Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network

Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network

Hemraj Saini, Bimal Kumar Mishra, T. C. Panda
Copyright: © 2011 |Pages: 9
DOI: 10.4018/jwp.2011040102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This paper predicts the malicious object prone site from the set of multi business portals of an organization or company. Graph theory is used to solve this problem as the diverted traffic of customers is interdependent among all the business portals. At first the interconnected business portals are represented in the form of a graph and its corresponding adjacency matrix. Later the centrality and eigenvectors were computed to find the degree of a business portal to propagate the malicious information, helping to cure the business portal by taking available security measures to avoid further infection.
Article Preview
Top

1. Introduction

Business portals (Dias, 2001; Collins, 2001) are the main concern of today’s fast growing online business for almost all the sectors. These business portals are sometime suffer from the congestion due to their heavy access by the customers. To solve such a problem alternate portals are to be provided by the concern business organization/company i.e. www.irctc.com which is already hacked and prone to malicious attack by some means (Anti-Phishing Working Group, 2004; Drake, Oliver, & Koontz, 2004) of attackers as shown in Figure 1.

Figure 1.

Intentionally diversion of original traffic by flooding towards the alternate site

jwp.2011040102.f01

Such types of situation occur when an organization is not able to handle its business transaction on a single business portal. In this condition they create different other alternate business portals and hence it leads to the above mentioned situation. To detect the maximum possibility of a portal to be malicious attack prone is the main assignment of this manuscript which is handled by using graph theory (Wang & Daniels, 2008; Harju, 2007). At first the interconnected business portals are represented in the form of a graph and its corresponding adjacency matrix. Later the Centrality and eigenvectors has been calculated to find the degree of a business portal to propagate the malicious information. Computation of the degree of a business portal to propagate the malicious information helps to cure the business portal by taking available security measures to avoid the further infection.

Top

2. Model Formulation

Let there are k business portals and at an instance t N customers are ready to use for their transactions as shown in following Figure 2. x1, x2, …, xk are the corresponding fractions which opts business portal-1, business portal-2, …, business portal-k correspondingly. Hence x1 + x2 + … + xk = N.

Figure 2.

N customers ready for transaction at k alternate sites

jwp.2011040102.f02

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 13: 2 Issues (2021)
Volume 12: 2 Issues (2020)
Volume 11: 2 Issues (2019)
Volume 10: 2 Issues (2018)
Volume 9: 2 Issues (2017)
Volume 8: 1 Issue (2016)
Volume 7: 2 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing