Research Article Stability and Bifurcation of a Computer ...
Transcript of Research Article Stability and Bifurcation of a Computer ...
Research ArticleStability and Bifurcation of a Computer Virus PropagationModel with Delay and Incomplete Antivirus Ability
Jianguo Ren1 and Yonghong Xu2
1 College of Computer, Jiangsu Normal University, Xuzhou 221116, China2 College of Live Science, Jiangsu Normal University, Xuzhou 221116, China
Correspondence should be addressed to Jianguo Ren; [email protected]
Received 12 March 2014; Revised 11 August 2014; Accepted 11 August 2014; Published 30 September 2014
Academic Editor: Jose R. C. Piqueira
Copyright Β© 2014 J. Ren and Y. Xu. This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
A new computer virus propagation model with delay and incomplete antivirus ability is formulated and its global dynamics isanalyzed.The existence and stability of the equilibria are investigated by resorting to the threshold value π
0. By analysis, it is found
that the model may undergo a Hopf bifurcation induced by the delay. Correspondingly, the critical value of the Hopf bifurcationis obtained. Using Lyapunov functional approach, it is proved that, under suitable conditions, the unique virus-free equilibriumis globally asymptotically stable if π
0< 1, whereas the virus equilibrium is globally asymptotically stable if π
0> 1. Numerical
examples are presented to illustrate possible behavioral scenarios of the mode.
1. Introduction
With the rapid developments of information and communi-cation technologies, computer has brought great convenienceto our life. While enjoying the convenience from Internet,people have to confront the threat of virus intrusions. As thedamaging programs, computer viruses parasitize themselveson a host mainly through the Internet and have also becomean enormous threat to computers and network resources.So, understanding and predicting the dynamics of computervirus propagation are, therefore, an important pursuit. Con-sequently, a number of computer virus propagation models,ranging from conventional SIR compartment model [1β3]to its extensions [4β16], were proposed by borrowing fromclassical epidemic models to investigate the behaviors ofcomputer virus propagation over network.
There is something strikingly different between computerviruses and biological viruses: computer viruses in latentstatus possess infectivity [17β19]. Consequently, recentlyproposed models can distinguish latent computers frominfected ones by introducing the πΏ and π΅ compartments [17β19], named as the S(susceptible)-L(latent)-B(breaking-out)-S(susceptible) model, which represents the dynamics of virusby systems of ordinary differential equations.
One common feature shared by a computer virus islatency [20], which means that, when viruses enter in a host,they do not always immediately break out, but they hidethemselves and only become active after a certain period.It is therefore easy to show that there is an inevitable delayfrom virus invasion to its outbreak. On the other hand, in realnetworks, the limited cost results in the incomplete antivirusability. Indeed, when attempting to model computer viruspropagation, some of characteristics of viruses and networksshould be taken into consideration.
In this paper, a new computer virus propagation model,which incorporates simultaneously the above-mentionedaspects, is established. The aim is to extend and analyzethe SLBS computer virus propagation model without delayand incomplete antivirus ability first proposed by Yang etal. [17β19]. This study is motivated by the fact that thedelay plays a key role and is inevitably a complex impacton the investigation of computer virus spreading behaviors[21]. The incorporation of the delay and incomplete antivirusability of networks makes the model more realistic butits mathematical qualitative analysis may be difficult. Inour model, the existence and stability of the equilibria areinvestigated by resorting to the threshold value π
0, a certain
condition. By analysis, it is found that themodelmay undergo
Hindawi Publishing CorporationMathematical Problems in EngineeringVolume 2014, Article ID 475934, 9 pageshttp://dx.doi.org/10.1155/2014/475934
2 Mathematical Problems in Engineering
aHopf bifurcation induced by the delay. Correspondingly, thecritical value π
0of the Hopf bifurcation is obtained. When
delay π < π0, the virus spreading is stable and easy to
protect; whereas π > π0, the virus spreading is unstable and
out of control. Applying Lyapunov functional approach, itis proven that the unique virus-free equilibrium is globallyasymptotically stable under certain condition if π
0< 1,
whereas the virus equilibrium is globally asymptoticallystable if π
0> 1. Numerical examples are presented to
demonstrate the analytical results and to illustrate possiblebehavioral scenarios of the mode. Our results may providesome understanding of the spreading behaviors of computerviruses.
The organization of this paper is as follows. In the nextsection, we present the mathematical model to be discussed.In Section 3, we study the existence and local and globalstability of the virus-free and virus equilibria, respectively,and investigate the Hopf bifurcation. In Section 4, numericalexamples are presented to demonstrate the analytical results.Finally, some conclusions are given in Section 5.
2. Mathematical Model
Consider the typical SLBSmode [17β19], which is formulatedas the following system of ordinary differential equations:
dπdπ‘
= π β π½π (π‘) πΏ (π‘) β π½π (π‘) π΅ (π‘) + πΎπ΅ (π‘) β ππ (π‘) ,
dπΏdπ‘
= π½π (π‘) πΏ (π‘) + π½π (π‘) π΅ (π‘) β πΌπΏ (π‘) β ππΏ (π‘) ,
dπ΅dπ‘
= πΌπΏ (π‘) β πΎπ΅ (π‘) β π (π‘) π΅.
(1)
Here, it is assumed that a computer (or node) is categorizedas internal or external depending on whether or not itis currently connected to the network. The total numberof computers connected to the network is divided intothree compartments: internal uninfected compartment, (i.e.,virus-free computers), internal infected compartment wherecomputers are currently latent (latent computers, for short),and internal infected compartment where computers are cur-rently breaking out (breaking-out computers, for short). Letπ(π‘), πΏ(π‘), and π΅(π‘) denote their corresponding percentagesat time π‘, respectively. This model involves four positiveparameters: π denotes the rate at which external virus-freecomputers are connected to the network and at which aninternal node is disconnected from the network; π½ denotesthe rate at which, when having connection to one latent orbreaking-out computer, one virus-free computer can becomeinfected; πΎ denotes the rate at which a breaking-out computergets a scan by running the antivirus software; πΌ denotes therate at which the latent computer is triggered.
By carefully considering the natures of computer virus,the following assumptions are made.
(i) At time π‘, the transition from the latent to thebreaking-out is given by πΏ(π‘βπ), whichmeans a latentcomputer moves into the breaking-out compartmentafter a period of time π.
(ii) Since the antivirus ability is incomplete, at time π‘, thebreaking-out computers may either be temporarilysuppressed in their latency with probability π or becured into the virus-free ones with probability (1β π),where π > 0 is a constant. If π = 0, then the antivirusability is fully effective, whereas π = 1 means thatantivirus ability is utterly ineffective.
Based on the assumptions above, one can obtain the followingcomputer virus propagation model:
dπdπ‘
= π β π½π (π‘) πΏ (π‘) β π½π (π‘) π΅ (π‘)
+ (1 β π) πΎπ΅ (π‘) β ππ (π‘) ,
dπΏdπ‘
= π½π (π‘) πΏ (π‘) + π½π (π‘) π΅ (π‘)
β πΌπΏ (π‘ β π) + ππΎπ΅ (π‘) β ππΏ (π‘) ,
dπ΅dπ‘
= πΌπΏ (π‘ β π) β πΎπ΅ (π‘) β π (π‘) π΅.
(2)
Let π(π‘) + πΏ(π‘) + π΅(π‘) = 1. Thus, model (2) can be written asthe following:
dπΏdπ‘
= π½ [1 β πΏ (π‘) β π΅ (π‘)] [πΏ (π‘) + π΅ (π‘)]
β πΌπΏ (π‘ β π) + ππΎπ΅ (π‘) β ππΏ (π‘) ,
dπ΅dπ‘
= πΌπΏ (π‘ β π) β πΎπ΅ (π‘) β ππ΅ (π‘) .
(3)
All the parameters are positive constants. The initial condi-tions are
(π1(π) , π
2(π)) β πΆ
+= ((βπ, 0] , π
2
+) , π
π(π) > 0, π = 1, 2,
(4)
where π 2
+= {(πΏ, π΅) β π
2, πΏ β₯ 0, π΅ β₯ 0}.
3. Model Analysis
In this section, we intended to study the dynamical behaviorsof model (3). First, a threshold value π
0is defined as the
number of virus-free computers that are infected by a singlecomputer virus during its lift span. The threshold value π
0
plays a key role in the epidemic dynamics. By resorting to it,the existence and stability of the equilibria can be determined.Generally speaking, if π
0< 1, the virus-free equilibrium is
globally asymptotically stable, and when π 0
> 1, the virusequilibrium exists and is globally asymptotically stable. Adirect computation gives
π 0=
π½ (πΌ + π + πΎ)
(π + πΌ) (π + πΎ) β πΌππΎ. (5)
3.1. Stability of Virus-Free Equilibrium. It is clear that model(3) always admits unique virus-free equilibrium πΈ
0(0, 0). We
Mathematical Problems in Engineering 3
first consider its stability. For model (3), the correspondingcharacteristic equation at πΈ
0is
π2+ π1π + π
0+ (πΌπ + π
0) πβππ
= 0, (6)
which is similar to the relative forms in [22β24], where
π1= 2π + πΎ β π½,
π0= (π β π½) (π + πΎ) ,
π0= [(π + πΎ) β (π½ + ππΎ)] πΌ.
(7)
Our aim is to investigate the stability behavior in the case π =
0. Obviously, (6) is a transcendental equation, and ππ (π > 0)
is its root if and only if π satisfies
βπ2+ π1ππ + π
0= β (πΌππ + π
0) (cos ππ β π sin ππ) . (8)
Separating the real and imaginary parts, we have
βπ2+ π0= βπ0cos ππ β πΌπ sin ππ
π1π = βπΌπ cos ππ + π
0sin ππ.
(9)
Eliminating π by squaring and adding (9), we obtain apolynomial in π as
π4+ (π2
1β πΌ2β 2π0) π2+ π2
0β π2
0= 0, (10)
where
π2
1β 2π0β πΌ2= [(π β π½) + (π + πΎ)]
2
β 2 (π β π½) (π + πΎ) β πΌ2
= (π + πΎ)2+ (π β π½)
2β πΌ2,
π0+ π0= (π β π½) (π + πΎ) + (π + πΎ) πΌ β (π½ + ππΎ) πΌ
= (π + πΎ) (π + πΌ) β πΌππΎ β π½ (π + πΎ + πΌ)
= [(π + πΎ) (π + πΌ) β πΌππΎ] (1 β π 0) > 0,
π0β π0= (π β π½) (π + πΎ) β (π + πΎ) πΌ + (π½ + ππΎ) πΌ
= (π β π½ β πΌ) (π + πΎ) + πΌπ½ + πΌππΎ,
π2
0β π2
0= (π0+ π0) (π0β π0)
= {[(π + πΎ) (π + πΌ) β πΌππΎ] (1 β π 0)}
Γ {(π β π½ β πΌ) (π + πΎ) + πΌπ½ + πΌππΎ} .
(11)
Clearly, if π > πΌ+π½, thenπ2
1β2π0βπΌ2> 0 andπ
2
0βπ2
0> 0. It
follows from the Hurwitz criterion that the roots of (10) havenegative real parts. Hence, we have the following.
Theorem 1. When π 0
< 1, the virus-free equilibrium πΈ0is
locally asymptotically stable for all π > 0 provided that π >
πΌ + π½.Now, it is the turn to examine the global stability of virus-
free equilibrium. The following theorem is obtained.
Theorem 2. When π 0
< 1, the virus-free equilibrium πΈ0is
globally asymptotically stable for all π > 0.
Proof. By use of the Lyapunov Direct Method, consider thefollowing function:
π (πΏ, π΅) = πΏ + π΅. (12)
It is clear that π is a positive definite. Then the derivative ofπ is
οΏ½οΏ½ (πΏ, π΅) =ddπ‘
(1 β π)
= βπ + π½π (πΏ + π΅) β (1 β π) πΎπ΅ + ππ
= π (π β 1) + π½π (1 β π) β (1 β π) πΎπ΅
= (π β 1) (π β π½π) β (1 β π) πΎπ΅.
(13)
If π > πΌ + π½ hold, then (π β 1)(π β π½π) < 0. Furthermore,οΏ½οΏ½(πΏ, π΅) < 0 by the Lyapunov-LaSalle type theorem shows thatlimπ‘ββ
πΏ(π‘) = 0 and limπ‘ββ
π΅(π‘) = 0. Hence, when π 0< 1,
the virus-free equilibrium πΈβis globally asymptotically sta-
ble.
3.2. Stability of Virus Equilibrium. Next, we examine thestability of virus equilibrium. After direct computations, theunique virus equilibrium πΈ
β(πΏβ, π΅β) of model (3) reads
πΏβ=
(πΎ + π) π΅β
πΌ=
(πΎ + π) (π 0β 1)
π 0(πΎ + π + πΌ)
,
π΅β=
π½πΌ (πΎ + π + πΌ) β πΌ (πΎ + π) (π + πΌ) + πΌ2ππΎ
π½(πΎ + π + πΌ)2
=πΌ (π 0β 1)
π 0(πΎ + π + πΌ)
.
