Abstract

In this paper, we investigate an SLBRS computer virus model with time delay and impact of antivirus software. The proposed model considers the entering rates of all computers since every computer can enter or leave the Internet easily. It has been observed that there is a stability switch and the system becomes unstable due to the effect of the time delay. Conditions under which the system remains locally stable and Hopf bifurcation occurs are found. Sufficient conditions for global stability of endemic equilibrium are derived by constructing a Lyapunov function. Formulae for the direction, stability, and period of the bifurcating periodic solutions are conducted with the aid of the normal form theory and center manifold theorem. Numerical simulations are carried out to analyze the effect of some of the parameters in the system on the dynamic behavior of the system.

1. Introduction

Computer viruses are programs created to carry out activities in a computer without consent of its owner. They not only disrupt the normal functionalities of computer system and damage data files in the computer, but also cause heavy economic losses and tremendous social impacts [13]. In recent years, mathematical modeling enjoys popularity in both analyzing and controlling computer viruses based on the similarity between computer viruses and biological viruses. A few works proposing SIR models have appeared in the literatures [46]. In [4], Amador studied a stochastic SIRA epidemic model for computer viruses and analyzed the quasistationary distribution, the extinction time, and the number of infections in order to understand the spreading mechanism of computer viruses. In [5], Ozturk and Gulsu proposed an approximate solution to a modified SIR computer virus model by using the shifted Chebyshev collocation method. In [6], Khanh studied the stability and approximate iterative solutions of an SIR computer virus model with antidotal component.

Considering the latent period of computer viruses, some models with latency are proposed by some scholars [1, 710]. In [7], Yang investigated global stability of a VEISV network worm attack model by using the Li-Muldowney geometric approach. In [8], Keshri et al. proposed a reduced SEIR scale-free network model and studied its stability. In [9], Hosseini et al. formulated a discrete-time SEIRS model of computer virus propagation in scale-free networks and analyzed the local and global stability of the model. In [1], Guillen et al. proposed an improved SEIRS worm model with considering accurate positions for dysfunctional hosts and their replacements in state transition. In [10], Ren and Xu investigated an SEIR-KS computer virus propagation model based on the kill signals. They studied the local and global stability of the model by applying Routh-Hurwitz criterion and Lyapunov functional method. There are also some other models considering the latency of computer viruses with quarantine [1114] and vaccination [1519].

However, as stated in [20], those above models with the exposed compartment neglect the fact that a computer can infect other computers through file copying or file downloading. Therefore, to overcome the above-mentioned defect, computer virus models with infectivity in latent period have received much attention in recent years [2126]. Unfortunately, most of these models still have some defects. On the one hand, they ignore the effect of time delay. As is known, there are some time delays of one type or another in the transmission process of computer viruses due to latent period, temporary immunity period, or other reasons. On the other hand, only the susceptible computers are regarded as the entering computers, but every computer can enter or leave the Internet easily in reality. Finally, they neglect the effect of antivirus software, especially the effect of antivirus software on the susceptible computers. Based on the discussion above, we investigated a delayed SLBRS computer virus model with impact of antivirus software based on the following model proposed in [27]: where , , , and denote the numbers of susceptible, latent, breaking, and recovered computers at time , respectively. More parameters are listed in Table 1 as follows.

Considering the temporary immune period of the recovered computers, we incorporate the time delay due to the temporary immunity period into system (1) and obtain the following delayed model:where is the time delay due to the temporary immunity period.

The remainder of the paper is structured as follows. In Section 2, conditions for local stability of the endemic equilibrium and the existence of Hopf bifurcation are performed. Section 3 deals with global stability of the endemic equilibrium. Section 4 is devoted to establishing the formulae to determine the direction, stability, and period of the bifurcating periodic solutions. Some numerical simulations are presented to illustrate the theoretical results in Section 5. We end the paper with a brief conclusion in Section 6.

