Research Article  Open Access
Yu Yao, Zhao Zhang, Wenlong Xiang, Wei Yang, Fuxiang Gao, "Modeling and Bifurcation Research of a Worm Propagation Dynamical System with Time Delay", Mathematical Problems in Engineering, vol. 2014, Article ID 408183, 13 pages, 2014. https://doi.org/10.1155/2014/408183
Modeling and Bifurcation Research of a Worm Propagation Dynamical System with Time Delay
Abstract
Both vaccination and quarantine strategy are adopted to control the Internet worm propagation. By considering the interaction infection between computers and external removable devices, a worm propagation dynamical system with time delay under quarantine strategy is constructed based on anomaly intrusion detection system (IDS). By regarding the time delay caused by time window of anomaly IDS as the bifurcation parameter, local asymptotic stability at the positive equilibrium and local Hopf bifurcation are discussed. Through theoretical analysis, a threshold is derived. When time delay is less than , the worm propagation is stable and easy to predict; otherwise, Hopf bifurcation occurs so that the system is out of control and the containment strategy does not work effectively. Numerical analysis and discretetime simulation experiments are given to illustrate the correctness of theoretical analysis.
1. Introduction
Internet worms, a great threat to the network security, can spread quickly among hosts via wired or wireless networks. In real network environment, many intelligent worms, such as Conficker, Stuxnet, and Flamer, can also spread themselves via external removable devices (USB drives, CD/DVD drives, external hard drives, etc.), which have become one of the main means of infection transmission as well as networks. Conficker can copy itself as the autorun.inf to removable media drives in the system, thereby forcing the executable to be launched every time a removable drive is inserted into a system [1, 2]. Discovered in the summer of 2010, Stuxnet is a threat targeting a specific industrial control system (ICS) likely in Iran, such as a gas pipeline or power plant. Removable device is one of the main pathways for Stuxnet to migrate from the outside world to supposedly isolated and secure ICS [3–5]. Discovered in May 2012, Flamer can spread via removable drives using a special folder that hides the files and can result in automatic execution on viewing the removable drive when combined with the Microsoft Windows Shortcut “LNK/PIF” File Automatic File Execution Vulnerability (CVE20102568) [6, 7]. Therefore, it is time to analyze the dynamic behavior and containment strategy of such worms.
Worm propagation dynamical system plays an important role in predicting the spread of worms. It aids in identifying the weakness in the worm spreading chain and provides accurate prediction for the purpose of damage assessment for a new worm threat. Over decades of years, many researches on worms’ dynamical behavior have been done. Kermack and Mckendrick [8] proposed the classical SIR model to explain the rapid rise and fall in the number of infected patients observed in epidemics, which also suits the worm spread. Based on the classical SIR model, Zou et al. derived an Internet worm model called the twofactor model [9]. Quarantine strategy, which borrows from the method of epidemic disease control, has been widely used in worm containment and produced a tremendous effect on controlling worm propagation [10–14]. Zou et al. proposed a worm propagation model under dynamic quarantine defense based on the principle “assume [sic] guilty before proven innocent” [10]. Wang et al. proposed a novel epidemic model named SEIQV model which combines both vaccinations and dynamic quarantine methods [11]. However, there is time delay in actual network environment, which may lead to bifurcation phenomenon. Much research has been done on time delay and bifurcation [15–25]. Han and Tan studied the dynamic spread behavior of worms by incorporating the delay factor [19]. Dong et al. proposed a computer virus model with time delay based on SEIR model and regarded time delay as bifurcating parameter to study the dynamical behaviors including local asymptotical stability and local Hopf bifurcation [20]. Yao et al. constructed a model with time delay under quarantine strategy [21]. Wu et al. investigated the problem of sliding mode control of Markovian jump singular timedelay systems [23]. Li and Zhang established a delaydependent bounded real lemma for singular linear parametervarying systems with timevariant delay [24]. The problems of Dstability and nonfragile control for a class of discretetime descriptor TakagiSugeno fuzzy systems with multiple state delays are discussed in [25].
