πŸ“ž +91-7667918914 | βœ‰οΈ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 4, ISSUE 3, MARCH 2015

AN EFFECTIVE METHOD OF TIME REQUIRED TO COMPROMISE A COMPUTER SYSTEM

V.Srimathi, R.Vishali, S. Brintha Rajakumari

DOI: 10.17148/IJARCCE.2015.43146

Abstract: A cyber intrusion is a frequent assumption in the domain of cyber security and it follows the properties of a Poisson process. By the Poisson distribution the intrusion is well modeled and this process requires a high rate of time. This was also used with Pareto distribution of intrusion so that the rate of time required is slightly decreases with a better performance. Now we are used the chaos algorithm to determine the Time Taken to Compromise (TTC) by using this algorithm the time used for the performing a task in highly decreases. It shows the assumption of the Poisson process model might be suboptimal. The algorithm suggests that time to compromise decreases along the number of instruction of a system regarding this property. This paper clearly explains about the TTC by chaos algorithm.



Keywords: Invasive Software, Network Management, Risk Management.

How to Cite:

[1] V.Srimathi, R.Vishali, S. Brintha Rajakumari, β€œAN EFFECTIVE METHOD OF TIME REQUIRED TO COMPROMISE A COMPUTER SYSTEM,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2015.43146