350 rub
Journal Nonlinear World №6 for 2016 г.
Article in number:
Prediction of computer virus epidemics based on the method of almost periodic functions
Authors:
S.A. Lesko - Ph.D. (Eng.), Associate Professor, «Management and Model Operation of Systems» Department of Institute of complex Safety and Express Instrument Making, Moscow Technological University (MIREA). E-mail: sergey@testor.ru A.F.Gadzaov - Ph.D. (Eng.), Associate Professor, «Management and Model Operation of Systems» Department of Institute of complex Safety and Express Instrument Making, Moscow Technological University (MIREA). E-mail: gadzaov_alex@mail.ru D.O. Zhukov - Dr.Sc. (Eng.), Professor, «Management and Model Operation of Systems» Department of Institute of complex Safety and Express Instrument Making, Moscow Technological University (MIREA). E-mail: zhukov@mirea.ru
Abstract:
Methods of the almost-periodic analysis and definition of characteristics of trends solved a problem of prediction for the medium-term period of dynamics of number of computer viruses. It is revealed almost - the period lasting 16 years defining cardinal change of structure of classes of the dominating malicious applica-tions. Emergence of malicious applications of the next generation it is predicted for 2020. At the same time to the same term change of a class of Internet users is predicted.
Pages: 65-70
References

 

  1. ZHukov D.O., Gusarov A.N., Sychev I.JU., Kosareva A.V., Rogozhina M.N. Matematicheskoe modelirovanie kinetiki i topologii rasprostranenija kompjuternykh ugroz v informacionno-vychislitelnykh setjakh razlichnojj struktury s ispolzovaniem parallelnykh vychislenijj (CH. 1. Tekhnologii i algoritmy) // Promyshlennye ASU i kontrollery. 2011. № 1. S. 57─65.
  2. ZHukov D.O., Gusarov A.N., Sychev I.JU., Kosareva A.V., Rogozhina M.N. Matematicheskoe modelirovanie kinetiki i topologii rasprostranenija kompjuternykh ugroz v informacionno-vychislitelnykh setjakh razlichnojj struktury s ispolzo­vaniem parallelnykh vychislenijj (CH. II. Analiz i obsuzhdenie rezultatov) // Promyshlennye ASU i kontrollery. 2011. № 2. S. 50─58.
  3. ZHukov D.O., Gusarov A.N., Kosyreva A.V. Issledovanie ehffektivnykh strategijj rasprostranenija kompjuternykh ugroz // Vestnik kompjuternykh i informacionnykh tekhnologijj. 2010. № 7(73). S. 40─46.
  4. http://www.internetlivestats.com
  5. https://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms.
  6. Kuzmin V.I., Samokhin A.B., Gadzaov A.F., CHerdyncev V.V. Modeli i algoritmy analiza nelinejjnykh kolebanijj s trendom. M.: MIREHA. 2015. 94 s.
  7. Kuzmin V.I., Gadzaov A.F. Metody postroenija modelejj po ehmpiricheskim dannym: Ucheb. posobie. M.: MGTU MIREHA. 2012. 96 s.