(14)
If π 0
< 1, the πΈβ(πΏβ, π΅β) does not exist. It suffices to show
the local asymptotical stability of πΈβfor model (3). Indeed,
the Jacobian matrix of the linearized system of this systemevaluated at πΈ
βis
(π½ β 2π½ (πΏ
β+ π΅β) β π β πΌπ
βππβ π π½ β 2π½ (πΏ
β+ π΅β) + ππΎ
πΌπβππ
β (π + πΎ) β π) .
(15)
Its characteristic equation is
π2+ π1π + π0+ (πΌπ + π
0) πβππ
= 0, (16)
where
π1= 2π + πΎ β π½ + 2π½ (πΏ
β+ π΅β) ,
π0= (π β π½) (π + πΎ) + 2π½ (π + πΎ) (πΏ
β+ π΅β) ,
π0= (π + πΎ) πΌ β [π½ + ππΎ β 2π½ (πΏ
β+ π΅β)] πΌ.
(17)
In the case π = 0, for our purpose, if ππ (π > 0) is a solutionof (16), separating real and imaginary parts, we derive that
βπ2+ π1ππ + π
0= β (πΌππ + π
0) (cos ππ β π sin ππ) . (18)
4 Mathematical Problems in Engineering
Separating the real and imaginary parts yields
βπ2+ π0= βπ0cos ππ β πΌπ sin ππ,
π1π = βπΌπ cos ππ + π
0sin ππ.
(19)
Eliminating π by squaring and adding (19), we obtain apolynomial in π as
π4+ (π2
1β πΌ2β 2π0) π2+ π2
0β π2
0= 0. (20)
For convenience, let β1
β π2
1β πΌ2β 2π0and β
2β π2
0β π2
0.
If β1
> 0 and β2
> 0, then both of the two roots of (20)have negative real parts. By theHurwitz criterion,πΈ
βis locally
asymptotically stable for all π > 0. However, if β1
< 0 andβ2> 0, then (20) has the positive root π
1= (1/2)(πΌ
2+ 2π0β
π2
1+ β(π
2
1β πΌ2 β 2π
0)2β 4(π2
0β π2
0)). It follows that (16) has
a positive root. Say, the characteristic equation (16) has a pairof imaginary roots Β±ππ
0, and corresponding delay π
0is given
by (19):
π0=
1
πarccos[
π2(1 β πΌπ
1) β π0
π2πΌ2 + π0
] +2ππ
π,
π = 0, 1, 2, 3, . . . .
(21)
Furthermore, we can also verify the transversality conditiondR((π(π)))/dπβ
π=π0> 0. Then, we establish the following
theorem.
Theorem 3. With π 0> 1, model (3) has a unique virus equi-
librium πΈβ. Furthermore,
(1) πΈβis locally asymptotically stable when π < π
0and is
unstable when π > π0, where
π0=
1
πarccos[
π2(1 β πΌπ
1) β π0
π2πΌ2 + π0
] +2ππ
π,
π = 0, 1, 2, 3, . . . ;
(22)
(2) when π = π0, the model (3) undergoes a Hopf bifurca-
tion.Now, we are ready to examine the global stability of virus equi-librium πΈ
β. Then we have the following.
Theorem4. Whenπ 0> 1, the virus equilibriumπΈ
βis globally
asymptotically stable.
