Abstract

The dissemination of countermeasures is diffusely recognized as one of the most valid strategies of containing computer virus diffusion. In order to better understand the impacts of countermeasure and removable storage media on viral spread, this paper addresses a dynamical model, which incorporates nonlinear countermeasure probability and infected removable storage media. Theoretical analysis reveals that the unique (viral) equilibrium of the model is globally asymptotically stable. This main result is also illustrated by some numerical experiments. Additionally, the numerical experiments of different countermeasure probabilities are conducted.

1. Introduction

The continual emergence of computer viruses, especially with the growing popularity of the Internet, has brought great troubles and threats to our daily work and life (e.g., [1]). Besides, removable storage media, such as compact disk, removable hard disk, USB flash disk, flash memory card, and so on, which are often used in our daily work provide another spreading route for computer viruses except the Internet. Antivirus software, patches, and firewall are the main technical means of defending against computer viruses, which can weed out all viruses they can recognize that stay in individual electronic devices such as personal computer (PC) and removable storage media. Unfortunately, these techniques seem powerless to the outbreak of a new virus. In order to effectively contain virus spread, one needs to understand the propagation laws of computer viruses, which may provide a theoretical basis for decision making, as well as to use technical measures.

A multitude of propagation models of computer viruses have been presented since 1991, specifically, SIS (susceptible-infected-susceptible) models (e.g., [2, 3]), SIRS (susceptible-infected-recovered-susceptible) models (e.g., [4, 5]), SLBS (susceptible-latent-breaking-susceptible) model (e.g., [6]), SICS (susceptible-infected-countermeasured-susceptible) models (e.g., [79]), and SDIRS (susceptible-delitescent-infected-recovered- susceptible) model (e.g., [10]).

In the field of computer viruses, countermeasures such as warnings, firewall, and software patches can provide a practical approach to avoid virus infection problems. In 2004, Chen and Carley [11] addressed the countermeasure competing (CMC) strategy, which shows that the CMC strategy is more available compared to previous strategies.

Inspired by this work and in order to macroscopically describe the mixed transmission of computer viruses and countermeasures, Zhu et al. [7] presented the first compartment model in this aspect, named as the SICS model, and its global dynamics was fully examined. Afterwards, Yang and Yang [8] extended this model by incorporating the effect of infected external computers (i.e., computers outside the Internet) and removable storage media. However, these two models ignore two important facts. On the one hand, they overlook the fact that the linear infection probability is fit well for the real-world situations only when the countermeasured (or immune) nodes are few. On the other hand, they neglect the fact that countermeasures may be disseminated through networks at different rates, which has been mentioned in Reference [11]. Thus, the assumption of linear countermeasure probability is unreasonable.

To remedy these defects and considering the influences of general countermeasure and infected removable storage media on viral diffusion, this paper studies a new propagation model incorporating generic countermeasure probability and infected removable storage media. The main result, the global stability of the unique (viral) equilibrium, is proved, which is also examined by some numerical experiments. Furthermore, the numerical experiments of different countermeasure probabilities are conducted.

The paper is organized as follows. The model formulation is made in Section 2. Section 3 determines the (viral) equilibrium and investigates its global stability. Numerical experiments are presented in Section 4. This work is summarized in Section 5.

2. Model Description

In this paper, a computer is called external or internal computer determined by whether it is disconnected from or connected to the Internet. All internal computers may have three states: , , and (with countermeasures). For brevity, let , , and (, , and , for short) denote the average numbers of susceptible, infected, and countermeasured computers at time , respectively. Their entering rates are , , and , respectively. Besides, the following basic assumptions of the model are made.(1)Each internal computer leaves the Internet with probability .(2)Each susceptible internal computer becomes infected by connecting with infected internal computer (or infected removable storage media) with probability (or ).(3)Each infected or susceptible internal computer gains the latest countermeasure with probability at time , where is twice continuously differentiable, , and . The concavity assumption seizes well the saturability of the countermeasure probability.(4)By reinstalling the operating system, each countermeasured (or infected) internal computer becomes susceptible with probability (or ).

Now, one can derive the mathematical representation of the model as follows (also see Figure 1):with initial condition .

3. Theoretical Analysis

Let , and . Adding up the three equations of system (1), it is easy to get that . It follows by the asymptotically autonomous system theory [12] that system (1) is equivalent to the following reduced limiting system:with initial condition , whereand is positively invariant for system (2).

In the following sections, we just need to investigate the dynamical behavior of system (2).

3.1. Equilibrium

Theorem 1. There exists a unique (viral) equilibrium for system (2), where is the single positive solution to the following system:with the initial condition .

