Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2020, Cilt: 4 Sayı: 4, 165 - 169, 28.12.2020

Öz

Kaynakça

  • [1] Kalashinkov, A. O. (2014). Example of using game-theoretic approach in problems, Cybersecurity Issues, 1(2), ss. 49-54.
  • [2] Saini, D. K. (2011). A Mathematical Model for the Effect of Malicious Object on Computer Network Immune System, Applied Mathematical Modeling, 35, ss. 3777-3787. DOI:10.1016/.2011.02.025
  • [3] Saini, D.K. (2012). Cyber Defense: Mathematical Modelling and Simulation, International Journal of Applied Physics and Mathematics, 2(5), ss. 312-315.
  • [4] Saini, D. K., Mishra, B. K. (2007). Design Patterns and their effect on Software Quality, ACCST Research Journal, 5(1), ss. 356-365.
  • [5] Saini, D. K., Gupta, N. (2007). Fault Detection Effectiveness in GUI Components of Java Environment through Smoke Test, Journal of Information Technology, ISSN 0973-2896, 3(3), ss. 7-17.
  • [6] Saini, D. K., Saini, H. (2008). VAIN: A Stochastic Model for Dynamics of Malicious Objects, Journal of Systems Management, 6(1), ss. 14- 28.
  • [7] Stasuk, O.I., Goncharova, L.L, (2017). Differential mathematical models to investigate the computer network architecture of an all-mode Systems of control over a distance of railways, Cybernetics and Systems Analysis, 53(1), ss. 157-164.

Mathematical Modeling in Cyber Defense

Yıl 2020, Cilt: 4 Sayı: 4, 165 - 169, 28.12.2020

Öz

With the development of technological developments in addition to internet technology, the necessity of cyber defense systems has emerged for the protection of valuable or valuable information stored in the cyber environment. It is important to understand the behavior of malicious objects with the increasing threat of cyber attacks in recent years. Mathematical modeling is required for this. In this study, a mathematical modeling process and a cyber defense system modeling principle are given. Since the attacks on the computer are completely stochastic, a Cyber Defense System Design Model based on the detection of the behavior of malicious objects with the help of the probability distribution function and differential equations has been proposed.

Kaynakça

  • [1] Kalashinkov, A. O. (2014). Example of using game-theoretic approach in problems, Cybersecurity Issues, 1(2), ss. 49-54.
  • [2] Saini, D. K. (2011). A Mathematical Model for the Effect of Malicious Object on Computer Network Immune System, Applied Mathematical Modeling, 35, ss. 3777-3787. DOI:10.1016/.2011.02.025
  • [3] Saini, D.K. (2012). Cyber Defense: Mathematical Modelling and Simulation, International Journal of Applied Physics and Mathematics, 2(5), ss. 312-315.
  • [4] Saini, D. K., Mishra, B. K. (2007). Design Patterns and their effect on Software Quality, ACCST Research Journal, 5(1), ss. 356-365.
  • [5] Saini, D. K., Gupta, N. (2007). Fault Detection Effectiveness in GUI Components of Java Environment through Smoke Test, Journal of Information Technology, ISSN 0973-2896, 3(3), ss. 7-17.
  • [6] Saini, D. K., Saini, H. (2008). VAIN: A Stochastic Model for Dynamics of Malicious Objects, Journal of Systems Management, 6(1), ss. 14- 28.
  • [7] Stasuk, O.I., Goncharova, L.L, (2017). Differential mathematical models to investigate the computer network architecture of an all-mode Systems of control over a distance of railways, Cybernetics and Systems Analysis, 53(1), ss. 157-164.
Toplam 7 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Articles
Yazarlar

Muharrem Tuncay Gençoğlu 0000-0002-8784-9634

Yayımlanma Tarihi 28 Aralık 2020
Yayımlandığı Sayı Yıl 2020 Cilt: 4 Sayı: 4

Kaynak Göster

IEEE M. T. Gençoğlu, “Mathematical Modeling in Cyber Defense”, IJESA, c. 4, sy. 4, ss. 165–169, 2020.

ISSN 2548-1185
e-ISSN 2587-2176
Period: Quarterly
Founded: 2016
Publisher: Nisantasi University
e-mail:ilhcol@gmail.com