However, the above works consider less of the effect of removable devices on worm propagation. As mentioned above, removable devices have become a main pathway for some worms to intrude those hosts not connected to the Internet. Song et al. presented a worm model incorporating specific features to worms spreading via both webbased scanning and removable devices [26]. Zhu et al. studied the dynamics of interaction infection between computers and removable devices in [27]. However, time delay and bifurcation research are not considered in their work. In this paper, by considering the interaction infection between hosts and removable devices, we model a delayed worm propagation dynamical system which combines both vaccination and quarantine strategy. Local asymptotic stability of the positive equilibrium and local Hopf bifurcation are discussed to analyze the influence of time delay on worm propagation dynamical system.
The main contributions of this paper can be summarized as follows.(1)Considering the influence of removable devices on Internet worm propagation and the time delay caused by anomaly IDS, we propose a novel worm propagation dynamical system with time delay.(2)We analyze the system stability at positive equilibrium and derive the time delay threshold at which Hopf bifurcation occurs.(3)By numerical analysis, we illustrate the correctness of theoretical analysis.(4)The discretetime simulation is adopted to simulate the worm propagation in real network environment. The results demonstrate the reasonableness of the worm propagation model.
The rest of the paper is organized as follows. In Section 2, considering the influence of removable devices, a worm propagation dynamical system with time delay under quarantine strategy is constructed. In Section 3, local stability of the positive equilibrium and local Hopf bifurcation are investigated. In Section 4, several numerical analyses supporting the theoretical analysis are given. Section 5 makes a comparison between simulation experiments and numerical ones. Finally, we give our conclusions in Section 6.
2. Model Formulation
The system contains both hosts and removable devices. In this model, all hosts are in one of following five states: susceptible (), infectious (), delayed (), quarantined (, and removed (). All removable devices are divided into two groups: susceptible () and infectious (). and denote the total number of hosts and removable devices, respectively. That is, ; . Susceptible () hosts, which are vulnerable to the attack from worms, will be infected by infectious hosts or removable devices; then they will infect other hosts connected to them or removable devices plugged into them. Infectious () hosts will be immunized by antivirus software at the rate of . Removed () hosts, which have been immunized by antivirus software, will become susceptible at reassembly rate . Hosts whose behavior looks anomaly will be quarantined by IDS and then they will become in a quarantined () state. A susceptible removable device () will be infected when inserted into an infectious host. Worm in an infectious removable device () will be eliminated when connected to removed hosts; then it will become in a susceptible state.
The quarantine strategy is an effective measure to defend against worms’ attack and make up the deficiency of vaccination strategy. In this paper, anomaly intrusion detection system is chosen for applying quarantine strategy. Comparing with misuse IDS, anomaly IDS has great advantage in detecting unknown intrusion or the variants of known intrusion. However, anomaly IDS judges whether a detected behavior is an attack or not via comparing detected behavior with the normal or expected behavior of system and user. If a deviation occurs, the detected behavior is treated as an intrusion immediately. Because of the difficulty in collecting and building the normal behavior database, high falsealarm rate is considered the main drawback of anomaly IDS. In order to reduce the false alarm of anomaly IDS, the mechanism of time window is adopted. A suspicious behavior will not trigger an alarm immediately. On the contrary, anomaly IDS has a period of time to analyze the accumulated behavior. Therefore, an intermediate state, delayed () state, is added into the propagation model. The larger the value of time window, the less the false alarm aroused by anomaly IDS, because there is enough time for anomaly IDS to recognize whether a behavior is an intrusion or not. However, the overlarge time window may lead to worm propagation dynamical system being unstable and out of control. The main notations and definitions are listed in Table 1. The state transition diagram is given by Figure 1.