Proof. We consider the following function:
π1(πΏ, π΅) =
1
2[(πΏ β πΏ
β) + (π΅ β π΅
β)]2+
1
2π(πΏ β πΏ
β)2, (23)
where π is a positive constant to be determined. The deriva-tive of π
1is
οΏ½οΏ½1(πΏ, π΅) = (π β π
β)dπdπ‘
+ π (πΏ β πΏβ)dπΏdπ‘
= (π β πβ) [βπ½ (π β π
β) (1 β π β π
β)
β (1 β π) πΎ (πΏ β πΏβ)
β [(1 β π) πΎ + π] (π β πβ)]
+ π (πΏ β πΏβ) [π½ (π β π
β) (1 β π β π
β)
β πΌ (πΏπ β πΏβ) β ππΎ (π β π
β)
β (ππΎ + π) (πΏ β πΏβ)]
= [π½ (π + πββ 1) β (1 β π) πΎ β π]
Γ (π β πβ)2β π (ππΎ + π) (πΏ β πΏ
β)2
β ππΌ (πΏ β πΏβ) (πΏπ β πΏ
β)
+ [ππ½ (1 β π β πβ) β πππΎ β (1 β π) πΎ]
Γ (π β πβ) (πΏ β πΏ
β)
= π½ (π β 1) (π β πβ)2+ [π½πββ (1 β π) πΎ β π]
Γ (π β πβ)2β π (ππΎ + π) (πΏ β πΏ
β)2
β ππΌ (πΏ β πΏβ) (πΏπ β πΏ
β)
+ [ππ½ (1 β π β πβ) β πππΎ β (1 β π) πΎ]
Γ (π β πβ) (πΏ β πΏ
β)
= π½ (π β 1) (π β πβ)2β
(π + πΎ) (1 β π) πΎ
πΌ + π + πΎ
Γ (π β πβ)2β π (ππΎ + π) (πΏ β πΏ
β)2
β ππΌ (πΏ β πΏβ) (πΏπ β πΏ
β)
+ [ππ½ (1 β π β πβ) β πππΎ β (1 β π) πΎ]
Γ (π β πβ) (πΏ β πΏ
β)
= β [(π + πΎ) (1 β π) πΎ
πΌ + π + πΎ(πββ π)2
+ π (ππΎ + π) (πΏ β πΏβ)2
β [ππ½ (π β 1) + ππ½πβ+ πππΎ + (1 β π) πΎ]
Γ (πββ π) (πΏ β πΏ
β)]
+ π½ (π β 1) (π β πβ)2
β ππΌ (πΏ β πΏβ) (πΏπ β πΏ
β) .
(24)
Let(π + πΎ) (1 β π) πΎ
πΌ + π + πΎΓ π (ππΎ + π) β₯ 2ππ½ (π β 1)
+ 2ππ½πβ+ 2πππΎ + 2 (1 β π) πΎ.
(25)
That is,
(π + πΎ) (1 β π) πΎ
πΌ + π + πΎΓ π (ππΎ + π) β 2π (π½π
β+ ππΎ) β₯ (1 β π) πΎ,
(26)
Mathematical Problems in Engineering 5
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
The number of latent nodes L
The n
umbe
r of b
reak
ing
node
s B
β0.05β0.05
E0
Figure 1: Phase diagram of πΏ(π‘) and π΅(π‘) in the case π½ = 0.02, πΌ =
0.23, π = 0.4, πΎ = 0.58, π = 0.35, and π = 1 under the different valuesof πΏ(0) and π΅(0).
0 1 2 3 4 5 6 7 8 9 10
0
0.05
0.1
0.15
0.2
Time t
β0.05
L+B
Figure 2: Evolutions of πΏ(π‘) + π΅(π‘) in the case π½ = 0.05, πΌ = 0.3,π = 0.4, πΎ = 0.58, π = 0.18, and π = 2 under the values of πΏ(0) = 0.1
and π΅(0) = 0.1.
under the condition of (π + πΎ)(1 β π)π(ππΎ + π) β 2(π½πβ
+
ππΎ)(πΌ + π + πΎ) > 0, from which we can conclude that π >
(1βπ)πΎ(πΌ+π+πΎ)/((π+πΎ)(1βπ)π(ππΎ+π)β2(π½πβ+ππΎ)(πΌ+π+πΎ)).
In addition, suppose that π is small enough, thenπΏπ β πΏ.Theylead to π < 0. Applying the Lyapunov-LaSalle type theorem,it shows that lim
π‘ββπΏ(π‘) = πΏ
βand lim
π‘ββπ΅(π‘) = π΅
β.
Hence, when π 0
> 1, the virus equilibrium πΈβis globally
asymptotically stable.
4. Numerical Simulations and Discussion
In this section, numerical simulations are carried out tosupport the analytical conclusion and to illustrate possiblebehavioral scenarios of the model. Figure 1 exhibits theevolutions of πΏ(π‘) and π΅(π‘) with time, where the virus-free
0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 0.6 0.65
0.16
0.18
0.2
0.22
0.24
0.26
0.28
0.3
L
B
Eβ
Figure 3: Phase diagramofπΏ(π‘) andπ΅(π‘) in the caseπ½ = 0.4,πΌ = 0.1,π = 0.05, πΎ = 0.15, π = 0.5, π = 1, π
0= 5.33 > 1, and πΈ
β=
(0.542, 0.271) under the different values of πΏ(0) and π΅(0).
