About this Journal Submit a Manuscript Table of Contents
Mathematical Problems in Engineering
Volume 2013 (2013), Article ID 842614, 5 pages
http://dx.doi.org/10.1155/2013/842614
Research Article

Modeling Computer Virus and Its Dynamics

1College of Mathematical and Computer Science, Yangtze Normal University, Chongqing 400084, China
2College of Computer Science, Chongqing University, Chongqing 400030, China
3School of Computer Science, Chongqing University of Education, Chongqing 400067, China
4College of Software and Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China

Received 27 March 2013; Accepted 9 June 2013

Academic Editor: Tingwen Huang

Copyright © 2013 Mei Peng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Based on that the computer will be infected by infected computer and exposed computer, and some of the computers which are in suscepitible status and exposed status can get immunity by antivirus ability, a novel coumputer virus model is established. The dynamic behaviors of this model are investigated. First, the basic reproduction number , which is a threshold of the computer virus spreading in internet, is determined. Second, this model has a virus-free equilibrium , which means that the infected part of the computer disappears, and the virus dies out, and is a globally asymptotically stable equilibrium if . Third, if then this model has only one viral equilibrium , which means that the computer persists at a constant endemic level, and is also globally asymptotically stable. Finally, some numerical examples are given to demonstrate the analytical results.

1. Introduction

Computer virus is a malicious mobile code which including virus, Trojan horses, worm, and logic bomb. It is a program that can copy itself and attack other computers. And they are residing by erasing data, damaging files, or modifying the normal operation. Due to the high similarity between computer virus and biological virus [1], various computer virus propagation models are proposed [24]. This dynamical modeling of the spread process of computer virus is an effective approach to the understanding of the behavior of computer viruses because on this basis, some effective measures can be posed to prevent infection.

The computer virus has a latent period, during which individuals are exposed to a computer virus but are not yet infectious. An infected computer which is in latency, called exposed computer, will not infect other computers immediately; however, it still can be infected. Based on these characteristics, delay is used in some models of computer virus to describe that although the exposed computer does not infect other computers, it still has infectivity [5, 6]. Yang et al. [7, 8] proposed an SLB and SLBS models; in these models, the authors considered that the computer virus has latency, and the computer also has infectivity in the period of latency. However, they do not show the length of latency and take into account the impact of artificial immunization ways such as installing antivirus software. And the newly entered in the internet from the susceptible status to exposed status, the contact rate is the same as that of susceptible status entering into infected status. In this paper, a novel model of computer virus, known as SEIR model, is put forward to describe the susceptible computer which can be infected by the other infected or exposed computer and come into the exposed status. In the SEIR model, based on artificial immunity, we consider the bilinear incidence rate for the latent and infection status. Assume that the computers which newly entered the internet are susceptible, the computers correspond with exposed computers, and their adequate contact rate is denoted by  , and computers also correspond with infected computers, and their adequate contact rate is denoted by . So, the fraction of the computer which newly entered the internet will enter the class by anti-virus software; the fraction of computers contact with exposed and infected computer will stay latent before becoming infectious and enter the class . It is shown that the dynamic behavior of the proposed model is determined by a threshold  , and this model has a virus-free equilibrium  , and   is a globally asymptotically stable equilibrium if  ; if   this model has only one viral equilibrium  , and it is globally asymptotically stable.

This paper is organized as follows. Section 2 formulates a novel computer virus mode. Section 3 proves the global stability of the virus-free equilibrium. Section 4 discusses the stability of the viral equilibrium. In Section 5, numerical simulations are given to present the effectiveness of the theoretic results. Finally, Section 6 summarizes this work.

2. Model Formulation

At any time, a computer is classified as internal and external depending on weather it is connected to internet or not. At that time, all of the internet computers are further categorized into four classes: (1) susceptible computers, that is, uninfected computers and new computers which connected to network; (2) exposed computers, that is, infected but not yet broken-out; (3) infectious computers; (4) recovered computers, that is, virus-free computer having immunity. Let ,  ,  ,   denote their corresponding numbers at time , without ambiguity;  ,  ,  ,   will be abbreviated as  ,  ,  ,  , respectively. The model is formulated as the following system of differential equations:

We may see that the first three equations in (1) are independent of the fourth equation, and therefore, the fourth equation can be omitted without loss of generality. Hence, system (1) can be rewritten as

Therefore, where denotes the rate at which external computers are connected to the network;    denotes the recovery rate of susceptible computer due to the anti-virus ability of network;    denotes the recovery rate of exposed computer due to the anti-virus ability of network;    denotes the rate at which, when having a connection to one infected computer, one susceptible computer can become exposed but has not broken-out;    denotes the rate of which, when having connection to one exposed computer, one susceptible computer can become exposed;    denotes the rate of the exposed computers cannot be cured by anti-virus software and broken-out;    denotes the recovery rate of infected computers that are cured;    denotes the rate at which one computer is removed from the network. All the parameters are nonnegative.

Moreover, all feasible solutions of the system (3) are bounded and enter the region  , where

Referring to [9], we define the basic reproduction number of the infection as

For system (3), there always exists the virus-free equilibrium which is  ; if  , then there also exists a viral equilibrium  .

Therefore,

3. The Virus-Free Equilibrium and Its Stability

Theorem 1.   is locally asymptotically stable if . Whereas   is unstable if  .

Proof. The characteristic equation of (3) at    is given by which equals to Then, (9) has negative real part characteristic roots: where
When , there are no positive real roots of (9) and thus is a local asymptotically stable equilibrium. While  , (9) has positive real roots, which means is unstable.
The proof is completed.