On the basis of current research, we present a delayed worm propagation model which combines both vaccination and quarantine strategy. Several appropriate assumptions are given as follows.(1) denotes the infection ratio of infectious hosts. Therefore, at time t, the infection force of infectious computers to susceptible computers is given by .(2)Infectious removable devices have the same infectious ability as the infectious hosts. is the contact infection rate between computers and removable devices, that is, the interactive infection rate when a removable device links to a host. The probability of connecting removable devices for every host is , and the probability of removable device exactly being in the infectious state is . Therefore, the infection force of infectious removable devices to susceptible hosts is .(3)Susceptible removable devices will be infected when connecting to an infectious host, and then they will infect any other hosts to which they are connected. Meanwhile, worms of infectious removable devices will be eliminated when connecting to one immunized host. That is, the infection force of infectious hosts to susceptible removable devices is , and the recovery force of removed hosts to infectious removable devices is .(4)Owing to the influence of time delay , the increment of the number of quarantined hosts is the ones quarantined at time . Therefore, the increment is .(5)The time window mechanism leads to an intermediate state, delayed state . The increment of the number of delayed hosts at time t is given by ; the decrement of delayed hosts is the number of those being quarantined, that is, .
Based on the analyses and assumptions above, the delayed differential equations of the model are formulated as (1). The differential on the left of equations means the change rate of related states at time t. Consider
3. Stability at the Positive Equilibrium and Bifurcation Analysis
Theorem 1. The system (1) has a unique positive equilibrium , where
Proof. For system (1), according to [28], if all the derivatives on the left of equal sign of the system are set to 0, which implies that the system becomes stable, we can derive where Assume that system (1) becomes stable at time . By integrating the fourth equation of system (1) with time from 0 to , we can get Since , Obviously, (6) has one unique positive root . So there is one unique positive equilibrium of system (1). The proof is completed.
Since , , , . System (1) can be simplified to The Jacobian matrix of (7) about is given byLet The characteristic equation of system (8) can be obtained by where
Theorem 2. The positive equilibrium is locally asymptotically stable without time delay, if condition () is satisfied: where
Proof. When , (10) reduces to
According to RouthHurwitz criterion, all roots of (14) have negative real parts. Therefore, it can be concluded that the positive equilibrium is locally asymptotically stable without time delay. The proof is completed.
If is the root of (10), separating the real and imaginary parts, the following two equations can be obtained: From (15), the following equation can be obtained: That is, where Letting , (17) can be written as Zhang et al. [18] obtained the following results on the distribution of roots of (19). Denote
Lemma 3. For the polynomial equation (19),(1)if , then (19) has at least one positive root;(2)if and , then (19) has positive root if and only if and ;(3)if and , then (19) has positive root if and only if there exists at least one , such that and .
Lemma 4. Suppose that condition , , , is satisfied.(1)If one of the followings holds, (a) ; (b) , , , and ; (c) , and , and there exits at least a such that and , then all roots of (10) have negative real parts when ; here, is a certain positive constant.(2)If conditions (a)–(c) of (1) are not satisfied, then all roots of (10) have negative real parts for all .
Proof. When , (10) can be reduced to
According to the RouthHurwitz criterion, all roots of (21) have negative real parts if and only if , , , and .
From Lemma 3, it can be known that if (a)–(c) are not satisfied, then (10) has no roots with zero real part for all ; if one of (a)–(c) holds, when , , , (10) has no roots with zero real part and is the minimum value of , so (10) has purely imaginary roots. According to [18], one obtains the conclusion of the lemma.
Let be the root of (10), and .
From Lemmas 3 and 4, the following are obtained.
When conditions (a)–(c) of Lemma 4(1) are not satisfied, always has no positive root. Therefore, under these conditions, (10) has no purely imaginary roots for any , which implies that the positive equilibrium of system (7) is absolutely stable. Therefore, the following theorem on the stability of positive equilibrium can be easily obtained.
Theorem 5. Supposing that condition () is satisfied, (a) , , , and ; (b) and , and there is no such that and , then the positive equilibrium of system (7) is absolutely stable.
In what follows, it is assumed that the coefficients in satisfy the condition
(a) , , , and ; (b) , and there is no such that and .
According to [29], it is known that (19) has at least a positive root , which implies that characteristic equation (10) has a pair of purely imaginary roots .
Since (10) has a pair of purely imaginary roots , the corresponding is given by (15). Consider
Let be the root of (10). and are satisfied when .
Lemma 6. Suppose that . If , then is a pair of purely imaginary roots of (10). In addition, if the conditions of Lemma 4(1) are satisfied, then .
