Recent Advances on Methods and Applications of Nonlinear Differential EquationsView this Special Issue
Research Article | Open Access
Hopf Bifurcation of an Improved SLBS Model under the Influence of Latent Period
A model applicable to describe the propagation of computer virus is developed and studied, along with the latent time incorporated. We regard time delay as a bifurcating parameter to study the dynamical behaviors including local asymptotical stability and local Hopf bifurcation. By analyzing the associated characteristic equation, Hopf bifurcation occurs when the time delay passes through a sequence of critical values. A formula for determining the direction of the Hopf bifurcation and the stability of bifurcating periodic solutions is given by using the normal form method and center manifold theorem. Finally, illustrative examples are given to support the theoretical results.
With the rapid development of computer technologies and network applications, the Internet has become a powerful mechanism for propagating computer virus. Because of this, computers connected to the Internet become much vulnerable to digital threats.
It is quite urgent to understand how computer viruses spread over the Internet and to propose effective measures to cope with this issue. To achieve this goal, and in view of the fact that the spread of virus among computers resembles that of biological virus among a population, it is suitable to establish dynamical models describing the propagation of computer viruses across the Internet by appropriately modifying epidemic models .
Based on the fact that infectivity is one of the common features shared by computer viruses and their biological counterparts , some classic epidemic models were established for computer virus propagation, such as the SIRS model [3–7], the SEIR model [8, 9], the SEIRS model , the SEIQV model , and the SEIQRS model . In [13–15] the authors made the following assumptions.(H1) All computers connected to the Internet are partitioned into three compartments: susceptible computers (-computers), infected computers that are latent (-computers), and infected computers that are breaking out (-computers). (H2) All newly connected computers are virus-free.(H3) External computers are connected to the Internet at constant rate . Meanwhile, internal computers are disconnected from the Internet at rate .(H4) Each virus-free computer is infected by a virulent computer at constant rate , and the ratio of previously virus-free computers that are infected exactly at time is .(H5) Breaking-out computers are cured at constant rate .(H6) Latent computers break out at constant rate .
According to the above assumptions, the authors of [14, 15] proposed the proposed the following SLBS model, which is formulated as It is well known that some computer viruses would delay a period to break out after the computer is infected. However, the above model fails to consider the concrete time of the delay. Thus, this paper aims to establish a model to incorporate the unconsidered factor, by adding a delay item to the above model. First, we give another assumption as (H7): -computers turn out to be -computers with constant time delay .
According to the above assumptions (H1)–(H7), the new model with time delay is formulated as Here, we let , , and represent the percentage of -, -, and -computers in all internal computers at time , respectively. Then we get and consider the following equivalent two-dimensional subsystem:
The initial conditions of (3) are given by , , and , where , the Banach space of the continuous functions mapping the interval into .
The remainder of this paper is organized as follows. In Section 2, the stability of trivial solutions and the existence of Hopf bifurcation are discussed. In Section 3, a formula for determining the direction of Hopf bifurcation and the stability of bifurcating periodic solutions will be given by using the normal form and center manifold theorem introduced by Hassard et al. in . In Section 4, numerical simulations aimed at justifying the theoretical analysis will be reported.
2. Stability of the Equilibria and Existence of Hopf Bifurcation
This section is intended to study model (3) theoretically, by analyzing the stability of its solutions and the existence of Hopf bifurcation. For the convenience of the following description, we define the basic reproduction number of system (3) as
We have the following result with respect to the stable state of system (3).
Theorem 1. Consider system (3) with . Then the unique virus-free equilibrium is globally asymptotically stable if , whereas becomes unstable and the unique positive equilibrium is locally asymptotically stable if .
The proof is omitted here (see  for details).
The linearized equations of (3) are as follows: The determinant of the Jacobian matrix of the system (5) at is given by , where Let , and we can obtain the following characteristic equation: where , , , .
Theorem 2. Suppose that , and hold; then the positive equilibrium is asymptotically stable for and system (3) undergoes a Hopf bifurcation at when .
Proof. Suppose that is a root of (7); then separating the real and imaginary parts of (7), we have
Adding up the squares of (8) yields
Since , we derive the following equations:
Therefore, (9) exists as a unique positive solution , and the characteristic equation (7) has a pair of pure imaginary roots . By (8), we have By Theorem 1, for , the positive equilibrium is locally asymptotically stable, and hence by Butler’s Lemma , remains stable for . Now, we need to show This will signify that there exists at least one eigenvalue with positive real part for . Moreover, the conditions for Hopf bifurcation  are then satisfied yielding the required periodic solution. Now, by differentiating (9) with respect to , we get This gives Thus, Since we have that As , thus Therefore, the transversality condition holds and thus Hopf bifurcation occurs at . The proof is complete.
3. Direction of the Hopf Bifurcation
In this section, we derive explicit formulae for computing the direction of the Hopf bifurcation and the stability of bifurcation periodic solution at critical value by using the normal form theory and center manifold reduction.
Letting , , , , and , system (3) is transformed to an FDE as where , , , , , Using the Riesz representation theorem, there exists a function of bounded variation for , such that In fact, we can choose where is Dirac delta function. In the following, for , we define Then system (18) can be rewritten as where For , the adjoint operator of is defined by where is the transpose of the matrix . We define where . We know that is an eigenvalue of , so is also an eigenvalue of . We can get .
From the above discussion, it is easy to know that Hence, we obtain Suppose that the eigenvector Then the following relationship is obtained: Hence, we obtain Let Hence, we obtain
In the remainder of this section, by using the same notations as in the work by Hassard et al. , we first compute the coordinates or describing the center manifold at . Letting be the solution of (18) with , we define , and On the center manifold we have where In fact, and are local coordinates for in the direction of and . Note that if is, we will deal with real solutions only. Since , Rewrite (37) as where From (18) and (38), we have Let where Taking the derivative of with respect to in (36), we have Substituting (36) and (38) into (43), we obtain Then substituting (36) and (41) into (42), we have the following results: Comparing the coefficients of (44) with (45), the following equations hold: Since , we have Thus, we can obtainSo, we have It follows from (38) and (39) that where Then we have Comparing the coefficients of the above equation with those in (41), we have In what follows, we focus on the computation of and . For the expression of , we have Comparing the coefficients of the above equation, we can obtain that Substituting (56) into (46) and (57) into (47), respectively, we get We can easily obtain the solutions of (58) as We will determine and . Form the definition of in (23), we have From (59), (56) and (57), we have Substituting (59) and (61) into (62) and noticing that we can obtain which leads to It follows that Hence, we know and then we can obtain . The following parameters can be calculated:
Theorem 3. Under the condition of Theorem 1, one has the following.(1)is Hopf bifurcation value of system (18).(2)The direction of Hopf bifurcation is determined by the sign of : if , the Hopf bifurcation is supercritical; if , the Hopf bifurcation is subcritical.(3)The stability of bifurcating periodic solutions is determined by : if , the periodic solutions are stable; if , they are unstable.
4. Numerical Examples
In this section, some numerical examples of system (3) are presented to justify the previous theorem above.
Example 1. Consider system (3) with parameters , and Then , and (7) has one positive real root . It follows by (11) that . First, we choose . For a set of initial conditions satisfying and , Figure 1 demonstrates the evolutions from which it can be seen that the equilibrium is asymptotically stable. Second, we choose . For a set of initial conditions satisfying, the corresponding wave form and phase plots are shown in Figure 2, from which it is easy to see that a Hopf bifurcation occurs.
Example 2. Consider system (3) with parameters , and Then , and (7) has one positive real root . It follows by (11) that . First, we choose . For a set of initial conditions satisfying and , Figure 3 demonstrates the evolutions from which it can be seen that the equilibrium is asymptotically stable. Second, we choose . For a set of initial conditions satisfying and , the corresponding wave form and phase plots are shown in Figure 4, from which it is easy to see that a Hopf bifurcation occurs.
In this paper, we have constructed a computer virus model with time delay depending on the SLBS model. The theoretical analyses for the computer virus models are given. Furthermore, it is proved that there exists a Hopf bifurcation when time crosses through the critical value. Finally, the numerical simulations illustrate our results.
The authors were greatly indebted to the anonymous reviewers for their valuable suggestions. This paper was supported by the National Natural Science Foundation of China (no. 61170320), the Natural Science Foundation of Guangdong Province (no. S2011040002981), and Nature Science Foundation of Guangdong Medical College (B2012053).
- J. O. Kephart, S. R. White, and D. M. Chess, “Computers and epidemiology,” IEEE Spectrum, pp. 20–26, 1993.
- F. Cohen, “Computer viruses. Theory and experiments,” Computers and Security, vol. 6, no. 1, pp. 22–35, 1987.
- X. Han and Q. Tan, “Dynamical behavior of computer virus on Internet,” Applied Mathematics and Computation, vol. 217, no. 6, pp. 2520–2526, 2010.
- B. K. Mishra and N. Jha, “Fixed period of temporary immunity after run of anti-malicious software on computer nodes,” Applied Mathematics and Computation, vol. 190, no. 2, pp. 1207–1212, 2007.
- B. K. Mishra and S. K. Pandey, “Fuzzy epidemic model for the transmission of worms in computer network,” Nonlinear Analysis: Real World Applications, vol. 11, no. 5, pp. 4335–4341, 2010.
- J. Ren, X. Yang, L.-X. Yang, Y. Xu, and F. Yang, “A delayed computer virus propagation model and its dynamics,” Chaos, Solitons and Fractals, vol. 45, no. 1, pp. 74–79, 2012.
- J. Ren, X. Yang, Q. Zhu, L.-X. Yang, and C. Zhang, “A novel computer virus model and its dynamics,” Nonlinear Analysis: Real World Applications, vol. 13, no. 1, pp. 376–384, 2012.
- B. K. Mishra and S. K. Pandey, “Dynamic model of worms with vertical transmission in computer network,” Applied Mathematics and Computation, vol. 217, no. 21, pp. 8438–8446, 2011.
- H. Yuan and G. Chen, “Network virus-epidemic model with the point-to-group information propagation,” Applied Mathematics and Computation, vol. 206, no. 1, pp. 357–367, 2008.
- B. K. Mishra and D. K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network,” Applied Mathematics and Computation, vol. 188, no. 2, pp. 1476–1482, 2007.
- F. Wang, Y. Zhang, C. Wang, J. Ma, and S. Moon, “Stability analysis of a SEIQV epidemic model for rapid spreading worms,” Computers and Security, vol. 29, no. 4, pp. 410–418, 2010.
- B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in computer network,” Applied Mathematical Modelling, vol. 34, no. 3, pp. 710–715, 2010.
- X. Yang and L.-X. Yang, “Towards the epidemiological modeling of computer viruses,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 259671, 11 pages, 2012.
- L.-X. Yang, X. Yang, L. Wen, and J. Liu, “A novel computer virus propagation model and its dynamics,” International Journal of Computer Mathematics, 2012.
- L.-X. Yang, X. Yang, Q. Zhu, and L. Wen, “A computer virus model with graded cure rates,” Nonlinear Analysis: Real World Applications, 2012.
- N. F. Britten, Essential Mathematical Biology, Springer, 2003.
- B. D. Hassard, N. D. Kazarinoff, and Y. H. Wan, Theory and Applications of Hopf Bifurcation, vol. 41, Cambridge University Press, Cambridge, UK, 1981.
- H. L. Freedman and V. Sree Hari Rao, “The trade-off between mutual interference and time lags in predator-prey systems,” Bulletin of Mathematical Biology, vol. 45, no. 6, pp. 991–1004, 1983.
- J. K. Hale, Theory of Functional Differential Equations, Springer, New York, NY, USA, 1977.
Copyright © 2013 Chunming Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.