There is a mathematical model to evaluate a cryptographic algorithm or an IDS (Intrusion Detection System)? If so, how should it be used and for what purpose?
i developed some models like nonlinear mathematical model is proposed and analyzed to study the effect of malicious object on the immune response of the computer network. Criteria for local stability, instability and global stability are obtained. It is shown that the immune response of the system decreases as the concentration of malicious objects increases, and certain criteria’s are obtained under which it settles down at its equilibrium level. This paper shows that the malicious objects have a grave effect on cyber defense mechanism. The paper has two parts – (i) in the first part a mathematical model is proposed in which dynamics of pathogen, immune response and relative characteristic of the damaged node in the network is investigated, (ii) in second part the effect of malicious object on the immune response of the network has been examined. Finally how and where to use this modeling is discussed.
There are more mathematical models you can cheek in my papers, which i have uploaded.