Abstract

This paper is concerned with a delayed SVEIR worm propagation model with saturated incidence. The main objective is to investigate the effect of the time delay on the model. Sufficient conditions for local stability of the positive equilibrium and existence of a Hopf bifurcation are obtained by choosing the time delay as the bifurcation parameter. Particularly, explicit formulas determining direction of the Hopf bifurcation and stability of the bifurcating periodic solutions are derived by using the normal form theory and the center manifold theorem. Numerical simulations for a set of parameter values are carried out to illustrate the analytical results.

1. Introduction

Worms, as one kind of malicious codes, have become one of the main threats to the security of networks. Since the first Morris worm in 1998, new worms have come into networks frequently, including Slammer worm [1], Commwarrior worm [2], Cabir worm [3], and Chameleon worm [4]. Each of them can cause enormous financial losses and social panic [57]. Therefore, it is significant to explore effective methods to counter against worms. To this end, we need to accurately understand the dynamic behaviors of worm propagation in networks. Considering that the process of worm propagation in networks is similar to that of biological virus propagation in the population, mathematical models have been important tools used to analyze the propagation and control of worms based on the theory of Kermack and McKendrick [8].

In [9], Kim et al. proposed the SIS (Susceptible-Infectious-Susceptible) model in order to analyze the dynamical behaviors of worm propagation on Internet. However, the SIS model neglects the effect of the antivirus software. Thus, the SIR (Susceptible-Infectious-Recovered) model is proposed [9]. Although SIR model considered the immunity of the nodes in which the worms have been cleaned, however, it assumes that the recovered hosts have permanent immunity. This is not consistent with the reality in networks, because they may be infected by some new emerging worms again. To overcome this drawback of the SIR model, Wang et al. investigated the SIRS (Susceptible-Infectious-Recovered-Susceptible) mode for analyzing the dynamics of worm propagation in networks [1012]. It should be pointed out that both the SIR mode and the SIRS model assume that the susceptible nodes become infectious instantaneously. As we know, worms usually have a latent period. Based on this consideration, the SEIR (Susceptible-Exposed-Infectious-Recovered) model [13, 14] and the SEIRS (Susceptible-Exposed-Infectious-Recovered-Susceptible) model [11, 15] are proposed to describe the dynamics of worm propagation in networks. Considering influence of the quarantine strategy and the vaccination strategy on the propagation of worms, some worm models with quarantine strategy [1619] and vaccination strategy [2025] are formulated and analyzed.

It should be pointed out that all the models above use the bilinear incidence rate . As stated in [26], the dynamics of a model system heavily depends on the choice of the incidence rate. Gan et al. have considered the different incidence rate functions in their work [27, 28]. It was found that the saturated incidence rate is more general than the bilinear incidence rate . Based on this, Wang et al. [29] proposed the following model with partial immunization to defend against worms:where , , , , and present numbers of the susceptible, vaccinated, exposed, infectious, recovered hosts at time , respectively. The meanings of more parameters are described and shown in “Parameters of the Model and Their Meanings” section. Wang et al. [29] investigated the stability of system (1).

One of the significant features of computer viruses is their latent characteristics [30, 31]. In addition, time delays of one type or another could cause the numbers of hosts in system (1) to fluctuate. And worm propagation models with time delay have been investigated by some scholars [14, 17, 19]. Based on above discussions, in this paper, we extend system (1) by incorporating the time delay due to the latent period of the worms in the exposed hosts into system (1) and obtain the following delayed worm propagation model:where is the latent period of the worms in the exposed nodes.

The remainder of this paper is organized as follows. Local stability of the positive equilibrium and existence of a Hopf bifurcation at the positive equilibrium are analyzed in the next section. Properties of the Hopf bifurcation such as direction and stability are investigated in Section 3. Numerical simulations are carried out in Section 4 to support the obtained theoretical results. Finally, conclusions are given in Section 5 to end our work.

2. Existence of Hopf Bifurcation

By direct computation, we know that if the condition : holds, then system (2) has a positive equilibrium , whereAnd is the positive root of the following equation:whereThe Jacobi matrix of system (2) about is given bywhere

The characteristic equation of that matrix (6) iswithWhen , (8) becomeswhere

Thus, is locally asymptotically stable when if the condition is satisfied and is defined as follows:For , let be the root of (8). Then, we haveThus, we can get the following equation:whereLet ; then (14) becomes

Based on the discussion about the distribution of the roots of (16) in [32], we suppose that : (16) has at least one positive root .

If the condition holds, then (16) has a positive root and (8) has a pair of purely imaginary roots . For , we havewith

Differentiating on both sides of (8) with respect to , we can obtainFurther, we havewhere .

Obviously, if the condition is satisfied, then . Based on the discussion above and the Hopf bifurcation theorem in [33], we have the following results.

Theorem 1. For system (2), if the conditions hold, then the positive equilibrium is locally asymptotically stable when ; system (2) undergoes a Hopf bifurcation at the when and a family of periodic solutions bifurcate from .

3. Properties of the Hopf Bifurcation

Let , , , , and , and normalize the time delay with the scaling . Let ; then is the Hopf bifurcation value of system (2). System (2) can be transformed into the following form:where and : and : are given, respectively, bywith

According to the Riesz representation theorem, there exists a matrix function : such thatIn fact, choosingand is the Dirac delta function.

For , defineThen system (21) can be transformed into the following operator equation:For , we further define the adjoint operatorand the bilinear inner product as follows:where .

Based on the discussion above, we know that are eigenvalues of . Thus, they are also eigenvalues of . Let be the eigenvector of corresponding to and be the eigenvectors of corresponding to . By direct computation, we can obtainThen we have and .

Next, we can obtain the coefficients which can determine the properties of the Hopf bifurcation at by following the algorithms given in [33] and using the computation process similar to those in [3436]:withwhereThen, one can obtainIn conclusion, we have the following results.

Theorem 2. For system (2), determines the direction of the Hopf bifurcation: if , then the Hopf bifurcation is supercritical (subcritical); determines the stability of the bifurcating periodic solution: the bifurcating periodic solutions are stable (unstable) if ; determines the period of the bifurcating periodic solutions: the period increases (decreases) if .

4. Numerical Simulation

In this section, some numerical simulations are carried out for qualitative analysis by using Matlab software package. By extracting some values from [29] and considering the conditions for the existence of the Hopf bifurcation, we choose a set of parameters as follows: , , , , , , , , and . Then, we can get the following specific case of system (2):By some computations, we can obtain the following equation with respect to :

It follows that system (35) has a unique positive equilibrium and we can verify that is locally asymptotically stable when . Further, we have and . According to Theorem 1, it can be concluded that is locally asymptotically stable when . This property can be shown as in Figures 1 and 2. However, a Hopf bifurcation will occur and a family of periodic solutions bifurcate from when the value of passes through the Hopf bifurcation value , which can be illustrated by Figures 3 and 4.

In addition, we obtain , by some complicate computations. Thus, we get , , and based on (34). It follows from Theorem 2 that the Hopf bifurcation is supercritical and the bifurcating periodic solutions are stable and decrease. Since the bifurcating periodic solutions are stable, then the five classes of hosts in system (35) may coexist in an oscillatory mode from the view of the biological point, which is not welcome in networks.

5. Conclusions

In this study, the dynamical behaviors of a delayed SVEIR worm propagation model with saturated incidence are discussed based on the work in literature [29]. The dynamical behaviors of the model are investigated from the point of view of local stability and Hopf bifurcation both analytically and numerically. The threshold of the time delay at which the model causes a Hopf bifurcation is obtained by using eigenvalue method. We found that characteristics of the propagation of worms in the model can be predicted and controlled when the value of delay is suitably small (). However, propagation of the worms in the model will be out of control once the value of the time delay is above the threshold value . Accordingly, we can know that the propagation of worms in the model can be controlled by postponing occurrence of the Hopf bifurcation. Moreover, the properties of the Hopf bifurcation are investigated by applying the normal form theory and the center manifold theorem. Numerical simulations are also presented in order to testify our obtained theoretical results.

Parameters of the Model and Their Meanings

Recruitment rate of the susceptible host
Vaccinated rate of the susceptible host
Infection rate of the susceptible host
Infection rate of the vaccinated host
Efficient measuring the inhibitory effect
Natural death rate of all the hosts
Death rate of the infectious host due to worm attack
Recovery rate of the infectious hosts
Rate of the exposed hosts that become infectious
Rate of the vaccinated hosts that become susceptible.

Data Availability

All data can be accessed in the numerical simulation section of this article.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by Project of Support Program for Excellent Youth Talent in Colleges and Universities of Anhui Province (no. gxyqZD2018044) and Anhui Provincial Natural Science Foundation (no. 1608085QF145 and no. 1608085QF151).