0 2 4 6 8 10 12 14 16 18 200.5
0.55
0.6
0.65
0.7
0.75
0.8
0.85
0.9L+B
Time t
Figure 4: Evolutions of πΏ(π‘) + π΅(π‘) in the case π½ = 0.56, πΌ = 0.15,π = 0.05, πΎ = 0.15, π = 0.5, π = 3, and π
0= 6.817 > 1 under the
values of πΏ(0) = 0.3 and π΅(0) = 0.2.
equilibrium is globally asymptotically stable, consistent withTheorem 2. Furthermore, an equilibrium is virus-free if andonly if πΏ(π‘) + π΅(π‘) = 0, which means that the virus would beextinct in the network, as shown inFigure 2. Figure 3 plots theevolutions of πΏ(π‘) and π΅(π‘) with time. One can observe that,for any initial state, the solution would approach a fixed level;that is, the virus equilibrium is globally asymptotically stable.Besides, an equilibrium is viral if and only if πΏ(π‘) + π΅(π‘) =
0, and its global asymptotical stability means that the virusspreads in the network continuously and stably, as shownin Figure 4. Figure 5 illustrates the complex impacts of delayπ on the spreading behavior of the virus. The evolutions ofcomparing π < π
0with π > π
0between πΏ(π‘) and π΅(π‘) are
carried out. It can be seen that, virus equilibrium πΈβis stable
when π < π0and then when delay π increases to the critical
6 Mathematical Problems in Engineering
0 50 100 150 200 250 300 350 400 450 5000
0.2
0.4
0.6
0.8
Time t0 50 100 150 200 250 300 350 400 450 500
Time t
Lant
ent a
nd b
reak
ing
com
pute
rs
Lant
ent a
nd b
reak
ing
com
pute
rs
L
B
L
B
0
0.5
1π < π0 π > π0
β0.5
Figure 5: Evolutions of comparison of π < π0with π < π
0between πΏ(π‘) and π΅(π‘) in the case π½ = 0.85, πΌ = 0.85, π = 0.2, πΎ = 0.095, π = 0.85,
π = 2.3 (left) and π = 2.4 (right), π 0= 4.05 > 1, and πΈ
β= (0.193, 0.559) under the values of πΏ(0) = 0.006 and π΅(0) = 0.001.
0 100 200 300 400 500 600 7000
0.2
0.4
0.6
0.8
Late
nt an
d br
eaki
ng co
mpu
ters
0
0.2
0.4
0.6
0.8
Late
nt an
d br
eaki
ng co
mpu
ters
0
0.2
0.4
0.6
0.8
Late
nt an
d br
eaki
ng co
mpu
ters
0
0.2
0.4
0.6
0.8La
tent
and
brea
king
com
pute
rs
B
L
B
L
B
L
B
L
0 100 200 300 400 500 600 700 0 100 200 300 400 500 600 700
0 100 200 300 400 500 600 700
π = 5π = 10
π = 15π = 25
Time t
Time t Time t
Time t
Figure 6: Evolutions of πΏ(π‘) and π΅(π‘) with the different values of time delay π in the case π½ = 0.85, πΌ = 0.85, π = 0.2, πΎ = 0.95, π = 0.85,π 0= 3.26 > 1, and πΈ
β= (0.399, 0.295) under the values of πΏ(0) = 0.006 and π΅(0) = 0.001.
Mathematical Problems in Engineering 7
0 10 20 30 40 50 60 70 80 90 1000.3
0.35
0.4
0.45
0.5
0.55
0.6
0.65
0 10 20 30 40 50 60 70 80 90 100
L
0.1
0.15
0.2
0.25
0.3
0.35
0.4
B
πΎ = 0.15
πΎ = 0.55πΎ = 0.15
πΎ = 0.55
Time t Time t
Figure 7: Evolutions of πΏ(π‘) and π΅(π‘) with the different scan rates in the case π½ = 0.85, πΌ = 0.25, π = 0.2, π = 0.15, and π = 2.5 under thevalues of πΏ(0) = 0.6 and π΅(0) = 0.2.
0 10 20 30 40 50 60 70 80 90 1000.35
0.4
0.45
0.5
0.22
0.24
0.26
0.28
0.3
0.32
0.34
0.36
0.38
Time t0 10 20 30 40 50 60 70 80 90 100
Time t
L
e = 0.35
e = 0.65
e = 0.35
e = 0.65
B
Figure 8: Evolutions of πΏ(π‘) and π΅(π‘) with the different parameter π in the case π½ = 0.85, πΌ = 0.25, π = 0.2, πΎ = 0.35, and π = 2.5 under thevalues of πΏ(0) = 0.6 and π΅(0) = 0.2.
value π0, it loses its stability and aHopf bifurcation arises; then
it exceeds the value of π0beyond which the virus propagation
will become unstable, in agreement with Theorem 3. InFigure 6, the effect of delay with π β (5, 10, 15, 25) on thenumber of latent and breaking-out computers is illustrated.The role of key parameters πΎ and π in the variation of the latentand breaking-out compartments is shown in Figures 7-8. Asexpected, one can observe that, for higher value of scan ratesπΎ, the percentage of latent computers increases, in contrastto that of breaking-out ones. However, the percentages ofboth latent and breaking-out computers rise as π increases.Figure 9 shows the appearance of periodic solutions with thetransmission from the stable state to the unstable one.
