Two-Call Index Based Internet Traffic Sharing Analysis in Case of Cyber Crime Environment of Computer Network

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-13 Number-6
Year of Publication : 2014
Authors : Dr. Sharad Gangele , Prof. (Dr.) Ashish Dongre
  10.14445/22315381/IJETT-V13P255

Citation 

Dr. Sharad Gangele , Prof. (Dr.) Ashish Dongre. "Two-Call Index Based Internet Traffic Sharing Analysis in Case of Cyber Crime Environment of Computer Network", International Journal of Engineering Trends and Technology (IJETT), V13(6),271-280 July 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

While there are many benefits from the Internet, it has also become a powerful tool in the hands of those wishing to engage in criminal activities. Cyber crime encompasses any criminal act dealing with computers and networks, due to huge internet traffic load every service provider want to capture much more traffic share in their account as compare to competitive service provider. A model based internet traffic share problem was initiated by Naldi (2002). The basic idea of Naldi (2002) was extended by Shukla, Thakur and Tiwari(2010) in which limitation of call-by-call converted in to two-call with the addition of one more cyber crime state. In this paper we consider same approach for different kind of users with index formation. This paper presents an index based internet traffic share analysis for the better judgement of users behaviour in case when two operators are in competitive mode. Simulation study is performed to support the mathematical findings.

