Research Article | Open Access

Zizhen Zhang, Yougang Wang, Massimiliano Ferrara, "Stability and Hopf Bifurcation for a Delayed Computer Virus Model with Antidote in Vulnerable System", *Journal of Control Science and Engineering*, vol. 2017, Article ID 9360430, 9 pages, 2017. https://doi.org/10.1155/2017/9360430

# Stability and Hopf Bifurcation for a Delayed Computer Virus Model with Antidote in Vulnerable System

**Academic Editor:**Petko Petkov

#### Abstract

A delayed computer virus model with antidote in vulnerable system is investigated. Local stability of the endemic equilibrium and existence of Hopf bifurcation are discussed by analyzing the associated characteristic equation. Further, direction of the Hopf bifurcation and stability of the bifurcating periodic solutions are investigated by using the normal form theory and the center manifold theorem. Finally, numerical simulations are presented to show consistency with the obtained results.

#### 1. Introduction

Applications based on computer networks are becoming more and more popular in our daily life. While bringing convenience to us, computer networks are exposed to various threats [1, 2]. Therefore, it is urgent to explore the spreading law of computer viruses in networks. To this end, many dynamical models describing propagation of computer viruses have been established by scholars at home and abroad. Particularly the classic epidemic models, such as SIRS [3â€“5] model, SEIRS model [6], and SEIQRS model [7, 8], are used to investigate the spreading law of computer viruses due to the common feature between the computer virus and the biological virus. Some computer virus models with infectivity in both seizing and latent computers have been also proposed by Yang et al. [9â€“13].

Recently, Khanh and Huy [14] proposed the following computer virus model with different antidote rates of nodes in vulnerable system considering the immunizations ways and the vulnerabilities of the operating system:where , , , and are the sizes of susceptible, exposed, infectious, and recovered nodes at time , respectively; is the constant recruitment of the susceptible nodes; is the same rate at which every node in the states , , , and disconnects from the network; is the constant rate at which every susceptible node acquires temporary immunity due to antidote and Khanh and Huy [14] assume that taking system vulnerability into account; , , , and are the other state transition rates of system (1). Khanh and Huy [14] studied stability of system (1) and suggested some effective strategies for eliminating viruses.

It is well known that time delays of one type or another have been incorporated into computer virus models due to latent period of virus, temporary immunization period of nodes, or other reasons. Computer virus models with time delay have been investigated extensively in recent years [15â€“18]. Time delays can play a complicated role in the dynamics of dynamical systems, especially that they can cause Hopf bifurcation phenomenon of the models. In reality, the occurrence of Hopf bifurcation means that the state of computer virus spreading changes from an equilibrium point to a limit cycle, which is not welcomed in networks. Motivated by the work above and considering that it needs a period to reinstall system for the infected nodes in the network, we propose the following system with time delay:where is the time delay due to the period that the infected nodes use to reinstall system.

The rest of the paper is organized as follows. Section 2 obtains the basic reproduction number of system (2) and discusses local stability of the endemic equilibrium and existence of Hopf bifurcation; Section 3 determines direction of the Hopf bifurcation and stability of the bifurcated periodic solutions; Section 4 covers numerical analysis and simulations. Finally, Section 5 summarizes this work.

#### 2. Existence of Hopf Bifurcation

By a direct computation, we get that if , then system (2) has a unique endemic equilibrium , where , , , and withand is the basic reproduction number of system (2).

Based on the leading matrix of system (2) at the endemic equilibrium , the characteristic equation can be obtained as the following form:which derives thatwherewithWhen , (5) takes the following form:According to the expressions of and (), we can getwith and , are specified by (6) and (7), respectively. According to the assumption considering system vulnerability, we know that , , , and . In addition, one can be conclude thatbased on the analysis by Khanh and Huy in [14] when . Therefore, we can conclude that the endemic equilibrium is locally stable for according to the Routh-Hurwitz criterion.

The time delay is always positive in our physical system. It follows that if instability occurs for a particular value of the delay , a characteristic root of (5) must intersect the imaginary axis according to Corollary in [19]. Assume that (5) has a purely imaginary root . Then, the following identity must be truewhich yields the following equation:whereDenote ; (13) becomesDefineThus,SetLet . Then, (18) becomeswhereDenote

Discussion about the distribution of the roots of (15) is similar to that in [20]. Thus, we have the following lemma.

Lemma 1. *For (15), one has the following:*(i)*If , (15) has at least one positive root.*(ii)*If and , (15) has positive roots if and only if and .*(iii)*If and , (15) has positive roots if and only if there exists at least one such that and .*

In what follows, we assume that and the coefficients in satisfy one of the following conditions in (a)â€“(c).(a).(b), , , and .(c) and , and there exists at least one such that and .

Suppose that the condition holds; then (15) has at least one positive root such that (13) has a positive root . Further, we can getDifferentiating both sides of (5) with respect to yieldsFurther, we havewhere and .

Obviously, if the condition , , holds, then . Therefore, the transversality condition is satisfied if , , holds. According to the Hopf bifurcation theorem in [21], we can obtain the following results.

Theorem 2. *Suppose that conditions and hold for system (2). The endemic equilibrium is locally asymptotically stable when and a Hopf bifurcation occurs at the endemic equilibrium when .*

#### 3. Properties of the Hopf Bifurcation

Let , . By the transformation, , , , , , and system (2) is equivalent to the following in :where , , and , are defined as follows, respectively:with

Thus, there exists a matrix function whose components are functions of the bounded variation in such thatIn fact, we chooseFor , defineThen system (25) is equivalent toFor , we define the adjoint operator of and the following bilinear inner productwhere .

Let be the eigenvector of belonging to and be the eigenvector of belonging to . It is not difficult to show thatFrom (33), we can getThen we choosesuch that .

Next, we compute the coordinates to describe the center manifold at . Let be the solutions of (31) when . DefineOn the center manifold , we havewhere and are local coordinates for center manifold in the direction of and . We now consider only the real solution of (31), which giveswhereThus,whereSincewe haveFrom (40)â€“(43), we havewithTherefore,Thus, from (40) and (47), we can obtain

In order to compute , we need to compute and . From (37)-(40), we havewhereFrom (38), (39), (49), and (50), one can obtainNow for ,which on comparing the coefficients with (50) givesFrom (51), (54), and the definition of , we haveThus,where and are constant vectors, to be determined. It follows from the definition of , (54), and (55) thatwhere . From (51) and (52), we obtainNoticing thatand substituting (57) and (61) into (59), we obtainTherefore, we can obtainSimilarly, we haveThen, we haveThus, the properties of the Hopf bifurcation of system (2) can be stated as follows.

Theorem 3. *Direction of the Hopf bifurcation is determined by : if , then the Hopf bifurcation is supercritical (subcritical). Stability of the bifurcating periodic solutions is determined by : if , then the bifurcating periodic solutions are stable (unstable). Period of the bifurcating periodic solutions is determined by : if , then the period of the bifurcating periodic solutions increases (decreases).*

#### 4. Numerical Simulations

In this section, numerical simulations are presented by taking partial parameters from numerical simulations in [14] and they are as follows: , , , , , , , and . Then, the following system can be obtained:

By virtue of the chosen values of parameters, we can get and the unique endemic equilibrium . Further, we can verify that the conditions indicated in Theorem 2 are satisfied. In this case we can obtain , , and .

Therefore, is asymptotically stable when according to Theorem 2, which can be shown as the numerical simulation in Figure 1. In this case, propagation of the computer viruses can be controlled easily. However, system (68) undergoes a Hopf bifurcation at when passes through the critical value . This property can be illustrated by the numerical simulation in Figure 2 and propagation of the computer viruses will be out of control. In addition, according to (67), we have , , and . Thus, we know that the direction of the Hopf bifurcation at is supercritical; the period of the bifurcating periodic solutions decreases; and the bifurcating periodic solutions are stable. From the viewpoint of biology, if the periodic solutions bifurcating from the Hopf bifurcation are stable, then the susceptible, exposed, infectious, and recovered nodes in system (68) may coexist in an oscillatory mode. This phenomenon is not welcome in a real network. We regret to say that only supercritical Hopf bifurcation is identified in our numerical case study. However, it should be pointed out that subcritical Hopf bifurcations are quite usual in dynamical systems with time delay, and the existence of an unstable periodic solution makes the dynamics even more intricate, which has been discussed in population dynamics in the literature [22].

