scholarly journals Modeling and Analysis of Peer-to-Peer Botnets

2012 ◽  
Vol 2012 ◽  
pp. 1-18 ◽  
Author(s):  
Liping Feng ◽  
Xiaofeng Liao ◽  
Qi Han ◽  
Lipeng Song

Peer-to-Peer (P2P) botnets have emerged as one of the most serious threats to Internet security. To effectively eliminate P2P botnets, in this paper, the authors present two novel dynamical models to portray the process of formation of P2P botnets, one of which is called microlevel model, the other is called macrolevel model. Also, the stability of equilibria is investigated along with the analysis of how to prevent the P2P botnet. Furthermore, by analyzing the relationship between infection rate and the proportion of the hosts with countermeasures, we obtain the mathematical expressions of effective immune regions and depict their numerical simulations. Finally, numerical simulations verify the correctness of mathematical analysis. Our results can provide the guidance for security practitioners to defend and eliminate P2P botnet at a cost-effective way.

2013 ◽  
Vol 791-793 ◽  
pp. 1952-1956
Author(s):  
Ji Ke Gao ◽  
De Min Zhang ◽  
Fa Tang Chen

In LTE(Long Term Evolution) system, scheduling plays an important role in the process of allocating resource. LTE system puts forward semi-persistent scheduling (SPS) for new applications such as VoIP(Voice on Internet Protocol) and online games. Considering the problem of resource collision in SPS HARQ(Hybrid Automatic Repeat reQuest) process, we explore the relationship between uplink semi-persistent scheduling period and the number of semi-persistent transmissions, and propose two novel solutions. One is choosing specific uplink semi-persistent period for different uplink/downlink (UL/DL) configurations and the number of transmissions. The other is delaying collision processes for the configuration of small uplink period. The analysis proves that the two solutions can reduce the collision probability and improve the stability of LTE system.


Author(s):  
C. T. R. Wilson ◽  
G. I. Taylor

The stability of a charged raindrop has been discussed mathematically by Lord Rayleigh. The case of an uncharged drop in a uniform electric field is perhaps of more meteorological importance but a mathematical discussion of the conditions for stability turns out to be very much more difficult in this case, owing to the fact that the drop ceases to be spherical before it bursts. Moreover it does not seem possible to express its geometrical shape by means of any simple mathematical expressions. On the other hand, by using a soap bubble instead of a water drop it was found possible to carry out experiments under well-defined conditions in this case, whereas experiments with Rayleigh's charged drop would be difficult.


2019 ◽  
Vol 33 (33) ◽  
pp. 65-80
Author(s):  
Jacek A. Piwowarski

Ensuring freedom from threats to security subjects requires the elaboration of a security strategy. The relationship between security strategy and development strategy is the same as that between security and development themselves – one determines the other. For this reason, the purpose of this article is to discuss the essence of security and its basic conceptual categories, as well as the implementation of its provision through strategic efforts. At the beginning, the essence of the phenomenon of security is presented and the most important definitions are quoted. Similarly, the author discusses the concept of strategy and shows the evolution of its understanding. This allows to discuss the typology of security strategies and to mention the most important figures that became part of history thanks to their achievements in the theory of strategy, including Sun Tzu, Thucydides, Alexander the Great, Napoleon Bonaparte. A few of the most important principles formulated by these figures are recalled, which may be important hints for contemporary strategists as well. Finally, the author gives the most important definitions of ideas related to security: the security environment, the interests of the security subject, opportunities, challenges, risks, threats, rules and methods. Their essence is emphasized in the light of the considerations presented above. The author concludes that the strategic categories are superior to the respective political categories and distinguishes three types of contemporary strategic actions. He also recognizes that the biggest challenge in terms of security is the prevention of threats, e.g. by means of stabilization activities whose essence is to maintain and promote the stability of the security environment.


2013 ◽  
Vol 732-733 ◽  
pp. 719-725 ◽  
Author(s):  
Jian Tao Liu ◽  
Chen Long Li ◽  
Ke Wang

Emergency HVDC power support (EDCPS) can be used for improving the transient stability of AC/DC power systems, but the effect is directly determined by the quantity, the starting time, the speed and other factors of the power support. In this article, the dynamic characteristics of AC/DC power systems after a fault are analyzed, generalized dynamical models of the AC/DC power system are established, the relationship between the duration and the quantity of the EDCPS and the dynamic characteristics of the system are established based on the impulse theorem, then the EDCPS strategy besed on the principles of the generalized dynamics is proposed. At last, it is verified by examples of simulation that the strategy can effectively improve the stability of the AC/DC power systems after a fault.


2019 ◽  
Vol 24 (4) ◽  
pp. 87
Author(s):  
S. A. Wuhaib ◽  
M. H. Mansour

In this paper, the dynamic of prey predator model was discussed when the relationship between them is functional response type III. In addition, when prey exposure to the disease as nonlinear function. Also the infected prey exposed to harvest as a nonlinear and as linear function. The bounded and positive solutions, periodic, conditions of equilibrium points and the stability were we discussed Some results were illustrated in numerical simulations, and show we can use the linear function of harvesting to control on the dices   http://dx.doi.org/10.25130/tjps.24.2019.079


Author(s):  
Zoltán Czirkos ◽  
Gábor Hosszú

Communication in computer networks can be organized in two different ways, according to the client/ server model and the peer-to-peer model (Spinellis & Androutsellis-Theotokis, 2004). In the client/server model, the network is centralized. There is one host on the network, the server, which provides services to its clients. Its network address is usually well-known. On the other hand, in the peer-to-peer model, there is no central point in the network. Hosts participating are sometimes called “servents” (Gnutella, 2006), as they act both as servers and as clients at the same time: they provide services to other servents, while they also use the services of others. Nodes in unstructured peer-to-peer networks usually communicate via message flooding. For example, a search request for a given file in the Gnutella network is sent to all neighboring servents. However, this solution is not scalable, and it generates a lot of unnecessary network traffic.


2018 ◽  
Vol 2 (2) ◽  
pp. 234-254
Author(s):  
Sawsan Karim Jubouri

   The aim of this research is to study the relationship between the outputs of higher education and the requirements of the labor market in iraq, and to identify the most important factors affecting the level of higher education in it, and the development of some of the necessary treatments to improve the level of higher education, which helps to achieve economic development. The research included two aspects, and the other applied, the research has used quantitative methods to reach that relationship, including the method of measuring the stability of time series of the variables of research, and then measuring the relationship between the outputs of higher education and the needs of the labor market in iraq in the manner of analysis of the joint integration between those variables, as well as a set of research conclusions and recommendations.                                                                    


2021 ◽  
Vol 40 (2) ◽  
pp. 137-158
Author(s):  
Reyna Vergara González ◽  
Pablo Mejía Reyes ◽  
Miguel Angel Díaz Carreño

El objetivo de este documento es analizar la relación entre el ciclo económico y diversas variables monetarias y financieras con el fin de determinar si han sido estables en el tiempo, teniendo en cuenta los efectos de las modificaciones en las condiciones económicas generales, la estrategia específica adoptada de política monetaria en diferentes subperiodos y las condiciones institucionales en que esta se maneja. Para probar la estabilidad de estas relaciones, una vez que se obtienen los indicadores del ciclo mediante los filtros convencionales, se emplea la metodología de cambio estructural de Bai y Perron (1998). Los resultados destacan dos cambios estructurales en la relación entre el indicador del ciclo y las variables de inflación, tasa de interés, tipo de cambio nominal y agregados monetarios nominales, uno a mediados de los años ochenta y el otro a mediados de los noventa.   Abstract   This paper aims to analyze the relationship between the business cycle and various monetary and financial variables. In particular, the paper seeks to determine whether this relationship has been stable over time, considering the effects of the changes in the general economic conditions, the specific monetary policy strategy adopted in different subperiods, and the institutional framework in which this is managed. To test the stability of these relationships, once the cycle indicators are obtained using conventional filters, the structural change methodology of Bai and Perron (1998) is used. The results highlight two structural changes in the relationship between the cycle indicator and inflation, interest rate, nominal exchange rate, and nominal monetary aggregates, one in the mid-eighties and the other in the middle of the nineties.


Author(s):  
Godfrey C. Hoskins ◽  
V. Williams ◽  
V. Allison

The method demonstrated is an adaptation of a proven procedure for accurately determining the magnification of light photomicrographs. Because of the stability of modern electrical lenses, the method is shown to be directly applicable for providing precise reproducibility of magnification in various models of electron microscopes.A readily recognizable area of a carbon replica of a crossed-line diffraction grating is used as a standard. The same area of the standard was photographed in Phillips EM 200, Hitachi HU-11B2, and RCA EMU 3F electron microscopes at taps representative of the range of magnification of each. Negatives from one microscope were selected as guides and printed at convenient magnifications; then negatives from each of the other microscopes were projected to register with these prints. By deferring measurement to the print rather than comparing negatives, correspondence of magnification of the specimen in the three microscopes could be brought to within 2%.


Crisis ◽  
2011 ◽  
Vol 32 (5) ◽  
pp. 246-253 ◽  
Author(s):  
Gretchen E. Ely ◽  
William R. Nugent ◽  
Julie Cerel ◽  
Mholi Vimbba

Background: The relationship between suicidal thinking and adolescent dating violence has not been previously explored in a sample of adolescent abortion patients. Aims: This paper highlights a study where the relationship between dating violence and severity of suicidal thinking was examined in a sample of 120 young women ages 14–21 seeking to terminate an unintended pregnancy. Methods: The Multidimensional Adolescent Assessment Scale and the Conflict in Adolescent Relationships Scale was used to gather information about psychosocial problems and dating violence so that the relationship between the two problems could be examined, while controlling for the other psychosocial problems. Results: The results suggest that dating violence was related to severity of suicidal thinking, and that the magnitude of this relationship was moderated by the severity of problems with aggression. Conclusions: Specifically, as the severity of participant’s general problems with aggression increased, the magnitude of the relationship between dating violence and severity of suicidal thinking increased. Limitations of the study and implications for practice are discussed.


Sign in / Sign up

Export Citation Format

Share Document