Proof. Let us suppose that is an equilibrium of system (2). Clearly, satisfies system (4). Thus, it suffices to prove that system (4) has a unique positive solution.
Firstly, let us prove that the second equation of system (4) has a unique positive root. LetAs and , so does have a zero located in . Besides, notice thatWe shall consider two possibilities depending upon whether is positive or negative.Case 1: . LetThus, is strictly increasing in and strictly decreasing in , which implies that has a unique zero in .Case 2: . So, is decreasing and has a unique zero.It is easily obtained from the above discussions that does has a single zero. Then, . Besides, .
Next, let us prove that the first equation of system (4) has a single positive root. LetAs and , does have a (positive) zero located in . Besides, note thatWe shall also proceed by distinguishing two possibilities depending upon whether is positive or negative.Case 1: . LetThen, is strictly increasing in and decreasing in , meaning that has a single zero in .Case 2: . Hence, is decreasing and has a unique zero. Then, always has a single zero . Besides, .Thus, the claimed result follows.

3.2. Local Stability

Theorem 2. is locally asymptotically stable.

Proof. The corresponding Jacobian matrix of system (2) at is as follows: and its two eigenvalues areThus, the claimed result follows from the Lyapunov stability theorem [13].

3.3. Global Stability

Lemma 1. System (2) has no periodic orbit.

Proof. LetIt can be obtained in the interior of thatLetAs and for all , . Thus, we have .
Hence, in the interior of , system (2) has no periodic orbit according to the Bendixson–Dulac criterion [13].
On the boundary of , let denote an arbitrary point. Thus, three possibilities may occur.Case 1: , . Then, .Case 2: , . Then, .Case 3: , , . Hence,Thus, system (2) has no periodic orbit across the arbitrary point . The proof is completed.
In what follows, the main result of this paper will be given as follows.

Theorem 3. is globally asymptotically stable.

Proof. Based on Theorem 1, Lemma 1, and Theorem 2, the claimed result follows from the generalized Poincare–Bendixson theorem [13].

4. Numerical Experiments

To illustrate the main result of this paper and the impacts of different countermeasure probabilities on viral spread, some numerical experiments are presented in this section.

Example 1. Consider system (1) with , , , , , , , and . The initial condition is . In Figure 2, a comparison between the new proposed SICS model and the original SICS model is shown, from which it can be seen that the new proposed model is more reasonable in predicting virus prevalence because computer viruses would not go extinct (i.e., ), which demonstrates that the linear countermeasure probability overestimates the suppression of countermeasures on virus diffusion when compared to the nonlinear one.

Example 2. Consider system (1) with , , , , , , , , and . Six different initial conditions are listed below.
(1).(2).(3).(4).(5).(6).Figure 3 shows six orbits of system (1) with different initial conditions for a common system. It can be seen from this figure that no matter where the initial state starts, computer viruses would always exist and tend to a steady state, which coincides with the main result. This also reveals that the global stability is independent of the initial state.

Example 3. Consider system (1) with the common initial condition , and six sets of parameters are given in Table 1. Six orbits of system (1) with different system parameters for a common initial condition are shown in Figure 4, from which it can be seen that computer viruses would remain present and tend to a steady state, which accords with the main result. Additionally, this figure reveals that even starting from the same initial state the system would approach to different states for different parameters, which is distinct from the phenomenon in Example 2.

Example 4. Consider system (1) with , , , , , , and . The initial condition is . Figure 5 shows the influences of the varied countermeasure probabilities on the number of infected computers, where , , and . This figure also demonstrates that the nonlinear countermeasure probabilities which are continuously differentiable up to the second order may have many forms and pose different impacts on viral spread.

5. Summary and Outlook

A new SICS model has been proposed and analyzed in this paper. The global stability of the unique (viral) equilibrium has been proved and illustrated completely. Besides, a comparison between the new proposed model and the original SICS model has been shown, and the effects of varied countermeasure probabilities have also been revealed. The numerical experiments demonstrate that the nonlinear countermeasure probability is more reasonable than the linear one.

Additionally, the follow-up work arrangement is as follows. Firstly, time delays (e.g., [14, 15]), pulses (e.g., [16]), random fluctuations (e.g., [17, 18]), and optimal control strategies (e.g., [19]) can be considered in the new model. Secondly, the new model may be extended on wireless sensor networks (e.g., [2022]). With the popularity of social networks, individuals’ participation has a particularly important effect on information diffusion including propagation of computer viruses. For example, Alduaiji et al. [23] developed an influence propagation model for clique-based community detection in social networks. Li et al. [24] proposed a metric to measure the community-diversified influence in social networks. Therefore, the new model may also be extended in social networks. Finally, the new proposed model can be formulated for cloud computing security (e.g., [25]).

Data Availability

The data included in this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest with regard to the publication of this paper.

Authors’ Contributions

Xulong Zhang conceived and designed the study and reviewed and edited the manuscript. Yong Li performed the numerical experiments. All authors read and approved the manuscript.

Acknowledgments

This study was supported by the Natural Science Foundation of Shanxi Province of China under grant nos. 201801D121117 and 201901D111311.