2. Local Stability and Existence of Hopf Bifurcation

By a direct computation, it can be concluded that system (2) has the endemic equilibrium wherewhere is the positive root of (4)whereandThe Jacobian matrix of system (2) evaluated at iswhereThe corresponding characteristic equations iswithFor , (9) becomes

Clearly, . Hence, it follows from the Hurwitz criterion that all the roots of (11) have negative real parts, if : , and holds.

For , let be the root of (9). Then,Thus,withLet , then (13) becomes

Suppose that (15) has a positive root . Then, (13) has a positive root such that (9) has a pair of purely imaginary roots . For ,whereDifferentiating on both sides of (9) with respect to , one can obtainFurther, we havewhere and .

Therefore, if : , then . Thus, we have the following results based the Hopf bifurcation theorem in [28].

Theorem 1. For system (2), if - hold, then is locally asymptotically stable when ; system (2) undergoes a Hopf bifurcation at when and a family of periodic solutions bifurcate from . is defined as in (16).

3. Global Stability Analysis

Theorem 2. If , withwhere , , , and for , then the endemic equilibrium is globally asymptotically stable.

Proof. LetThen becomes the trivial equilibrium for all , and system (2) can be reduced to the following form:Now, we haveNow, (22) can be rewritten as follows by using above relation,Let . It follows from the above equationWe find that there exists a , such that for all and for , we haveAgain due to form of (29) we consider the following functional:whose derivative along the solution of system (2) is given byAgain let and . Now calculate the derivative of and with the solution of (2), it follows from, respectively, (23) and (24)Now, (25) can be rewritten as follows by using (26),Again let . It follows from the above equationWe find that there exists a , such that for all and for , we haveAgain due to the above form of (36) we consider the following functional:whose right derivative along the solution of the system (2) is given byLet us define a Lyapunov functional as Computing the upper right derivative of along the solution of system (2) and by using (31)-(33) and (38), we obtainwhere , , , and are defined above in (20).
Since the model system (2) is positive invariant, therefore, for all , we have Using the mean value theorem, we havewhere lies between and , lies between and , lies between and , and lies between and . Therefore,Note that . Hence, from theory of global stability and (43), we conclude that the zero solution of the reduced system (22)-(25) is globally asymptotically stable. Therefore, the endemic equilibrium of model system (2) is globally asymptotically stable.

4. Direction and Stability of Hopf Bifurcation

Let , , , , and . System (2) becomeswhere and : and : are defined as follows:andwithThus, there exists such thatIn fact,where is the Dirac delta function.

For , defineandThen system (44) is equivalent toFor , defineand the bilinear inner form for and where .

Let be the eigenvector of corresponding to and be the eigenvector of corresponding to , respectively. Based on the definition of and , we obtain From (54), the expression of can be obtain as follows:such that and .

Next, we can obtain the expressions of , , , and by the algorithms in [28] and the computation process in [2931]:with

and can be obtained by the following two equations:Then, one can obtainIn conclusion, we have the following results.

Theorem 3. For system (2), if (), then the Hopf bifurcation is supercritical (subcritical); if (), then the bifurcating periodic solutions are stable (unstable); if (), then the period of the bifurcating periodic solutions increases (decrease).

5. Numerical Simulations

In this section, we develop some numerical simulations in order to support the obtained results in our paper. A set of parameters of system (2) are chosen as follows: , , , , , , , , , and . Then, we obtain the following specific case of system (2):Then, (4) becomes the following form:from which we can obtain the unique positive root . Further, we can verify that system (61) has a unique endemic equilibrium and all the conditions given in Theorem 1 are satisfied.

By means of Matlab software, we get , , and . Thus, we can obtain , , , and . It follows that , , and . Fix , then we can see that the solution of system (61) would tend to the endemic equilibrium . In other words, is locally asymptotically stable, which can be illustrated by Figures 13. However, when passes through the critical value , , loses its stability, and a Hopf bifurcation occurs and a family of periodic solutions bifurcate from , . This property can be shown as in Figures 46. Since , , and , we can conclude that the Hopf bifurcation occurring at is supercritical and the bifurcating periodic solutions are stable and decrease. Next, we are interested to study the effect of some other parameters on the dynamics of system (62).