It should be also pointed out that we know that onset of the Hopf bifurcation can be postponed by properly increasing values of the parameters , , and based on numerical simulations. In reality, cure rate of the exposed node and cure rate of the infectious nodes can be properly enhanced by updating of antivirus software on nodes; disconnecting rate of every node can be properly increased by the managers of a real network. Therefore, propagation of the computer viruses in system (2) can be controlled by timely updating of antivirus software on nodes and timely disconnecting nodes from a real network when the connections are unnecessary.

#### 5. Conclusions

A delayed computer virus model is proposed based on the literature [14] considering that the outbreak of computer virus usually lags. By theoretical analysis, the critical value of the delay where the Hopf bifurcation occurs is obtained and our results show that the time delay plays an important role in the stability of the considered computer virus model in the present paper.

When the value of the delay , the endemic equilibrium of the model is asymptotically stable and the propagation of the computer virus is divinable. However, when the value of the delay , the endemic equilibrium of the model will lose its stability and a Hopf bifurcation occurs. In this case, propagation of the computer viruses will be out of control. Therefore, we should postpone occurrence of the Hopf bifurcation by taking some effective measures, such as timely updating of antivirus software on nodes and timely disconnecting nodes from the network when the connections are unnecessary. In addition, properties of the Hopf bifurcation are also investigated by using the normal form theory and center manifold theorem.

Of course, various factors in a real network can affect propagation of the computer viruses. Among them, time delay is important and the present paper thus concentrates on analyzing it. Other network impacts of computer viruses such as network topology, network eigenvalue, and patch forwarding cannot be neglected, and they will be a major emphasis of our future research. Also, stability of the endemic equilibrium and existence of the periodic solutions are investigated only at the critical value . As stated in the literature [22], it is an open question yet whether there exists stable endemic equilibrium for even larger time delay. This is the other interesting future research direction for us.

#### Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

#### Acknowledgments

This work was supported by Natural Science Foundation of Anhui Province (no. 1608085QF151, no. 1608085QF145, and no. 1708085MA17).

