Research Article | Open Access | Download PDF
Volume 35 | Number 1 | Year 2016 | Article Id. IJCTT-V35P124 | DOI : https://doi.org/10.14445/22312803/IJCTT-V35P124
Spread of Malware within an E-Commerce Network with Quarantine: A Dynamic Model
Biswarup Samanta, Samir Kumar Pandey
Citation :
Biswarup Samanta, Samir Kumar Pandey, "Spread of Malware within an E-Commerce Network with Quarantine: A Dynamic Model," International Journal of Computer Trends and Technology (IJCTT), vol. 35, no. 1, pp. 129-133, 2016. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V35P124
Abstract
Small business e-commerce sites are very good target for cyber-attack. They do not have sufficient resources required to deal with the attack. The extensive use of e-commerce websites create new ways for both image and brands to be attacked. Security of e-commerce websites is essential for compliance with laws and regulations as well as gaining and maintaining the trust of stakeholders, partners and customers. Attacks on customer’s sensitive information have the adverse effect of decreasing the customer’s faith on online transactions, which happens in e-commerce network. In this paper, we propose a dynamic transmission model (Sp-I-Q-Sp) of malicious objects in the e-commerce network and study its dynamic behaviours. Numerical method is employed to solve and simulate the system of equations developed. In this context, we give the threshold for determining whether the virus dies out completely. Then, we study the existence of equilibria, and analyse their local asymptotic stability. Results of numerical simulations are obtained using MATLAB. Interpretation of the model yields interesting exposures.
Keywords
e-commerce; dynamic model; malware; local stability; equilibrium point.
References
[1] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 115, 1927, 700-721.
[2] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 138, 1932, 55-83.
[3] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 141, 1933, 94-122.
[4] B.K. Mishra, S.K. Pandey, Dynamic Model of worms with vertical transmission in computer network, Appl. Math. Comput. 217 (21) (2011) 8438–8446, Elsevier.
[5] B.K. Mishra, S.K. Pandey, Effect of antivirus software on infectious nodes in computer network: a mathematical model, Phys. Lett. A 376 (2012) 2389–2393. Elsevier.
[6] Bimal Kumar Mishra, Navnit Jha, Fixed period of temporary immunity after run of anti-malicious software on computer nodes, Appl. Math. Comput. 190 (2), 2007, 1207-1212.
[7] Issa Najafi, Identify Effective Factors for Improving ETrust of E-Transactions in the Context of E-Commerce and E-Government; International Journal of Computer Trends and Technology (IJCTT) – volume 17 Number 6 Nov 2014, 281-299.
[8] Rajesh R Chauhan, G S Praveen Kumar, A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting, International Journal of Computer Trends and Technology (IJCTT) – volume 6 number 3– Dec 2013, 143-149.