Mathematical Problems in Engineering

Volume 2012, Article ID 407064, 13 pages

http://dx.doi.org/10.1155/2012/407064

## Two Quarantine Models on the Attack of Malicious Objects in Computer Network

^{1}Department of Applied Mathematics, Birla Institute of Technology, Mesra, Ranchi 835215, India^{2}Department of Applied Mathematics, Nilai Educational Trust's Group of Institutions, Thakurgaon, Ranchi 835205, India

Received 5 April 2011; Accepted 3 June 2011

Academic Editor: Zidong Wang

Copyright © 2012 Bimal Kumar Mishra and Aditya Kumar Singh. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

SEIQR (Susceptible, Exposed, Infectious, Quarantined, and Recovered) models for the transmission of malicious objects with simple mass action incidence and standard incidence rate in computer network are formulated. Threshold, equilibrium, and their stability are discussed for the simple mass action incidence and standard incidence rate. Global stability and asymptotic stability of endemic equilibrium for simple mass action incidence have been shown. With the help of Poincare Bendixson Property, asymptotic stability of endemic equilibrium for standard incidence rate has been shown. Numerical methods have been used to solve and simulate the system of differential equations. The effect of quarantine on recovered nodes is analyzed. We have also analyzed the behavior of the susceptible, exposed, infected, quarantine, and recovered nodes in the computer network.

#### 1. Introduction

It is a well-known fact that cyber world brought massive changes in the society. But nowadays cyber world is being threatened by the attack of malicious objects. Electronic mails and use of secondary devices are the major sources for the transmission of malicious objects in the computer network these days [1]. In accordance with their propagating behavior and characteristic, malicious objects spread in different way to each other. To curb the spread and impact of these malicious objects, it is important to study about their feature propagating methods, means, and limitation. Isolation may also be a very important and easy way to curb the transmission of these malicious objects. The word quarantine has evolved, meaning a forced isolation or stoppage of interactions with others. In biological world, quarantine has been adopted to reduce the transmission of human diseases, such as Leprosy, Plague, and Smallpox. Same concept has been adopted in the cyber world; the most infected nodes are isolated from the computer network till they get recovered. Anderson and May [2, 3] discussed the spreading nature of biological viruses, parasite, and so forth. leading to infectious diseases in human population through several epidemic models. The action of malicious objects throughout a network can be studied by using epidemiological models for disease propagation [4–9]. Richard and Mark [10] proposed an improved SEI (Susceptible-Exposed-Infected) model to simulate virus propagation. However, they do not show the length of latency and take into account the impact of antivirus software. Mishra and Saini [11, 12] presented a SEIRS model with latent and temporary immune periods to overcome limitation, which can reveal common worm propagation. Feng and Thieme [13–15] considered very general endemic models that include SEIQR model, with arbitrarily distributed periods of infection including quarantine and with a general form for the incidence term that includes the three forms. Wa and Feng [16] showed that an epidemic approximation near threshold number () can have a homoclinic bifurcation, so that some perturbation of the original model might also have a homoclinic bifurcation. Several authors studied the global stability of several epidemiological models [17–24]. Wang et al. studied the robustness of filtering on nonlinearities in packet losses, sensors, and so forth, [25–30].

In the SEIQR models for infection that confers immunity, susceptible nodes go to latent period, that is, nodes become infected but not infectious called exposed nodes, thereafter some nodes go to infectious class. Some infected nodes remain in the infected class while they are infectious and then move to the recovered class after the run of antimalicious software. Other most infected nodes are transferred into the quarantine class while they are infectious and then move to the recovered class after their recovery. The models here have a variable total population size, because they have recruitment into the susceptible class by inclusion of some new nodes and they have both crashing of nodes dueto reason otherthan the attack of malicious codes and crashing of nodes due to the attack of malicious codes. We have developed two models and have taken simple mass action incidence and standard incidence rate, because standard incidence rate is more realistic than the simple mass action incidence [31].

#### 2. Model 1: Mathematical Formulation for the SEIQR Model with Simple Mass Action Incidence

Let be the number of susceptible at time , be the number of exposed, be the number of infected nodes, be the number of quarantined nodes, be the recovered nodes after the run of antimalicious software, and be the total population size in time . The schematic diagram for the flow of malicious objects is depicted in Figure 1.

As per our assumption, we have the following system of equations: where is the recruitment rate of susceptible nodes, is the per capita natural mortality rate, the death rate in infective compartment due to malicious objects, and the death rate in quarantine class due to malicious objects. The per capita contact rate is average number of effective contacts with other nodes per unit time, is the rate constant which leaves the exposed compartment for infective class, is the rate constant which leaves the infective class for quarantine class, is the rate by which the nodes go from quarantine class into recovered class, and is the rate of vertical transmission into the infective class.