It is claimed that
This signifies that there is at least one eigenvalue with positive real part for .
Differentiating two sides of (10) with respect to , it can be written as
Therefore
where . It follows from the hypothesis that and therefore the transversality condition holds. It can be obtained that
The root of characteristic equation (10) crosses from the left to the right on the imaginary axis as continuously varies from a value less than to one greater than according to Rouche’s theorem [15]. Therefore, according to the Hopf bifurcation theorem [30] for functional differential equations, the transversality condition holds and the conditions for Hopf bifurcation are satisfied at . Then the following result can be obtained.
Theorem 7. Supposing that condition is satisfied,(1)if , then the positive equilibrium of system (7) is asymptotically stable and unstable when ;(2)if condition is satisfied, system (7) will undergo a Hopf bifurcation at the positive equilibrium when (), where is defined by (22).
This implies that when the time delay , the system will stabilize at its infection equilibrium point, which is beneficial for us to implement a containment strategy; when time delay , the system will be unstable and worms cannot be effectively controlled.
4. Numerical Analysis
In this section, several numerical results are presented to prove the correctness of theoretical analysis above. 750,000 hosts and 50,000 removable devices are selected as the population size; the worm’s average scan rate is per second. The worm infection rate can be calculated as , which means that average 0.698 hosts of all the hosts can be scanned by one infectious host. The infection ratio is . The contact infection rate between hosts and removable devices is . The recovery rates of infectious hosts and removable devices are and , respectively. The immunization rate of quarantined hosts is and the reassembly rate of immunization hosts is . At the beginning, there are 50 infectious hosts and 20 infectious removable devices, while the rest of hosts and removable devices are susceptible.
In anomaly intrusion detection system, the rate at which infected hosts are detected and quarantined is per second. It means that an infected host can be detected and quarantined in about 5 s. The rate at which susceptible hosts are detected and quarantined is per second; that is, about two false alarms are generated by the anomaly intrusion detection system per day.
When , Figure 2 presents the changes of the number of five kinds of hosts and Figure 3 shows the curves of two kinds of removable devices. According to Theorem 5, the positive equilibrium is asymptotically stable when , which is illustrated by the numerical simulations in Figures 2 and 3. Finally, the number of every kind of host and removable device keeps stable.
When gets increased and passes through the threshold , the positive equilibrium will lose its stability and a Hopf bifurcation will occur. A family of periodic solution bifurcates from the positive equilibrium . When , Figure 4 shows the curves of susceptible, infectious, quarantined, and removed hosts and the numerical simulation results of two kinds of removable devices are depicted by Figure 5. From Figures 4 and 5, we can clearly see that every state of hosts and removable devices is unstable. Figure 4 shows that the number of infectious hosts will outburst after a short period of peace and repeat again and again.
In order to state the influence of time delay, the delay is set to a different value each time with other parameters remaining unchanged. Figure 6 shows four curves of the number of infectious hosts in the same coordinate with four delays: , , , and , respectively. Figures 7(a)–7(c) show four curves of the number of infectious hosts in four coordinates. Initially, the four curves are overlapped which means that the time delay has little effect on the initial state of worm spread. With the increase of the time T, the time delay affects the number of infectious hosts. With the increase of time delay, the curve begins to oscillate. The system becomes unstable as time delay passes through the critical value . At the same time, it can be discovered that the amplitude and period of the number of infectious hosts gradually increase.
(a)
(b)
(c)
(d)
Figures 8(a) and 8(b) show the phase portraits of susceptible hosts and infectious hosts with and , respectively. Figures 9(a) and 9(b) show the projection of the phase portrait of system (1) in space when and , respectively. It is clear that the curve converges to a fixed point when , which means that the system is stable. When , the curve converges to a limit circle, which implies that the system is unstable and the worm propagation is out of control.
(a)
(b)
(a)
(b)
Figure 10 shows the bifurcation diagram with from 1 to 90. It is clear that Hopf bifurcation will occur when .
5. Simulation Experiments
In our simulation experiments, the discretetime simulation is adopted because of its accuracy and is less timeconsuming. The discretetime simulation is an expanded version of Zou’s program simulating Code Red worm propagation. All of the parameters are consistent with the numerical experiments.