References

[1] Francini, A. and Chiussi, F.M. (2002): Providing QoS guarantees to unicast and multicast flows in multistage packet switches, IEEE Selected Areas in Communications, vol. 20, no. 8, pp. 1589-1601.
[2] Medhi, J.(1991): Stochastic Processes, Wiley Eastern Limited (Fourth reprint), New Delhi.
[3] Naldi, M. (2002): Internet access traffic sharing in a Multi-operator environment, Computer Networks, Vol. 38, pp.809-824.
[4] Dorea, C.C.Y., Cruz and Rojas, J. A. (2004): Approximation results for non-homogeneous Markov chains and some applications, Sankhya, Vol. 66, Issue No. 02, pp. 243-252.
[5] Shukla, D., Gadewar, S. and Pathak, R.K. (2007): A stochastic model for space division switches in computer networks, international journal of applied mathematics and computation, Elsevier journals, Vol. 184, Issue No. 02, pp235-269.
[6] Shukla, D. and Thakur, Sanjay, (2007): Crime based user analysis in internet traffic sharing under cyber crime, Proceedings of National Conference on Network Security and Management (NCSM-07), pp. 155-165.
[7] Agarwal, Rinkle and Kaur, Lakhwinder (2008): On reliability analysis of fault-tolerant multistage interconnection networks, international journal of computer science and security (IJCSS) Vol. 02, Issue No. 04, pp. 1-8.
[8] Shukla, D., Jain, Saurabh and Ojha , Shweta (2010) : Deadlock index analysis of multi-level queue scheduling in operating system using data model approach, International Journal of Computer Science and Telecommunication ,Vol 6, no 29, pp 93-110.
[9] Tiwari, Virendra, Thakur, Sanjay and Shukla, D.(2010):Cyber crime analysis for multi-dimensional effect in computer network, Journal of Global Research in Computer Science, Vol.1, no. 4., pp 31-37.
[10] M. Naldi (1999): Measurement based modelling of Internet Dial-up Access Connections, Computer Networks, vol. 31, issue 22, pp. 2381-2390.
[11] Shukla, D., Thakur, Sanjay (2009): State Probability Analysis of Users in Internet between two Operators, international journal of advanced networking and applications (IJANA), 2009 vol. 1, issue 2, pp. 90-95.
[12] Shukla, D., Tiwari, M.,Thakur, S. Tiwari,V.( 2009): Rest state analysis in internet traffic distribution in multi-operator environment, research journal of management and information technology (GNIM`s), vol 1 issue 1, pp. 72-82.
[13] Shukla, D., Tiwari, M.,Thakur, S. Deshmukh,A.(2009): Share loss analysis of internet traffic distribution in computer networks, international journal of computer science and security (IJCSS), vol 3, Issue 4, pp. 414-427.
[14] Shukla, D.,Gadewar, Surendra (2007):Stochastic model for cell movement in a knockout switch in computer networks, journal of high speed network, vol.16, no.3, pp. 310-332.
[15] Shukla, D. Gadewar, S. Pathak, R.K.,(2007): A Stochastic Model for Space-Division Switches in Computer Networks, Applied Mathematics and Computation (Elsevier Journal), vol. 184, Issue 2, pp. 235-269.
[16] D. Shukla, V. Tiwari, A. Kareem P and S. Thakur (2010): Effects of Disconnectivity Analysis for Congestion Control in Internet Traffic Sharing, vol. 18, no. 1, pp. 37-46.
[17] Shukla, D. and Thakur, Sanjay (2010): Index based internet traffic sharing analysis of users by a markov chain probability model, Karpagam Journal of Computer Science, Vol. 4, No. 3, pp. 1539-1545.
[18] Thakur, Sanjay and Shukla, D. (2010): Iso-share analysis of internet traffic sharing in presence of favoured dis-connectivity, Computer science and Telecommunication, Vol. 27, No.4, pp. 16-22.
[19] Shukla, D. and Singhai, Rahul (2011): Analysis of user web browsing behaviour using Markov chain model, international journal of advanced networking and application (IJANA), Vol. 2, No. 5, pp. 824-830.
[20] Shukla, D.,Gangele, Sharad, Singhai, R., Verma, Kapil (2011): Elasticity analysis of web-browsing behaviour of users, international journal of advanced networking and application(IJANA), Vol. 3 No.3, pp. 1162-1168.
[21] Shukla, D., Gangele, Sharad, Verma, kapil and Singh, Pankaja (2011a): Elasticity of Internet Traffic distribution in Computer network in two-market environment, Journal of Global Research in Computer Science (JGRCS), Vol. 2, No.6, pp. 6-12.
[22] Shukla, D., Gangele , Sharad, Verma, Kapil and Singh, Pankaja (2011b): Elasticity and Index analysis of usual Internet traffic share problem, international journal of advanced research in computer science (IJARCS), Vol. 02, No. 04, pp. 473- 478.
[23] Shukla, D., Verma, Kapil and Gangele, Sharad, (2012a): Curve Fitting Approximation In Internet Traffic Distribution In Computer Network In Two Market Environment, international journal of computer science and information security (IJCSIS), Vol. 10, Issue 05, pp. 71-78.
[24] Shukla, D., Verma, Kapil and Gangele, Sharad, (2012b): Least Square Fitting Applications under Rest State Environment in Internet Traffic Sharing in Computer Network, International Journal of Computer Science and Telecommunications (IJCST), Vol.3, Issue 05, pp.43-51.
[25] Shukla, D., Verma, Kapil, Dubey, Jayant and Gangele, Sharad (2012c): Cyber Crime Based Curve Fitting Analysis in Internet Traffic Sharing in Computer Network. International journal of computer application (IJCA), Vol.46 No.22, pp. 41-51.
[26] Shukla, D., Verma, Kapil, Bhagwat, Shree and Gangele, Sharad (2012d): Curve Fitting Analysis of Internet Traffic Sharing Management in Computer Network under Cyber Crime, International journal of computer application (IJCA), Vol. 47, No. 24, pp. 36-43.
[27] Gangele, S. Verma, K. and Shukla, D., (2014a): Bounded Area Estimation of Internet Traffic Share Curve, International Journal of Computer Science and Business Informatics, Vol. 10, No. 1, pp. 54-67.
[28] Gangele,Sharad,Dongre,Ashish(2014b):Probability density estimation function of browser share curve for users web browser behaviour, International journal of engineering research and development, Vol. 10, Issue 6,pp.31-41.
[29] Gangele,Sharad,Shukla,D.,(2014c):Area computation of internet traffic share problem with special reference to cyber crime environment, International journal of computer networks and wireless communication, Vol. 4,no. 3,pp.208-219.

Keywords
Index (I), Internet Traffic (IT), Markov Chain Model (MCM), Two-Call (TC).