(i) Effect of the recovered rate (): in Figures 7(a)7(d), we can see that the numbers of susceptible and recovered computers increase; nevertheless, the numbers of latent and breaking computers decrease, when the number of increases. And the system changes its behavior from limit cycle to stable focus as we increase the value of , from 0.1 to 0.3, which can be shown as in Figure 8.

(ii) Effect of the rate of latent and breaking computers reinstall the operating system (): in the same manner, we can see from Figures 9(a)9(d) that the numbers of susceptible and latent computers increase and the number of breaking computers decreases, when the number of increases. But it does not affect the number of recovered computers, which can be also seen from the expression of in Section 2. Also, we observe that does not affect the dynamics of the system; it remains at limit cycle when we choose . This property can be illustrated by Figure 10.

(iii) Effect of the entering rates (, , , ): as is shown in Figures 1114, the numbers of all computers increase when the numbers of and increase. However, the number of susceptible computers decreases and the numbers of latent, breaking, and recovered computers increase, when the numbers of and increase. In addition, we find that the entering rates does not affect the dynamics of the systems.

6. Conclusions

In this paper, a delayed SLBRS computer virus model is presented by incorporating the time delay due to the temporary immunity period of the recovered computers based on the model proposed in [27]. Compared with the model in [27], we mainly consider the effect of the time delay on its dynamic behavior. Compared with other computer virus models, we assume that every computer can enter the Internet, which is consistent with the reality. Further, we also consider the effect of antivirus software on the susceptible computers in the presented model. Thus, the computer virus model proposed in our paper is more general.

It has been shown that the endemic equilibrium is locally asymptotically stable when under some certain conditions. In this case, the propagation of the computer virus in system (2) can be controlled easily. Once the value of the time delay passes through , loses its stability and a Hopf bifurcation occurs and a family of periodic solutions bifurcate from . In this case, the numbers of the four classes computers in system (2) will oscillate in the vicinity of . Namely, the propagation of the computer virus will be out of control. Therefore, the results obtained in the present paper can help us to gain insight into the spreading process of computer viruses. Also, sufficient conditions for global stability of the endemic equilibrium are derived by constructing a suitable Lyapunov function. Furthermore, properties of the Hopf bifurcation are investigated by using the normal form theory and center manifold theorem. Numerical simulations are presented to verify the analytical predictions. In addition, it has been observed in our simulations that the recovered rate can change the dynamics of the system from limit cycle to stable focus as its value increases. Thus, it is strongly recommended that users of computers connected to Internet should periodically run antivirus software of the newest version. From the point of this view, we can conclude that the results of the proposed model in our paper can be used to evaluate the effectiveness of antivirus software. In addition, the numbers of latent and breaking computers decrease, when the reinstalling of the operating system rate increases. Thus, it can be concluded that users should reinstall operating system if necessary. Finally, the numbers of latent and breaking computer will also increase, when the values of entering rates of all computers , , , and increase. Therefore, the manager of a network should control the number of computers connected to the network properly.

Of course, when we pursue a low level of infections, we should also consider the cost of the measures we carry out. In addition, it should be pointed out that the model investigated in the literature [27] and our present paper assumes that the latent computers and the breaking computers have the same infection rate . In the near future, we will investigate the optimal control problem of the following general system (63) so as to achieve a low level of infections at a low cost by using the method introduced in [32]:where and are the infection rate of the latent computers and the breaking computers, respectively.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This research was supported by National Natural Science Foundation of China (no. 11461024), Natural Science Foundation of Inner Mongolia Autonomous Region (no. 2018MS01023), Natural Science Foundation of Anhui Province (nos. 1608085QF145, 1608085QF151, and 1708085MA17), Project of Support Program for Excellent Youth Talent in Colleges and Universities of Anhui Province (nos. gxyqZD2018044 and gxbjZD49), and Bengbu University National Research Fund Cultivation Project (2017GJPY03).