5. Conclusions
In real networks, the outbreak of computer virus usually lagsand the antivirus ability of network is not fully complete.Aiming at characterizing these situations, a new computervirus propagation model is established. By theoretical anal-ysis, the following conclusions can be obtained.
(1) If π 0< 1 hold, the virus-free equilibrium πΈ
0is glob-
ally asymptotically stable under certain conditions forall π > 0, which implies that the viruswould be extinctin the network. In such conditions, it is unnecessaryfor us to take practices in a real network. Say, the virusshould be left alone.
8 Mathematical Problems in Engineering
0
0.2
0.4
0.6
0.8
1
Late
nt an
d br
eaki
ng co
mpu
ters
L
B
0 10 20 30 40 50 60 70 80 90 100Time t
Figure 9: Appearance of periodic solutions in the case π½ = 0.85, πΌ =
0.85, π = 0.2, πΎ = 0.095, π = 0.85, π = 2.375, and πΈβ= (0.193, 0.559)
under the values of πΏ(0) = 0.35 and π΅(0) = 0.45.
(2) If π 0
> 1 hold, the virus equilibrium πΈ0is globally
asymptotically stable, which means that the virusesspread in the network continuously and stably. Inthis case, some efforts can be made to keep the virusprevalence to below a proper level.
(3) The critical delay π0where the Hopf bifurcation
occurs is obtained, where
π0=
1
πarccos[
π2(1 β πΌπ
1) β π0
π2πΌ2 + π0
] +2ππ
π,
π = 0, 1, 2, 3, . . . .
(27)
(4) When the delay π < π0, the virus propagation is stable.
In such conditions, the spreading behavior of viruswould be divinable.
(5) When the delay π > π0, the virus propagation is unsta-
ble. In such conditions, the virus spreading would beout of control.
Moreover, numerical simulations are presented to demon-strate the analytical results and to illustrate possible behav-ioral scenarios of the model. It is shown that
(1) For virus equilibrium, the larger the delay is, thelonger it takes to settle down towards its steady states.
(2) As expected, the increase of the scan rate can reducethe percentage of the breaking-out computers butincrease the percentage of the latent ones, which sug-gests that we run the antivirus software as often aspossible.
(3) As expected, the increase of the antivirus ability ofthe software can reduce the percentage of the infected
(latent and breaking-out) computers in the network,which suggests that we invest more in their develop-ments.
Our results may provide some understanding of the spread-ing behaviors of computer viruses.
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper.
Acknowledgments
Thiswork is supported by theNational Natural Science Foun-dation of China underGrant no. 61304117, theNatural ScienceFoundation of the Jiangsu Higher Education Institutions ofChina under Grant no. 13KJB520008, and the DoctorateTeacher Support Project of Jiangsu Normal University underGrant no. 12XLR021.
References
[1] J. O. Kephart, T. Hogg, and B. A. Huberman, βDynamics ofcomputational ecosystems,β Physical Review A, vol. 40, no. 1, pp.404β421, 1989.
[2] J. C. Wierman and D. J. Marchette, βModeling computer virusprevalence with a susceptible-infected-susceptible model withreintroduction,βComputational Statistics andDataAnalysis, vol.45, no. 1, pp. 3β23, 2004.
[3] J. R. C. Piqueira and V. O. Araujo, βA modified epidemiologicalmodel for computer viruses,βApplied Mathematics and Compu-tation, vol. 213, no. 2, pp. 355β360, 2009.
[4] J. G. Ren, X. F. Yang, Q. Y. Zhu, L. X. Yang, and C. Zhang,βA novel computer virus model and its dynamics,β NonlinearAnalysis: Real World Applications, vol. 13, no. 1, pp. 376β384,2012.
[5] B. K.Mishra andD. K. Saini, βSEIRS epidemicmodel with delayfor transmission of malicious objects in computer network,βAppliedMathematics and Computation, vol. 188, no. 2, pp. 1476β1482, 2007.
