{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:18:10Z","timestamp":1726064290454},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_17","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"445-459","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Epidemic Modelling for the Spread of Bots Through DDoS Attack in E-Commerce Network"],"prefix":"10.1007","author":[{"given":"Biswarup","family":"Samanta","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"unstructured":"Godbole, N., & Belapure, S. (2015). Cyber security-understanding cyber crimes. In Computer forensics and legal perspectives (2015th ed., p. 14). Bengaluru: Wiley.","key":"17_CR1"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1155\/2017\/4078521","volume":"2017","author":"T Gao","year":"2017","unstructured":"Gao, T., Wang, Q., Wang, X., & Gong, X. (2017). An anonymous access authentication scheme based on proxy ring signature for CPS-WMNs. Mobile Information Systems, 2017, 11.","journal-title":"Mobile Information Systems"},{"issue":"2","key":"17_CR3","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s12346-017-0231-6","volume":"17","author":"L Wang","year":"2018","unstructured":"Wang, L., Zhang, X., & Liu, Z. (2018). An SEIR epidemic model with relapse and general nonlinear incidence rate with application to media impact. Qualitative Theory of Dynamical Systems, 17(2), 309\u2013329.","journal-title":"Qualitative Theory of Dynamical Systems"},{"issue":"7","key":"17_CR4","doi-asserted-by":"publisher","first-page":"2795","DOI":"10.3934\/dcdsb.2017151","volume":"22","author":"J Wang","year":"2017","unstructured":"Wang, J., Liu, X., & Kuniya, T. (2017, September). Global stability for multi-group SIR and SEIR epidemic models with age-dependent susceptibility. Discrete and Continuous Dynamical Systems \u2013 Series B (DCDS-B), 22(7), 2795\u20132812. \nhttps:\/\/doi.org\/10.3934\/dcdsb.2017151\n\n.","journal-title":"Discrete and Continuous Dynamical Systems \u2013 Series B (DCDS-B)"},{"key":"17_CR5","first-page":"02051","volume-title":"20th International Conference on Circuits, Systems, Communications and Computers (CSCC 2016), Volume 76, 2016, MATEC Web Conference","author":"V Kharchenko","year":"2016","unstructured":"Kharchenko, V., & Illiashenko, O. (2016). Diversity for security: Case assessment for FPGA-based safety-critical systems. In 20th International Conference on Circuits, Systems, Communications and Computers (CSCC 2016), Volume 76, 2016, MATEC Web Conference (p. 02051)."},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-319-41932-9_31","volume-title":"Advances in human factors in cyber security","author":"E Canzani","year":"2016","unstructured":"Canzani, E., & Pickl, S. (2016). Cyber epidemics: Modelling attacker-defender dynamics in critical infrastructure systems. In Advances in human factors in cyber security (pp. 377\u2013389). Cham: Springer."},{"unstructured":"Kaur, K., Pathak, A., Kaur, P., & Kaur, K. (2015, May). E-commerce privacy and security system. International Journal of Engineering Research and Applications, 5(5, Part-6), 63\u201373.","key":"17_CR7"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"49","DOI":"10.4204\/EPTCS.184.4","volume-title":"Electronic proceedings in theoretical computer science, 2015; 184 (Proc. ESSS 2015)","author":"E M\u00f6hlmann","year":"2015","unstructured":"M\u00f6hlmann, E., & Theel, O. (2015). Breaking dense structures: Proving stability of densely structured hybrid systems. In Electronic proceedings in theoretical computer science, 2015; 184 (Proc. ESSS 2015) (pp. 49\u201363). \nhttps:\/\/doi.org\/10.4204\/EPTCS.184.4\n\n."},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1155\/2015\/129598","volume":"2015","author":"L Feng","year":"2015","unstructured":"Feng, L. (2015). Modeling and stability analysis of worm propagation in wireless sensor network. Mathematical Problems in Engineering, 2015, 8. \nhttps:\/\/doi.org\/10.1155\/2015\/129598\n\n.","journal-title":"Mathematical Problems in Engineering"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"613","DOI":"10.3390\/info6040613","volume":"6","author":"J Ma","year":"2015","unstructured":"Ma, J. (2015). Analysis of two-worm interaction model in heterogeneous M2M network. Information, 6, 613\u2013632. \nhttps:\/\/doi.org\/10.3390\/info6040613\n\n.","journal-title":"Information"},{"key":"17_CR11","volume-title":"Proceedings of the ISCRAM 2015 Conference \u2013 Kristiansand","author":"Canzani","year":"2015","unstructured":"Canzani. (2015). Insights from modeling epidemics of infectious diseases \u2013 A literature review. In Proceedings of the ISCRAM 2015 Conference \u2013 Kristiansand."},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1155\/2014\/746803","volume":"2014","author":"M Wang","year":"2014","unstructured":"Wang, M. (2014). Spread and control of mobile benign worm based on two-stage repairing mechanism. Journal of Applied Mathematics, 2014, 14. \nhttps:\/\/doi.org\/10.1155\/2014\/746803\n\n.","journal-title":"Journal of Applied Mathematics"},{"key":"17_CR13","volume-title":"Autonomous Systems 2014. Proceedings of the 7th GI Conference. VDI Reihe","author":"E Canzani","year":"2014","unstructured":"Canzani, E., Heldt, H.-C., Meyer, S., & Lechner, U. (2014). Towards an understanding of the IT security information ecosystem. In Autonomous Systems 2014. Proceedings of the 7th GI Conference. VDI Reihe."},{"doi-asserted-by":"crossref","unstructured":"Alomari, E., Manickam, S., Gupta, B. B., Karuppayah, S., & Alfaris, R. (2012, July). Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and art. International Journal of Computer Applications, 49(7), 24\u201332. arXiv preprint arXiv:1208.0403.","key":"17_CR14","DOI":"10.5120\/7640-0724"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.jocs.2017.05.017","volume":"22","author":"G Suchacka","year":"2017","unstructured":"Suchacka, G., & Wotzka, D. (2017). Modeling a non-stationary bots\u2019 arrival process at an e-commerce web site. Journal of Computational Science, 22, 198\u2013208.","journal-title":"Journal of Computational Science"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-319-98989-1_8","volume-title":"European Symposium on Research in Computer Security","author":"H Xu","year":"2018","unstructured":"Xu, H., Li, Z., Chu, C., Chen, Y., Yang, Y., Lu, H., et al. (2018, September). Detecting and characterizing web bot traffic in a large e-commerce marketplace. In European Symposium on Research in Computer Security (pp. 143\u2013163). Cham: Springer."},{"issue":"21","key":"17_CR17","doi-asserted-by":"publisher","first-page":"8438","DOI":"10.1016\/j.amc.2011.03.041","volume":"217","author":"BK Mishra","year":"2011","unstructured":"Mishra, B. K., & Pandey, S. K. (2011). Dynamic model of worms with vertical transmission in computer network. Applied Mathematics and Computation, 217(21), 8438\u20138446.","journal-title":"Applied Mathematics and Computation"},{"issue":"2010","key":"17_CR18","doi-asserted-by":"publisher","first-page":"4335","DOI":"10.1016\/j.nonrwa.2010.05.018","volume":"11","author":"BK Mishra","year":"2010","unstructured":"Mishra, B. K., & Pandey, S. K. (2010). Fuzzy epidemic model for the transmission of worms in computer network. Nonlinear Analysis: Real World Applications, 11(2010), 4335\u20134341.","journal-title":"Nonlinear Analysis: Real World Applications"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"2389","DOI":"10.1016\/j.physleta.2012.05.061","volume":"376","author":"BK Mishra","year":"2012","unstructured":"Mishra, B. K., & Pandey, S. K. (2012). Effect of antivirus software on infectious nodes in computer network: A mathematical model. Physics Letters A, 376, 2389\u20132393.","journal-title":"Physics Letters A"},{"issue":"XII","key":"17_CR20","first-page":"2321","volume":"2","author":"S Biswarup","year":"2014","unstructured":"Biswarup, S., & Pandey, S. K. (2014, December). Attacking behaviour of computer worms on e-commerce network: A dynamic model. International Journal for Research in Applied Science and Engineering Technology, 2(XII), 2321.","journal-title":"International Journal for Research in Applied Science and Engineering Technology"},{"key":"17_CR21","series-title":"Lecturer notes in computer science","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/978-3-540-30182-0_67","volume-title":"Computer and information sciences ISCIS 2004, 19th international symposium","author":"E Gelenbe","year":"2004","unstructured":"Gelenbe, E., Kaptan, V., & Wang, Y. (2004). Biological metaphors for agent behaviour. In Computer and information sciences ISCIS 2004, 19th international symposium (Lecturer notes in computer science) (Vol. 3280, pp. 667\u2013675). Cham: Springer."},{"issue":"1","key":"17_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3844\/jcssp.2005.31.34","volume":"1","author":"JRC Piqueira","year":"2005","unstructured":"Piqueira, J. R. C., Navarro, B. F., & Monteiro, L. H. A. (2005). Epidemiological models applied to virus in computer network. Journal of Computer Science, 1(1), 31\u201334.","journal-title":"Journal of Computer Science"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/948187.948198","volume-title":"2003 ACM workshop on rapid Malcode, ACM","author":"Y Wang","year":"2003","unstructured":"Wang, Y., & Wang, C. X. (2003). Modelling the effect of timing parameters on virus propagation. In 2003 ACM workshop on rapid Malcode, ACM (pp. 61\u201366)."},{"key":"17_CR24","first-page":"202","volume-title":"Proceeding of IEEE symposium on computer security and privacy","author":"S Forest","year":"1994","unstructured":"Forest, S., Hofmeyr, S., Somayaji, A., & Longstaff, T. (1994). Self-nonself discrimination in a computer. In Proceeding of IEEE symposium on computer security and privacy (pp. 202\u2013212)."},{"key":"17_CR25","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/j.apm.2009.06.011","volume":"34","author":"BK Mishra","year":"2010","unstructured":"Mishra, B. K., & Jha, N. (2010). SEIQRS model for the transmission of malicious objects in computer network. Applied Mathematical Modelling, 34, 710\u2013715.","journal-title":"Applied Mathematical Modelling"},{"unstructured":"Shah, D. N. (2014). Mark Stamp\u2019s information security principles and practices (2014th ed., pp. 341\u2013342). Bengaluru: Wiley.","key":"17_CR26"},{"issue":"1927","key":"17_CR27","first-page":"700","volume":"115","author":"WO Kermack","year":"1927","unstructured":"Kermack, W. O., & McKendrick, A. G. (1927). Contributions of mathematical theory to epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, 115(1927), 700\u2013721.","journal-title":"Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character"},{"key":"17_CR28","first-page":"55","volume":"138","author":"WO Kermack","year":"1932","unstructured":"Kermack, W. O., & McKendrick, A. G. (1932). Contributions of mathematical theory to epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, 138, 55\u201383.","journal-title":"Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character"},{"key":"17_CR29","first-page":"94","volume":"141","author":"WO Kermack","year":"1933","unstructured":"Kermack, W. O., & McKendrick, A. G. (1933). Contributions of mathematical theory to epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, 141, 94\u2013122.","journal-title":"Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:05:07Z","timestamp":1577775907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_17","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}