- About this Journal
- Abstracting and Indexing
- Aims and Scope
- Annual Issues
- Article Processing Charges
- Articles in Press
- Author Guidelines
- Bibliographic Information
- Citations to this Journal
- Contact Information
- Editorial Board
- Editorial Workflow
- Free eTOC Alerts
- Publication Ethics
- Reviewers Acknowledgment
- Submit a Manuscript
- Subscription Information
- Table of Contents
Discrete Dynamics in Nature and Society
Volume 2012 (2012), Article ID 106950, 8 pages
Propagation of Computer Virus under Human Intervention: A Dynamical Model
1College of Computer Science, Chongqing University, Chongqing 400044, China
2School of Electronic and Information Engineering, Southwest University, Chongqing 400715, China
Received 13 May 2012; Accepted 7 June 2012
Academic Editor: Yanbing Liu
Copyright © 2012 Chenquan Gan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
This paper examines the propagation behavior of computer virus under human intervention. A dynamical model describing the spread of computer virus, under which a susceptible computer can become recovered directly and an infected computer can become susceptible directly, is proposed. Through a qualitative analysis of this model, it is found that the virus-free equilibrium is globally asymptotically stable when the basic reproduction number , whereas the viral equilibrium is globally asymptotically stable if . Based on these results and a parameter analysis, some appropriate measures for eradicating the spread of computer virus across the Internet are recommended.
Due to their striking features such as destruction, polymorphism, and unpredictability [1, 2], computer viruses have come to be one major threat to our work and daily life [3, 4]. With the rapid advance of computer and communication technologies, computer virus programs are becoming increasingly sophisticated so that developing antivirus software is becoming increasingly expensive and time-consuming . Dynamical modeling of the spread process of computer virus is an effective approach to the understanding of behavior of computer viruses because, on this basis, some effective measures can be posed to prevent infection. In the past decade or so, a number of epidemic models (SEIR model [6, 7], SEIRS model , SIRS model [9–15], SEIQV model , SEIQRS model  and SAIR model , were simply borrowed to depict the spread of computer virus.
In reality, human intervention plays an important role in slowing down the propagation of computer viruses or preventing the breakout of computer viruses, under which a susceptible computer can become recovered directly, and an infected computer can become susceptible directly. To our knowledge, however, all the previous models did not consider the effect of human intervention.
In this paper, a new computer virus propagation model, which incorporates the above mentioned effects of human intervention, is proposed. The dynamics of this model are investigated. Specifically, the virus-free equilibrium is globally asymptotically stable when the basic reproduction number , whereas the viral equilibrium is globally asymptotically stable if . Based on these results and a parameter analysis, some effective strategies for eradicating computer viruses are advised.
The subsequent materials of this paper are organized as follows: Section 2 formulates the model; Section 3 shows the global stability of the virus-free equilibrium; Section 4 proves the global stability of the viral equilibrium; Some policies are posed in Section 5 for controlling virus spread; finally, this work is summarized in Section 6.
2. Assumptions and Model Formulation
At any given time, computers all over the world are classified as internal or external depending on whether it is currently accessing to the Internet or not, and all internal computers are further categorized into three classes: (1) susceptible computers, that is, virus-free computers having no immunity; (2) infected computers; (3) recovered computers, that is, virus-free computers having immunity. At time , let , , and denote the concentrations (i.e., percentages) of susceptible, infected, and recovered computers in all internal computers, respectively. Then . Without ambiguity, , , and will be abbreviated as , , and , respectively.
Our model is based on the following assumptions. (A1) All newly accessed computers are virus-free. Furthermore, due to the effect of newly accessed computers, at any time the percentage of susceptible computers increases by . (A2)At any time an internal computer is disconnected from the Internet with probability . (A3)Due to the effect of previously infected computers, at any time the percentage of infected computers increases by , where is a positive constant. (A4)Due to the effect of cure, at any time an infected computer becomes recovered with probability , or becomes susceptible with probability . (A5)Due to the loss of immunity, at any time a recovered computer becomes susceptible with probability . (A6)Due to the availability of new vaccine, at any time a susceptible computer becomes recovered with probability . This collection of assumptions can be schematically shown in Figure 1, from which one can derive the following model describing the propagation of computer virus: with initial conditions , and .
The basic reproduction number, , is defined as the average number of susceptible computers that are infected by a single infected computer during its life span. From the above model, one can derive the basic reproduction number as
Because , system (2.1) simplifies to the following planar system: with initial conditions and . Clearly, the feasible region for this system is , which is positively invariant.
3. The Virus-Free Equilibrium and Its Stability
System (2.3) always has a virus-free equilibrium . Next, let us consider its global stability by means of the Direct Lyapunov Method.
Theorem 3.1. is globally asymptotically stable with respect to if .
Proof. Let , then Because and , we have . Moreover, if and only if . Thus, the claimed result follows from the LaSalle Invariance Principle.
Example 3.2. Consider a system of the form (2.3) and with , , , , , and . Then . By Theorem 3.1, the virus-free equilibrium is globally asymptotically stable. Figure 2 demonstrates how and evolve with time if and .
4. The Viral Equilibrium and Its Stability
When , it is easy to verify that system (2.3) has a unique viral equilibrium , where
First, consider the local stability of .