#### References

- J. Ren, X. Yang, Q. Zhu, L.-X. Yang, and C. Zhang, â€śA novel computer virus model and its dynamics,â€ť
*Nonlinear Analysis: Real World Applications*, vol. 13, no. 1, pp. 376â€“384, 2012. View at: Publisher Site | Google Scholar | MathSciNet - J. Ren, X. Yang, L.-X. Yang, Y. Xu, and F. Yang, â€śA delayed computer virus propagation model and its dynamics,â€ť
*Chaos, Solitons & Fractals*, vol. 45, no. 1, pp. 74â€“79, 2012. View at: Publisher Site | Google Scholar | MathSciNet - L. Feng, X. Liao, H. Li, and Q. Han, â€śHopf bifurcation analysis of a delayed viral infection model in computer networks,â€ť
*Mathematical and Computer Modelling*, vol. 56, no. 7-8, pp. 167â€“179, 2012. View at: Publisher Site | Google Scholar | MathSciNet - X. Han and Q. Tan, â€śDynamical behavior of computer virus on Internet,â€ť
*Applied Mathematics and Computation*, vol. 217, no. 6, pp. 2520â€“2526, 2010. View at: Publisher Site | Google Scholar | MathSciNet - Y. Muroya, Y. Enatsu, and H. Li, â€śGlobal stability of a delayed {SIRS} computer virus propagation model,â€ť
*International Journal of Computer Mathematics*, vol. 91, no. 3, pp. 347â€“367, 2014. View at: Publisher Site | Google Scholar | MathSciNet - B. K. Mishra and D. K. Saini, â€śSEIRS epidemic model with delay for transmission of malicious objects in computer network,â€ť
*Applied Mathematics and Computation*, vol. 188, no. 2, pp. 1476â€“1482, 2007. View at: Publisher Site | Google Scholar | MathSciNet - B. K. Mishra and N. Jha, â€śSEIQRS model for the transmission of malicious objects in computer network,â€ť
*Applied Mathematics and Computation*, vol. 34, no. 3, pp. 710â€“715, 2010. View at: Publisher Site | Google Scholar | MathSciNet - J. Liu, â€śHopf bifurcation in a delayed SEIQRS model for the transmission of malicious objects in computer network,â€ť
*Journal of Applied Mathematics*, vol. 2014, Article ID 492198, 8 pages, 2014. View at: Publisher Site | Google Scholar - L.-X. Yang and X. F. Yang, â€śA new epidemic model of computer viruses,â€ť
*Communications in Nonlinear Science and Numerical Simulation*, vol. 19, no. 6, pp. 1935â€“1944, 2014. View at: Publisher Site | Google Scholar | MathSciNet - L.-X. Yang, X. F. Yang, Q. Zhu, and L. Wen, â€śA computer virus model with graded cure rates,â€ť
*Nonlinear Analysis. Real World Applications*, vol. 14, no. 1, pp. 414â€“422, 2013. View at: Publisher Site | Google Scholar | MathSciNet - L.-X. Yang and X. F. Yang, â€śPropagation behavior of virus codes in the situation that infected computers are connected to the internet with positive probability,â€ť
*Discrete Dynamics in Nature and Society*, vol. 2012, Article ID 693695, 13 pages, 2012. View at: Publisher Site | Google Scholar - Y. Muroya and T. Kuniya, â€śGlobal stability of nonresident computer virus models,â€ť
*Mathematical Methods in the Applied Sciences*, vol. 38, no. 2, pp. 281â€“295, 2015. View at: Publisher Site | Google Scholar | MathSciNet - Y. Muroya, H. Li, and T. Kuniya, â€śOn global stability of a nonresident computer virus model,â€ť
*Acta Mathematica Scientia. Series B. English Edition*, vol. 34, no. 5, pp. 1427â€“1445, 2014. View at: Publisher Site | Google Scholar | MathSciNet - N. H. Khanh and N. B. Huy, â€śStability analysis of a computer virus propagation model with antidote in vulnerable system,â€ť
*Acta Mathematica Scientia. Series B. English Edition*, vol. 36, no. 1, pp. 49â€“61, 2016. View at: Publisher Site | Google Scholar | MathSciNet - Z. Zhang and D. Bi, â€śBifurcation analysis in a delayed computer virus model with the effect of external computers,â€ť
*Advances in Difference Equations*, vol. 317, 2015. View at: Publisher Site | Google Scholar | MathSciNet - T. Dong, X. Liao, and H. Li, â€śStability and Hopf bifurcation in a computer virus model with multistate antivirus,â€ť
*Abstract and Applied Analysis*, Article ID 841987, 2012. View at: Publisher Site | Google Scholar | MathSciNet - Y. Yao, X.-w. Xie, H. Guo, G. Yu, F.-X. Gao, and X.-j. Tong, â€śHopf bifurcation in an Internet worm propagation model with time delay in quarantine,â€ť
*Mathematical and Computer Modelling*, vol. 57, no. 11-12, pp. 2635â€“2646, 2013. View at: Publisher Site | Google Scholar | MathSciNet - J. Ren and Y. Xu, â€śStability and bifurcation of a computer virus propagation model with delay and incomplete antivirus ability,â€ť
*Mathematical Problems in Engineering*, Article ID 475934, 2014. View at: Publisher Site | Google Scholar | MathSciNet - S. G. Ruan and J. J. Wei, â€śOn the zeros of transcendental functions with applications to stability of delay differential equations with two delays,â€ť
*Dynamics of Continuous, Discrete & Impulsive Systems A: Mathematical Analysis*, vol. 10, no. 6, pp. 863â€“874, 2003. View at: Google Scholar | MathSciNet - X. Li and J. Wei, â€śOn the zeros of a fourth degree exponential polynomial with applications to a neural network model with delays,â€ť
*Chaos, Solitons & Fractals*, vol. 26, no. 2, pp. 519â€“526, 2005. View at: Publisher Site | Google Scholar | MathSciNet - B. D. Hassard, N. D. Kazarinoff, and Y.-H. Wan,
*Theory and Applications of Hopf Bifurcation*, Cambridge University Press, 1981. View at: MathSciNet - G. Stepan, â€śGreat delay in a predator-prey model,â€ť
*Nonlinear Analysis. Theory, Methods & Applications*, vol. 10, no. 9, pp. 913â€“929, 1986. View at: Publisher Site | Google Scholar | MathSciNet

#### Copyright

Copyright © 2017 Zizhen Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.