Lemma 2.1. *Consider the following two systems:
**
where , belong to , and are continuous function which satisfy a local Lipschitz condition in any compact set which belongs to , and as tends to infinity so that the second system is the limit system. Let and be the solutions of these systems, respectively. Suppose that is a locally asymptotically stable equilibrium of the limit system and its attractive region is
**
Let be the omega limit set of . If , then . *

* Lipschitz’s condition*

If for some function *,* the following condition is satisfied:
where and are any points in the domain and is a constant, this condition is called the Lipschitz’s condition.

Now, the total population size satisfies the equation
When , then from the above equation .

Let us define the solution region by .

The system (2.1) always has the malicious oject-free equilibrium .

Here the quarantine reproduction number is
If , then also contains a unique positive, endemic equilibrium .

Now from (2.1), on simplification, we have
We have , Hence,

Theorem 2.2. *Consider the system (2.1). If , then solution set is locally asymptotically stable for disease-free equilibrium . If , then the region , is an asymptotically stable region for the endemic equilibrium .*

*Proof. *For local stability, Jacobian of system (2.1) at equilibrium is
The eigenvalues of are . Since all the roots are real and negative, system is locally asymptotically stable.

In order to prove the global stability when , consider the Liapunov function . Liapunov derivative

As we know the Liapunov Lasallel theorem [17] implies that solutions in approach the largest positively invariant subset of the set where , which is the set where *. *

In this set,

We have
when
then
**

We have from (2.1),

this implies

Thus,
when

Thus, all solutions in the set go to the disease, free equilibrium . By Lemma 2.1, the system is globally asymptotically stable, when .

From the fourth equation in system (2.1), we can solve to obtain
Now, . This implies ;

The similarly, solving for by using, fifth equation in (2.1), we obtain
An application of Lemma 2.1 shows that the endemic equilibrium of model (2.1) is globally asymptotically stable in the region .

#### 3. Model 2: The SEIQR Model with the Standard Incidence Rate

The flow chart for the SEIQR model will be the same as depicted in Figure 1, but instead of simple mass action incidence , we take standard incidence rate , where .

The system of differential equations for this model is where the parameters are the same as in the previous model,

When then *.* When there are malicious objects free equilibrium *.* For this model basic reproduction number is
If , then also contains a unique positive, endemic equilibrium where

Theorem 3.1. *Consider the system (3.1). If , then solution set is locally asymptotic stable for disease-free equilibrium . If , then the region is an asymptotically stable region for the endemic equilibrium _{.}*

*Proof. *For the local stability, Jacobian of the system (3.1) at equilibrium is
The eigenvalues of are . Since all the roots are real and negative, system is locally asymptotically stable.

With a view to prove the global stability when , we use the Liapunov function by putting , we get the same equation as we have found in the model 1; therefore, the proof will be analogous with the proofs in the previous section.

In order to prove the global stability when and , first we get , this implies when tends to infinity.

The limit system for (3.1) is
where *.* The first three equations are independent of and . In the three dimensional first octant region with , the equilibrium (0, 0, 0) is saddle, that is, attractive along and has a repulsive direction into the region. The other equilibrium in the region is locally asymptotically stable.

Using Dulac’s criteria with multiplier , we have
so that there are no periodic solutions in the region. Thus, by the Poincare-Bendixson theory, all solutions starting in the first octant region with and approach as tends infinity.

In this case, the differential equation for has the limiting equation
so that tends to by Lemma 2.1.

Similarly, the differential equation for has the limiting equation
so that tends to by Lemma 2.1. Thus is a globally asymptotically stable equilibrium for the limit system (3.6). Hence, by Lemma 2.1, all solutions starting in the region of the system (3.1) approach the endemic equilibrium as tends to infinity. **

#### 4. Conclusion

Inspired by the biological compartmental epidemic model, we made an attempt to develop two SEIQR models, one using simple mass action incidence and the other using standard incidence rate. Vertical transmission has been included into infectious compartment. Runge Kutta Fehlberg fourth-fifth order method is used to solve and simulate the system (2.1) and (3.1) by using parametrical values mentioned in Table 1. The model has a constant recruitment of the nodes and exponential natural and infection-related death (crashing) of the nodes. Global stability of the unique endemic equilibrium for the epidemic model has been established. We observe that the behavior of the Susceptible, Exposed, Infected, and Quarantined nodes with respect to time is asymptotically stable, which is depicted in Figures 2 and 4. The effect of on is depicted in Figure 3. When the nodes are highly infected by different kinds of malicious objects, quarantine is one of the remedy. We run antimalicious software of latest signature against quarantined nodes, and these nodes are kept under observation. The more we quarantine the most infected nodes, the more the recovery is; the lesser we quarantine, the lesser the recovery is. Also at a very specific short interval of time, the recovery of the nodes is constant when the quarantine node decreases. These can be observed in Figure 3. Simulation result agrees with the real life situation. The basic reproduction number is obtained and has been identified as a threshold parameter. If , the disease-free equilibrium is globally stable in the feasible region and the disease always dies out. If , a unique endemic equilibrium exists and is globally stable in the interior of the feasible region, and once the disease appears, it eventually persists at the unique endemic equilibrium level. Lyapunov function is used to prove the global stability of when . In our model, the number of contacts is influenced by the size of the quarantine class . The quarantine process is an alternative method for reducing the average infectious period by isolating some infectives, so that they do not transmit the malicious objects in the computer network. We have observed that both the effective infectious period and decrease as the quarantine rate increases.

