A New Approach On Computer Networking For Cyber Criminals By Using Markov Chain Model

The use of internet is popular among youth of every contrary. This has provided business to internet operators because of this a competition has been generated among service providers to catch-up more and more traffic proportion of users many internet café exist in city having internet connectivity of many operators. In the market many type of users are situated. Some users have crime category behavior and have attitudes of criminals like hacking the site, blocking the mail, chatting unauthorized users etc.The crime users after getting success in call connection performs cyber crime.Naldi(2002) have made an attempt to describe traffic sharing under the multi operator environment with the help of Markov chain model. This paper presents performance analysis for cyber criminals in computer network. Simulation methodology is performing to support the mathematical finding.

Introduction: Gordon et. Al. (2006) has studied the CSI/FBI computer crime and security survey. Haries et al. (1999) have presented TCP/IP security threats and attack methods. Shukla and Gadewar (2007) discussed Stochastic model for cell movement in a Knockout Switch in computer networks. Shukla and Thakur (2007, 2009) described Modeling of behavior of cyber criminals when two Internet operators in markets and also have presented crime based user analysis in Internet traffic sharing under cyber crime.Shukla, Tiwari et al. (2009 a, b, c, 2010) used share loss analysis of Internet traffic distribution in computer networks. Also major discussion in disconnectivity, cyber criminals, congestion controls. Howard (1997) discussed an analysis of security incidents on the internet. Garber (2000) has discussed Denial of service attacks in the Internet. Danny (2010) has presented Cyber crime – a game of cat and mouse in 2009.

 

For full details refer attachment