IJIET 2013 Vol.3(3): 300-303 ISSN: 2010-3689
Hacking-Vigilance Distribution with Application to Assess Cyber Insecurity Level
—Hacking into other’s computers for a variety of reasons is a serious concern and nightmare to government agencies, private and public institutions in almost all parts of the world in this fast communication age of 21st
century. The owners of confidential and sensitive files are consciously and constantly undertaking vigilances to protect their files from hackers
. They are refereed here vigilantes
. The intrusions are increased by the hacker’s efforts
when the vigilances are weaker. When the intrusion rate,
is more, the vigilante’s efforts
are bumped up. Both the hacker’s and vigilante’s efforts are latent, non-observable and hence are treated in this article as parameters
. Only the number of intrusions is observable and hence is treated as a random variable
This article introduces a new probability model connecting Y p
and names it as Hacking-Vigilance Distribution (HVD)
. After deriving the properties of HVD, this article demonstrates their use to analyze and interpret computer intrusions data.
—Computer intrusion, mean-variance relation, poisson, cyber intrusion, count and chi-squared distributions.
R. Shanmugam is with the School of Health Administration, Texas State University - San Marcos 78666, USA (e-mail: firstname.lastname@example.org).
Cite:Ramalingam Shanmugam, "Hacking-Vigilance Distribution with Application to Assess Cyber Insecurity Level," International Journal of Information and Education Technology vol. 3, no. 3, pp. 300-303, 2013.