The analysis of quarantine reproduction number by Feng and Thieme [14, 15] andHethcote et al. [31] agrees with our model. Feng and Theieme [14, 15] in their SIQR model observed that the quarantine reproduction number was independent of the mean residence time in the quarantine class . Hethcote et al. [31] also had their same observation regarding the independence of the mean residence time in the class for all of their endemic models. We also have the same observation for our SEIQRS model. The mean residence time in the class for our model SEIQRS is . The expression for the threshold does not involve the parameter . This comes from our assumption that the nodes in the quarantine class do not infect other nodes and nodes are not infectious when they move out of the quarantine class. The quarantine reproduction number , depends on parameter . For example, if , then transfer out of infectious class to quarantine class is n times as frequent as transfer to the removed class . A positive rate constant to transfer out of infectious class by quarantine does decrease the quarantine reproduction number , so that it is less than its value without quarantine. Hence the use of quarantine to control a disease not only decreases the endemic infective class size when remains above 1, but also makes it easier to obtain leading to disease extinction.

The future work will involve in taking time delay constraints in various compartments which may lead to more interesting result.

#### Acknowledgment

The authors are thankful to the editor and anonymous referees for their comments which substantially improved the quality of the paper.

#### References

- M. E. J. Newman, S. Forrest, and J. Balthrop, “Email networks and the spread of computer viruses,”
*Physical Review E*, vol. 66, no. 3, Article ID 035101, 4 pages, 2002. View at Publisher · View at Google Scholar - R. M. Anderson and R. M. May,
*Infection Disease of Humans, Dynamics and Control*, Oxford University Press, Oxford, UK, 1992. - R. M. Anderson and R. M. May, “Population biology of infectious diseases,”
*Nature*, vol. 180, pp. 361–367, 1999. View at Google Scholar - S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff, “Self-nonself discrimination in a computer,” in
*Proceedings of the IEEE Symposium on Research in Security and Privacy*, pp. 202–212, May 1994. - E. Gelenbe, “Keeping viruses under control,” in
*Proceedings of the 20th International Symposium on Computer and Information Sciences (ISCIS '05)*, vol. 3733 of*Lecture Notes in Computer Science*, pp. 304–311, Springer, October 2005. View at Publisher · View at Google Scholar - E. Gelenbe, “Dealing with software viruses: a biological paradigm,”
*Information Security Technical Report*, vol. 12, no. 4, pp. 242–250, 2007. View at Publisher · View at Google Scholar - E. Gelenbe, V. Kaptan, and Y. Wang, “Biological metaphors for agent behavior,” in
*Computer Science*, pp. 667–675, Springer-Verlag, 2004. View at Google Scholar - J. R. C. Piqueira and F. B. Cesar, “Dynamical models for computer viruses propagation,”
*Mathematical Problems in Engineering*, vol. 2008, Article ID 940526, 11 pages, 2008. View at Publisher · View at Google Scholar - J. R. C. Piqueira, B. F. Navarro, and L. H. A. Monteiro, “Epidemiological models applied to virus in computer networks,”
*Journal of Computer Science*, vol. 1, no. 1, pp. 31–34, 2005. View at Google Scholar - W. T. Richard and J. C. Mark, “Modeling virus propagation in peer-to-peer networks,” in
*Proceedings of the 5th International Conference on Information, Communications and Signal Processing*, pp. 981–985, December 2005. - B. K. Mishra and D. K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network,”
*Applied Mathematics and Computation*, vol. 188, no. 2, pp. 1476–1482, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus - B. K. Mishra and D. K. Saini, “Mathematical models on computer viruses,”
*Applied Mathematics and Computation*, vol. 187, no. 2, pp. 929–936, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus - Z. Feng and H. R. Thieme, “Recurrent outbreaks of childhood diseases revisited: the impact of isolation,”
*Mathematical Biosciences*, vol. 128, no. 1-2, pp. 93–130, 1995. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus - Z. Feng and H. R. Thieme, “Endemic models with arbitrarily distributed periods of infection I: general theory,”
