AN EFFECTIVE METHOD OF TIME REQUIRED TO COMPROMISE A COMPUTER SYSTEM
Abstract: A cyber intrusion is a frequent assumption in the domain of cyber security and it follows the properties of a Poisson process. By the Poisson distribution the intrusion is well modeled and this process requires a high rate of time. This was also used with Pareto distribution of intrusion so that the rate of time required is slightly decreases with a better performance. Now we are used the chaos algorithm to determine the Time Taken to Compromise (TTC) by using this algorithm the time used for the performing a task in highly decreases. It shows the assumption of the Poisson process model might be suboptimal. The algorithm suggests that time to compromise decreases along the number of instruction of a system regarding this property. This paper clearly explains about the TTC by chaos algorithm.
Keywords: Invasive Software, Network Management, Risk Management.
How to Cite:
[1] V.Srimathi, R.Vishali, S. Brintha Rajakumari, βAN EFFECTIVE METHOD OF TIME REQUIRED TO COMPROMISE A COMPUTER SYSTEM,β International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2015.43146
