TY - JOUR
T1 - Predator-Prey Models for the Attack of Malicious Objects in Computer Network
AU - Mishra, Bimal Kumar AU - Ansari, Gholam Mursalin
JO - Journal of Engineering and Applied Sciences
VL - 4
IS - 3
SP - 215
EP - 220
PY - 2009
DA - 2001/08/19
SN - 1816-949x
DO - jeasci.2009.215.220
UR - https://makhillpublications.co/view-article.php?doi=jeasci.2009.215.220
KW - anti-malicious software
KW -intraspecific competition
KW -computer network
KW -Malicious objects
KW -self-replication time
KW -predator-prey model
AB - This study shows appropriate mathematical concepts for describing persistence by means of simple predator-prey models framed in system of integro-differential equations. Two mathematical models are proposed to study the predator-prey system inside a computer system. In mathematical model 1, the prey consists of infected and the uninfected nodes, whereas, the predator consists of malicious objects. In mathematical model 2, malicious objects constitute the prey and anti-malicious software is the predator. Stability of the result is stated in terms of threshold parameter R0. Explicit formula for the reproductive number R0 is derived and it has been shown that the malicious objects infection-free equilibrium, whose component of infective is zero, is asymptotically stable (globally) if threshold parameter is less than or equal to one and unstable if greater then one. Numerical method is employed to solve the system of equations developed. The simulated results may help us to understand the spread and control of malicious objects in computer network.
ER -