[6] M. Draief, A. Ganesh, and L. Massoulie, βThresholds for virusspread on networks,β The Annals of Applied Probability, vol. 18,no. 2, pp. 359β378, 2008.
[7] B. K.Mishra andN. Jha, βSEIQRSmodel for the transmission ofmalicious objects in computer network,β Applied MathematicalModelling, vol. 34, no. 3, pp. 710β715, 2010.
[8] B. K. Mishra and N. Jha, βFixed period of temporary immu-nity after run of anti-malicious software on computer nodes,βAppliedMathematics and Computation, vol. 190, no. 2, pp. 1207β1212, 2007.
[9] Q. Zhu, X. Yang, and J. Ren, βModeling and analysis ofthe spread of computer virus,β Communications in NonlinearScience and Numerical Simulation, vol. 17, no. 12, pp. 5117β5124,2012.
[10] C. Gan, X. Yang, W. Liu, Q. Zhu, and X. Zhang, βAn epidemicmodel of computer viruses with vaccination and generalizednonlinear incidence rate,β Applied Mathematics and Computa-tion, vol. 222, pp. 265β274, 2013.
Mathematical Problems in Engineering 9
[11] C. Zhang, Y. Zhao, and Y.Wu, βAn impulse model for computerviruses,β Discrete Dynamics in Nature and Society, vol. 2012,Article ID 260962, 13 pages, 2012.
[12] S. Kondakci, βEpidemic state analysis of computers undermalware attacks,β SimulationModelling Practice andTheory, vol.16, no. 5, pp. 571β584, 2008.
[13] F. G. Wang, Y. K. Zhang, C. G. Wang, J. F. Ma, and S. J.Moon, βStability analysis of a SEIQV epidemic model for rapidspreading worms,β Computers and Security, vol. 29, no. 4, pp.410β418, 2010.
[14] L. P. Song, Z. Jin, G. Q. Sun, J. Zhang, and X. Han, βInfluence ofremovable devices on computer worms: dynamic analysis andcontrol strategies,βComputers &Mathematics with Applications,vol. 61, no. 7, pp. 1823β1829, 2011.
[15] J. Amador, βThe stochastic SIRA model for computer viruses,βApplied Mathematics and Computation, vol. 232, pp. 1112β1124,2014.
[16] K. M. Fuhrman, G. A. Pinter, and J. A. Berges, βDynamics ofa virus-host model with an intrinsic quota,β Mathematical andComputer Modelling, vol. 53, no. 5-6, pp. 716β730, 2011.
[17] L. Yang, X. Yang, L. Wen, and J. Liu, βA novel computer viruspropagation model and its dynamics,β International Journal ofComputer Mathematics, vol. 89, no. 17, pp. 2307β2314, 2012.
[18] X. Yang and L.-X. Yang, βTowards the epidemiological mod-eling of computer viruses,β Discrete Dynamics in Nature andSociety, vol. 2012, Article ID 259671, 2012.
[19] L. Yang, X. Yang, Q. Zhu, and L. Wen, βA computer virusmodel with graded cure rates,β Nonlinear Analysis: Real WorldApplications, vol. 14, no. 1, pp. 414β422, 2013.
[20] Y. B. Kafai, βUnderstanding virtual epidemics: childrenβs folkconceptions of a computer virus,β Journal of Science Educationand Technology, vol. 17, no. 6, pp. 523β529, 2008.
[21] Z. H. Zuo, Q. X. Zhu, and M. T. Zhou, βOn the time complexityof computer viruses,β IEEE Transactions on InformationTheory,vol. 51, no. 8, pp. 2962β2966, 2005.
[22] D. Li and W. Ma, βAsymptotic properties of a HIV-1 infectionmodel with time delay,β Journal of Mathematical Analysis andApplications, vol. 335, no. 1, pp. 683β691, 2007.
[23] R. Naresh, A. Tripathi, and D. Sharma, βA nonlinear AIDSepidemic model with screening and time delay,β Applied Math-ematics and Computation, vol. 217, no. 9, pp. 4416β4426, 2011.
[24] J. Wang, J. Zhang, and Z. Jin, βAnalysis of an SIR modelwith bilinear incidence rate,β Nonlinear Analysis: Real WorldApplications, vol. 11, no. 4, pp. 2390β2402, 2010.
Submit your manuscripts athttp://www.hindawi.com
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttp://www.hindawi.com
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
CombinatoricsHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com
Volume 2014 Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Stochastic AnalysisInternational Journal of