Please use this identifier to cite or link to this item:
http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/7177
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Falaye, Adeyinka A. | - |
dc.contributor.author | Etuk, Stella Oluyemi | - |
dc.contributor.author | Ale, Seun | - |
dc.contributor.author | Abdullahi, Muhammad Bashir | - |
dc.contributor.author | Ugwuoke, Cosmos U | - |
dc.contributor.author | Awogbemi, F | - |
dc.date.accessioned | 2021-07-07T19:04:34Z | - |
dc.date.available | 2021-07-07T19:04:34Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Falaye, A. A., Etuk, S.O., Seun, A., Abdullahi, M.B., Ugwuoke, C.U. and Awogbemi, F. (2017). Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network. SAI Intelligent System Conference, London, UK. IEEE indexed. Pg. 1095-1102 | en_US |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/7177 | - |
dc.description.abstract | One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studies the behavioral dynamics of the Vulnerable, infected and the recovered terminals on the mobile wireless network and the effectiveness of an antivirus security signature as countermeasure and the effect of lack of anti-virus update. Solving for stability, we found out that its Eigen values gives a negative value which means that the equilibrium point is in a stable state. We analyzed the differential equations using Homotopic Perturbation Method (HPM).The Simulation to evaluate the consequence of different countermeasure options were carried on a mathematical-tool platform called maple . From our results we discovered that if security patches are fixed on our mobile devices and there is regular antivirus update on the devices, then financial fraud, Privacy inversion and running of scam can be curtailed to a significant level. | en_US |
dc.language.iso | en | en_US |
dc.publisher | SAI Intelligent System Conference, London, UK. IEEE indexed. | en_US |
dc.subject | Homotopic Perturbation Method | en_US |
dc.subject | SIR model | en_US |
dc.subject | Malicious ware | en_US |
dc.subject | Stability | en_US |
dc.subject | Equillibrium Introduction | en_US |
dc.title | Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network | en_US |
dc.type | Article | en_US |
Appears in Collections: | Information and Media Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network.pdf | 359.6 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.