*SIAM Journal on Applied Mathematics*, vol. 61, no. 3, pp. 803–833, 2000. View at Google Scholar · View at Scopus - Z. Feng and H. R. Thieme, “Endemic models with arbitrarily distributed periods of infection II: fast disease dynamics and permanent recovery,”
*SIAM Journal on Applied Mathematics*, vol. 61, no. 3, pp. 983–1012, 2000. View at Google Scholar · View at Scopus - L. I. Wu and Z. Feng, “Homoclinic bifurcation in an SIQR model for childhood diseases,”
*Journal of Differential Equations*, vol. 168, no. 1, pp. 150–167, 2000. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus - K. L. Cooke and P. van den Driessche, “Analysis of an SEIRS epidemic model with two delays,”
*Journal of Mathematical Biology*, vol. 35, no. 2, pp. 240–260, 1996. View at Google Scholar - M. Y. Li, J. R. Graef, L. C. Wang, and J. Karsai, “Global dynamics of a SEIR model with varying total population size,”
*Mathematical Biosciences*, vol. 160, no. 2, pp. 191–213, 1999. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - D. Greenhalgh, “Hopf bifurcation in epidemic models with a latent period and nonpermanent immunity,”
*Mathematical and Computer Modelling*, vol. 25, no. 2, pp. 85–107, 1997. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - J. K. Hale,
*Ordinary Differential Equations*, Krieger, Basel, Switzerland, 2nd edition, 1980. - H. W. Hethcote, H. W. Stech, and P. van dan Driessche, “Periodicity and stability in epidemic models: a survey,” in
*Differential Equations and Applications in Ecology, Epidemics and Population Problems*, K. L. Cook, Ed., pp. 65–85, Academic Press, New York, NY, USA, 1981. View at Google Scholar - M. Y. Li and J. S. Muldowney, “Global stability for the SEIR model in epidemiology,”
*Mathematical Biosciences*, vol. 125, no. 2, pp. 155–164, 1995. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - M. Y. Li and L. Wang, “Global stability in some SEIR epidemic models,” in
*Mathematical Approaches for Emerging and Reemerging Infectious Diseases: Models, Methods, and Theory*, C. Chavez, S. Blower, P. van den Driessche, D. Kirscner, and A. Yakhdu, Eds., vol. 126, pp. 295–311, Springer, New York, NY, USA, 2002. View at Google Scholar · View at Zentralblatt MATH - Y. Michel, H. Smith, and L. Wang, “Global dynamics of an seir epidemic model with vertical transmission,”
*SIAM Journal on Applied Mathematics*, vol. 62, no. 1, pp. 58–69, 2001. View at Google Scholar - H. Dong, Z. Wang, and H. Gao, “Observer-based H∞ control for systems with repeated scalar nonlinearities and multiple packet losses,”
*International Journal of Robust and Nonlinear Control*, vol. 20, no. 12, pp. 1363–1378, 2010. View at Publisher · View at Google Scholar - Z. Wang, D. W. C. Ho, H. Dong, and H. Gao, “Robust H∞ finite-horizon control for a class of stochastic nonlinear time-varying systems subject to sensor and actuator saturations,”
*IEEE Transactions on Automatic Control*, vol. 55, no. 7, Article ID 5441037, pp. 1716–1722, 2010. View at Publisher · View at Google Scholar - B. Shen, Z. Wang, and Y. S. Hung, “Distributed H∞-consensus filtering in sensor networks with multiple missing measurements: the finite-horizon case,”
*Automatica*, vol. 46, no. 10, pp. 1682–1688, 2010. View at Publisher · View at Google Scholar - B. Shen, Z. Wang, H. Shu, and G. Wei, “Robust H∞ finite-horizon filtering with randomly occurred nonlinearities and quantization effects,”
*Automatica*, vol. 46, no. 11, pp. 1743–1751, 2010. View at Publisher · View at Google Scholar - B. Shen, Z. Wang, and X. Liu, “Bounded H-infinity synchronization and state estimation for discrete time-varying stochastic complex networks over a finite-horizon,”
*IEEE Transactions on Neural Networks*, vol. 22, no. 1, pp. 145–157, 2011. View at Publisher · View at Google Scholar · View at PubMed - H. Dong, Z. Wang, D. W. C. Ho, and H. Gao, “Variance-constrained H∞ filtering for a class of nonlinear time-varying systems with multiple missing measurements: the finite-horizon case,”
*IEEE Transactions on Signal Processing*, vol. 58, no. 5, Article ID 5410142, pp. 2534–2543, 2010. View at Publisher · View at Google Scholar - H. Hethcote, M. Zhien, and L. Shengbing, “Effects of quarantine in six endemic models for infectious diseases,”
*Mathematical Biosciences*, vol. 180, pp. 141–160, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet