http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Design and Performance Study of a Hot Water Driven 5 TR Capacity Absorption Cooling System
Anil Sharma,Bimal Kumar Mishra,Abhinav Dinesh,Ashok Misra 보안공학연구지원센터 2014 International Journal of u- and e- Service, Scienc Vol.7 No.6
Use of high grade electrical energy, generated from fossil fuels, for cooling has increased environmental concerns like global warming and ozone layer depletion. Hence, there is a need to reduce dependence on them and explore potential environmental friendly options. In this aspect, vapor absorption system has scope of utilizing low grade energy source i.e. hot water from solar panel, to generate cooling effect and are environment friendly as no chloro-floro-carbons are used. The most usual combination of absorber refrigerant pair in such system is lithium bromide water (LiBr–H2O), where water vapor is the refrigerant. In present work, a hot water driven, single stage, absorption cooling system, using a lithium bromide water solution, is analyzed for determining the effect of various parameters on coefficient of performance (COP). Four basic stages in the absorption cycle are generation, condensation, evaporation and absorption with ideally no moving part. A configuration of theses four stages, having 5 TR cooling capacity is determined and examined for the variation in COP corresponds to the change in pressure and concentration. The pressure parameter is varied in condenser and evaporator, resulting graph shows that the increment in pressure of evaporator increases the COP whereas increment of pressure in condenser decreases the COP. At lower inlet concentration of LiBr solution to the absorber gives increment in COP.
Honeypot-based Signature Generation for Polymorphic Worms
Sounak Paul,Bimal Kumar Mishra 보안공학연구지원센터 2014 International Journal of Security and Its Applicat Vol.8 No.6
With the growing sophistication of computer worms, information security has become a prime concern for individuals, community and organizations. Traditional signature based IDS, though effective for known attacks but failed to handle the unknown attack promptly. This paper describes a novel honeypot system which isolates the suspicious traffic from normal traffic, and capture most useful information regarding the worm’s activities, without attacker’s knowledge. Our system will be used for critical study of structure and behavior of most sophisticated worms and then forwards the necessary input to Signature Generation Module for automatically generating signature of unknown polymorphic worms. Our attempt is to analyze the invariant content of polymorphic worms and using a probabilistic approach we compute the signature of worm with low false positive. Evaluation based on synthetically generated polymorphic worms demonstrate that our system is able to enhance the capability of IDS signature library and increases the probability of detecting polymorphic worms with efficiency, accuracy.
Munna Kumar,Bimal Kumar Mishra,T. C. Panda 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.1
In this paper an attempt has been made to develop Predator- prey Models on interaction between Computer worms, Trojan horse and antivirus software inside a computer system. Five mathematical models are proposed to study the Predator-prey system inside a computer system. In mathematical model 1, the prey consists of uninfected files, whereas, the predator consists of computer worms. In mathematical model 2, the infected files constitute the prey and anti-virus software is the predator. In mathematical model 3, Effect of new or updated antivirus software on such computer worms which are quarantine or not completely recovered by the lower version of installed antivirus software in the system is studied which switches the rate of infection to zero. In mathematical model 4, Reactivation of computer worms when they are in the latent class is mathematically formulated. In mathematical model 5, we have attempt to develop and understand the recent attack of the Trojan horse Backdoor. Kihomchi and Trojan.Zbot!gen74 and its removal by newly available tool NPE.exe. The stability of the result is stated in terms of the Jacobian of the system and the basic reproduction number is also well defined for all models. Numerical methods and MATLAB are employed to solve and simulate the system of equations developed and analysis of the models gives remarkable exposure.
Stability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet
Munna Kumar,Bimal Kumar Mishra,T. C. Panda 보안공학연구지원센터 2015 International Journal of Hybrid Information Techno Vol.8 No.7
In this paper, a new epidemic model, known as the SLBQRS model, is proposed in a computer network with Latent and Breaking-out periods of a virus in its life cycle. Furthermore, an infected computer will be referred to as latent or breaking-out depending on whether all viruses staying in it are in their respective latent periods or at least one virus staying in it is in its breaking-out period. In the real world there exists no infected computer at all that has no infectivity. A breaking-out computer can get treated with a higher probability, because it usually suffers from a marked performance degradation or even breaks down, which can be perceived evidently by the user. The quarantine is a method of isolating the most infected nodes from the network and reduce the spreading virus till they get recovered. The qualitative properties of this model are investigated. The result shows that the dynamic behavior of the model is determined by a threshold R0. Specially, virus-free equilibrium is globally asymptotically stable if R0 ≤ 1. Next, the sensitivity analysis of R0 to six system parameters is also analyzed. On this basis, a collection of strategies are advised for eradicating viruses spreading across the Internet effectively. Threshold R0, equilibrium and their stability are discussed in terms of the Jacobian of the system. Numerical methods and MATLAB are employed to solve and simulate the system of equations developed and analysis of the model gives remarkable exposure.
Worm Propagation with Differential Infectivity under Quarantine Control Strategy
Sounak Paul,Bimal Kumar Mishra 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.8
Malwares have sharp resemblance with the biological pathogens in terms of propagation. Biological pathogens spread from one living being to another in very short span of time. Similarly malwares also propagate rapidly from one host to another host and one network to another network, in order to spread infection in major scale. This spread can be epidemic if control strategies are not called in time. In order to timely intervene, study of epidemic behavior is very important. In this paper we develop SI1I2Q1Q2R1R2 model of worm propagation under quarantine control strategy. We have considered different infective, quarantined and recovered (or removed) group in our model. The motivation of such model came from the study of propagation dynamics of HIV. Our worm propagation and its quarantined based defense is based on staged-progression (SP) hypothesis of HIV. We have studied in this paper the stability of worm free equilibrium condition and analyzed the epidemic state condition in terms of reproduction number. When reproduction number is greater than one the worm propagation become epidemic. If it is less than one then infection diminishes. Extensive analysis and simulation has been done to validate our system. Simulation result shows that effective quarantine strategy helps in controlling the epidemic outbreak of worms in networks.