Abstract

With the rapid popularization of the Internet, computers can enter or leave the Internet increasingly frequently. In fact, no antivirus software can detect and remove all sorts of computer viruses. This implies that viruses would persist on the Internet. To better understand the spread of computer viruses in these situations, a new propagation model is established and analyzed. The unique equilibrium of the model is globally asymptotically stable, in accordance with the reality. A parameter analysis of the equilibrium is also conducted.

1. Introduction

The past few decades have witnessed the overflow of computer viruses. What is more serious is that enormous financial losses and social panic have also been caused by them [1]. Consequently, it is necessary to study the propagation behavior of computer viruses and to explore some effective defense measures. Undoubtedly, dynamical modeling is one of the most effective approaches.

To portray the important feature of computer viruses that, in general, an infected computer has infectivity during its latent period, Yang et al. [2] proposed an (susceptible-latent-breaking-susceptible) model, in which infected computers are divided into two groups: computers and computers, and every computer possesses infectivity.

Based on this model and the fact that, in general, an infected computer would possess temporary immunity when it is cured by installing the latest version of antivirus software, an (susceptible-latent-breaking-recovered-susceptible) model (see Figure 1) is studied in [3].

Unfortunately, there are three main flaws in this model. On one hand, this model ignores the effect of infected computers connected to the Internet. Due to the fact that no antivirus software can detect and clear all sorts of computer viruses [4] and computers can enter or leave the Internet easily, the entering computers should not be regarded as susceptible completely. On the other hand, this model neglects the impact of antivirus software. With the rapid advance of computer and communication technologies, it has never been easier to obtain the latest version of antivirus software. This implies that every susceptible or latent computer can be recovered directly. Finally, this model overlooks the influence of reinstalling the operating system. In reality, operating systems often need to be reinstalled, under which the latent or breaking computer would become susceptible.

To overcome the above mentioned defects, a new reasonable model (see Figure 2) is investigated in this paper. The existence and global stability of the equilibrium are not only proved by mathematical analysis but also displayed by numerical simulation. A parameter analysis of the equilibrium is also included.

The rest of this paper is structured as follows. Section 2 formulates the new model. Section 3 mainly considers the global stability of the equilibrium. Finally, Section 4 summarizes this work.

2. Model Formulation

Applying the same model assumptions in [3] to the new model, it follows from Figure 2 that the corresponding differential system is where , , , and represent, at time , the average numbers of susceptible, latent, breaking, and recovered computers, respectively. Their entering rates are , , , and , respectively. The explanations of the rest of parameters are as follows: (i) the breaking rate.(ii): the incidence rate.(iii): the recovered rate.(iv): the rate of a computer leaving the Internet.(v): the rate of a recovered computer losing immunity.(vi): the rate of an infected computer reinstalling the operating system.

Let , , , and . Then, adding up the four equations of system (1) and simplifying, one can get , implying . Similarly, . Thus, system (1) can be written as the limiting system [5]:

In what follows, we will consider the global behavior of system (2) with respect to the positively invariant region: .

3. Theoretical Analysis

3.1. Equilibrium

Theorem 1. System (2) has a unique equilibrium , where

Proof. Assume that is an equilibrium of system (2). Then, Adding up the two equations of system (4), one can obtain implying that From (6) and the second equation of system (4), one can get , . Thus, the proof is complete.

Corollary 2. Let . Then, , , , , , , , , and .

Proof. Let . As , then The proof is complete.

Remark 3. Corollary 2 shows the effects of system parameters on the number of infected computers.

3.2. The Local Stability of the Equilibrium

Theorem 4. is locally asymptotically stable with respect to .

Proof. The Jacobian matrix of system (2) evaluated at is where . The corresponding characteristic equation is where Hence, it follows from the Hurwitz criterion that the two roots of (9) have negative real parts. The claimed result follows.

3.3. The Global Stability of the Equilibrium

First of all, let us consider the following two lemmas, which are useful in the sequel.

Lemma 5. System (2) has no periodic orbit in the interior of .

Proof. Let Then, Thus, it follows from the Bendixson-Dulac criterion [6] that system (2) admits no periodic orbit in the interior of .

Lemma 6. System (2) has no periodic orbit that passes through a point on , the boundary of .

Proof. Suppose that () is an arbitrary point on . Then, let us consider the following three possible cases.
Case  1. , . Then .
Case  2. , . Then .
Case  3. . Then .
Hence, the claimed result follows from the above discussions.

Now, it is the turn to examine the main result of this paper.

Theorem 7. is globally asymptotically stable with respect to .

Proof. The claimed result follows by combining Lemmas 53.2 and the generalized Poincare-Bendixson theorem [6].

Remark 8. Theorem 7 implies that computer viruses would persist on the Internet, in agreement with the fact. This result is also displayed by Figures 3 and 4.

4. Summary

This paper has investigated a new model. The global stability of the unique equilibrium of this model has been proved, which is consistent with the fact that computer viruses on the Internet cannot be eradicated. The main result has also been illustrated.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

The authors wish to express sincere gratitude to the anonymous reviewers for careful reading and valuable suggestions. This work is supported by the Natural Science Foundation of China (Grant nos. 11347150 and 10771227) and the Doctorate Foundation of Educational Ministry of China (Grant no. 20110191110022).