Theorem 4.1. is locally asymptotically stable if .
Proof. For the linearized system of system (2.3) at , the corresponding Jacobian matrix is The characteristic equation of is where It follows from the Hurwitz criterion that the two roots of (4.3) have negative real parts. Hence, the claimed result follows.
We are ready to study global stability of . Let , then we have as following.
Theorem 4.2. is globally asymptotically stable with respect to if .
Proof. From system (2.3), we have Note that Define the Lyapunov function as where . Then If , because , thus If , from (4.5) we get Hence, we have Furthermore, it is easy to see that , and if and only if . Hence, the claimed result follows from the LaSalle invariance principle.
Example 4.3. Consider a system of the form (2.3) and with , , , , , and . Then . It follows from Theorem 4.2 that the viral equilibrium is globally asymptotically stable. Figure 3 displays how and evolve with time if and .
As was indicated in the previous two sections, in order to eradicate computer viruses, one should take actions to keep below one.
From (2.2), it is easy to see that is increasing with , and is decreasing with , and , respectively. This implies that prevention is more important than cure, and higher disconnecting rate from the Internet contributes to the suppression of virus diffusion.
As a consequence, it is highly recommended that one should regularly update the antivirus software even if their computer is not noticeably infected, and timely disconnect the computer from the Internet whenever this connection is unnecessary. Also, filtering and blocking suspicious messages with firewall is rewarding.
By considering the possibility that an infected computer becomes susceptible as well as the possibility that a susceptible computer becomes recovered, a new computer virus propagation model has been proposed. The dynamics of this model has been fully studied. On this basis, some effective measures for controlling the spread of computer viruses across the Internet have been posed.
The authors are greatly indebted to the anonymous reviewers for their valuable suggestions. This work is supported by the Natural Science Foundation of China (Grant no. 10771227), the Doctorate Foundation of Educational Ministry of China (Grant no. 20110191110022), and the Research Funds for the Central Universities (Grant nos. CDJXS12180007 and CDJXS10181130).
- F. Cohen, “Computer virus: theory and experiments,” Computers & Security, vol. 6, pp. 22–35, 1987.
- F. Cohen, A Short Course on Computer Viruses, John Wiley & Sons, New York, NY, USA, 2nd edition, 1994.
- P. J. Denning, Computers Under Attack, Addison-Wesley, Reading, Mass, USA, 1990.
- J. R. C. Piqueira and V. O. Araujo, “A modified epidemiological model for computer viruses,” Applied Mathematics and Computation, vol. 213, no. 2, pp. 355–360, 2009.
- P. S. Tippett, “The kinetics of computer viruses replication: a theory and preliminary survey, in: safe computing,” in Proceedings of the 4th Annual Computer Virus and Security Conference, pp. 66–87, New York, NY, USA, March 1991.
- B. K. Mishra and S. K. Pandey, “Dynamic model of worms with vertical transmission in computer network,” Applied Mathematics and Computation, vol. 217, no. 21, pp. 8438–8446, 2011.
- H. Yuan and G. Q. Chen, “Network virus-epidemic model with the point-to-group information propagation,” Applied Mathematics and Computation, vol. 206, no. 1, pp. 357–367, 2008.
- B. K. Mishra and D. K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network,” Applied Mathematics and Computation, vol. 188, no. 2, pp. 1476–1482, 2007.
- X. Han and Q. L. Tan, “Dynamical behavior of computer virus on internet,” Applied Mathematics and Computation, vol. 217, no. 6, pp. 2520–2526, 2010.
- A. Lahrouz, L. Omari, D. Kiouach, and A. Belmaâti, “Complete global stability for an SIRS epidemic model with generalized non-linear incidence and vaccination,” Applied Mathematics and Computation, vol. 218, pp. 6519–6525, 2012.
- B. K. Mishra and N. Jha, “Fixed period of temporary immunity after run of anti-malicious software on computer nodes,” Applied Mathematics and Computation, vol. 190, no. 2, pp. 1207–1212, 2007.
- B. K. Mishra and S. K. Pandey, “Fuzzy epidemic model for the transmission of worms in computer network,” Nonlinear Analysis: Real World Applications, vol. 11, no. 5, pp. 4335–4341, 2010.
- J. Ren, X. Yang, L. X. Yang, Y. Xu, and F. Yang, “A delayed computer virus propagation model and its dynamics,” Chaos, Solitons & Fractals, vol. 45, no. 1, pp. 74–79, 2012.
- J. Ren, X. Yang, Q. Zhu, L. X. Yang, and C. Zhang, “A novel computer virus model and its dynamics,” Nonlinear Analysis: Real World Applications, vol. 13, no. 1, pp. 376–384, 2012.
- C. Vargas-De-León, “On the global stability of SIS, SIR and SIRS epidemic models with standard incidence,” Chaos, Solitons & Fractals, vol. 44, pp. 1106–1110, 2011.
- F. W. Wang, Y. K. Zhang, C. G. Wang, J. F. Ma, and S. J. Moon, “Stability analysis of a SEIQV epidemic model for rapid spreading worms,” Computers & Security, vol. 29, no. 4, pp. 410–418, 2010.
- B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in computer network,” Applied Mathematical Modelling, vol. 34, no. 3, pp. 710–715, 2010.