ss. 157-164.
There are 7 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Muharrem Tuncay Gençoğlu 0000-0002-8784-9634

Publication Date December 28, 2020
Published in Issue Year 2020 Volume: 4 Issue: 4

Cite

IEEE M. T. Gençoğlu, “Mathematical Modeling in Cyber Defense”, IJESA, vol. 4, no. 4, pp. 165–169, 2020.

ISSN 2548-1185
e-ISSN 2587-2176
Period: Quarterly
Founded: 2016
Publisher: Nisantasi University
e-mail:ilhcol@gmail.com