Theorem 2. is globally asymptotically stable with respect to   if  .

Proof. Let .
Obviously thus The proof is completed.

4. The Viral Equilibrium and Its Stability

Theorem 3. is locally asymptotically stable if .

Proof. The Jacobin matrix of system (3) about is given by which equals to where where Thus,
According to the Hurwitz criterion, all roots of (15) have negative real pats. Thus, the claimed result follows. The proof is completed.

The following result can be proved in the same way (see [9]).

Theorem 4. is uniquely globally asymptotically stable if  .

Proof. The Jacobin matrix of system (3) about is given by
The second compound matrix of the Jacobin matrix can be calculated as follows (see [10, 11]): Set as the following diagonal matrix:
Denote that
Therefore, the matrix can be written in the following block form: with thus The vector norm in is choosen as The Lozinskii measure with respect to is as follows (see [12]): where From (3), we find that thus Relations (28)–(30) imply that Thus,
If  , then the virus-free equilibrium is unstable by Theorem 1. Moreover,  the behavior of the local dynamic near    as described in Theorem 1 implies that the system (3) is uniformly persistent in ; that is, there exists a constant and , such that   implies that For all (see [13, 14]), The proof is complete.

5. Numerical Examples

For the system (3), Theorem 2 implies that the virus dies out if  , and Theorem 4 implies that the virus persists if  . Now, we present two numerical examples.

Let  ,  ,  ,  ,  ,  ,  ,  ,  then   and  ; Figure 1 shows the solution of system (3) when  . We can see that the viral equilibrium of system (3) is globally asymptotically stable.

842614.fig.001
Figure 1: Dynamical behavior of system (3). Time series of susceptible, exposed, and infectious computers ,  ,   with .

Let  ,  ,  ,  ,  ,  ,  ,  ,  then   and  ; Figure 2 shows the solution of system (3) when . We can see that the virus-free equilibrium   of the system (3) is globally asymptotically stable.

842614.fig.002
Figure 2: Dynamical behavior of system (3). Time series of susceptible, exposed, and infectious computers ,  ,   with .

6. Conclusion

We assume that the virus process has a latent period and in these times the infected computers have infectivity also. A compartmental SEIR model for transmission of virus in computer network is formulated. In this paper, the dynamics of this model have been fully studied.

The results show that we should try our best to make less than 1. The most effective way is to increase the parameters ,  ,   and decrease ,  ,   and so on. Maybe in such way, the computer virus can be well predicted and thus controlled.

Acknowledgment

The work described in this paper was supported by the Science and Technology Project of Chongqing Education Committee under Grant KJ130519.

References

  1. C. Sun and Y.-H. Hsieh, “Global analysis of an SEIR model with varying population size and vaccination,” Applied Mathematical Modelling, vol. 34, no. 10, pp. 2685–2697, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  2. L.-P. Song, Z. Jin, and G.-Q. Sun, “Modeling and analyzing of botnet interactions,” Physica A, vol. 390, no. 2, pp. 347–358, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Ren, X. Yang, L.-X. Yang, Y. Xu, and F. Yang, “A delayed computer virus propagation model and its dynamics,” Chaos, Solitons & Fractals, vol. 45, no. 1, pp. 74–79, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  4. B. K. Mishra and S. K. Pandey, “Dynamic model of worms with vertical transmission in computer network,” Applied Mathematics and Computation, vol. 217, no. 21, pp. 8438–8446, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  5. X. Han and Q. Tan, “Dynamical behavior of computer virus on Internet,” Applied Mathematics and Computation, vol. 217, no. 6, pp. 2520–2526, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  6. Q. Zhu, X. Yang, and J. Ren, “Modeling and analysis of the spread of computer virus,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 12, pp. 5117–5124, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  7. L. X. Yang, X. Yang, Q. Zhu, and L. Wen, “A computer virus model with graded cure rates,” Nonlinear Analysis: Real World Applications, vol. 14, no. 1, pp. 414–422, 2013. View at Publisher · View at Google Scholar
  8. L. X. Yang, X. Yang, L. Wen, and J. Liu, “A novel computer virus propagation model and its dynamics,” International Journal of Computer Mathematics, vol. 89, no. 17, pp. 2307–2314, 2012.
  9. P. van den Driessche and J. Watmough, “Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission,” Mathematical Biosciences, vol. 180, pp. 29–48, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  10. M. Fiedler, “Additive compound matrices and an inequality for eigenvalues of symmetric stochastic matrices,” Czechoslovak Mathematical Journal, vol. 24(99), pp. 392–402, 1974. View at Zentralblatt MATH · View at MathSciNet
  11. J. S. Muldowney, “Compound matrices and ordinary differential equations,” The Rocky Mountain Journal of Mathematics, vol. 20, no. 4, pp. 857–872, 1990. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  12. G. Butler, H. I. Freedman, and P. Waltman, “Uniformly persistent systems,” Proceedings of the American Mathematical Society, vol. 96, no. 3, pp. 425–430, 1986. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  13. H. I. Freedman, S. G. Ruan, and M. X. Tang, “Uniform persistence and flows near a closed positively invariant set,” Journal of Dynamics and Differential Equations, vol. 6, no. 4, pp. 583–600, 1994. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  14. P. Waltman, “A brief survey of persistence in dynamical systems,” in Delay Differential Equations and Dynamical Systems (Claremont, CA, 1990), S. Busenberg and M. Martelli, Eds., vol. 1475, pp. 31–40, Springer, Berlin, Germany, 1991. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet