6Optimal Checking Policy for a Server System with a Cyber Attack

Mitsuhiro Imaizumi

Aichi Gakusen University, Japan

CONTENTS

6.1 INTRODUCTION

In this chapter, we survey a server system which is attacked from various computers at random. As Internet technology and cloud computing have developed, huge amounts of data have been generated and stored in servers. These data are collected and analyzed and their results are utilized in many areas of business. The demands for the improvement of the reliability and security of servers connected with the Internet have increased. Cyber attacks on the Internet have become a problem in ...

Get Reliability and Maintenance Modeling with Optimization now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.