Figures 11(a)–11(d) show the comparisons between numerical and simulation curves of susceptible, infectious, quarantined, and removed hosts when , respectively. It is clearly seen that the simulation curves match the numerical ones very well. Figures 12(a)–12(d) show the comparisons between numerical and simulation results of four kinds of hosts when . In this figure, two curves are still matched well. It fully illustrates the correctness of our theoretical analysis.
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
6. Conclusions
In this paper, considering the influence of removable devices, a delayed worm propagation dynamical system based on anomaly IDS has been constructed. By regarding the time delay caused by time window of anomaly IDS as the bifurcation parameter, the local asymptotic stability at the positive equilibrium and local Hopf bifurcation were discussed. Through theoretical analysis and related experiments, the main conclusions can be summarized as follows.(a)The critical time delay where Hopf bifurcation appears is derived: (b)When the time delay , worm propagation system is stable and worms’ behavior is easy to predict, which is beneficial for us to implement containment strategy to control and eliminate the worm.(c)When time delay , Hopf bifurcation occurs, which implies that the system will be unstable and containment strategy does not work effectively.
Thus, in order to control and even eliminate the worm, the size of time window of anomaly IDS must be less than . In real network environment, various factors can affect worm propagation. This paper concentrates on analyzing the influence of time delay caused by anomaly IDS; other factors having an impact on worm propagation will be the center of our future study.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This paper is supported by the Program for New Century Excellent Talents in University (NCET130113); Natural Science Foundation of Liaoning Province of China under Grant no. 201202059; Program for Liaoning Excellent Talents in University under LR2013011; Fundamental Research Funds of the Central Universities under Grant nos. N120504006 and N100704001; and MOEIntel Special Fund of Information Technology (MOEINTEL201206).
References
 P. Porras, H. Saidi, and V. Yegneswaran, An Analysis of Conficker’s Logic and Rendezvous Point, SRI International, 2009.
 Unruly USB, “Devices Expose Networks to Malware,” http://www.aspirantinfotech.com/sgdownload/lumension/brochure/UnrulyUSBDevicesExposeNetworkstoMalware.pdf. View at: Google Scholar
 E. Byres, A. Ginter, and J. Langill, “How stuxnet spreads—a study of infection paths in best practice systems,” White Paper, 2011. View at: Google Scholar
 N. Falliere, L. O. Murchu, and E. Chien, “W32.Stuxnet Dossier,” Symantec Security Response, 2011. View at: Google Scholar
 Win32.Stuxnet, http://www.symantec.com/security_response/writeup.jsp?docid=2010071400312399.
 Flamer: Highly Sophisticated and Discreet Threat Targets the Middle East, http://www.symantec.com/connect/blogs/flamerhighlysophisticatedanddiscreetthreattargetsmiddleeast.
 W32.Flamer, http://www.symantec.com/security_response/writeup.jsp?docid=2012052811030899.
 W. O. Kermack and A. G. Mckendrick, “A contribution to the mathematical theory of epidemics,” Proceedings of the Royal Society A, vol. 115, no. 772, pp. 700–721, 1927. View at: Google Scholar
 C. C. Zou, W. Gong, and D. Towsley, “Code red worm propagation modeling and analysis,” in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 138–147, Washington, DC, USA, November 2002. View at: Google Scholar
 C. C. Zou, W. B. Gong, and D. Towsley, “Worm propagation modeling and analysis under dynamic quarantine defense,” in Proceedings of the ACM Workshop on Rapid Malcode (WORM '03), pp. 51–60, Washington, DC, USA, October 2003. View at: Google Scholar
 F. Wang, Y. Zhang, C. Wang, J. Ma, and S. Moon, “Stability analysis of a SEIQV epidemic model for rapid spreading worms,” Computers and Security, vol. 29, no. 4, pp. 410–418, 2010. View at: Publisher Site  Google Scholar
 Y. Yao, W. Xiang, A. Qu, G. Yu, and F. Gao, “Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 304868, 18 pages, 2012. View at: Publisher Site  Google Scholar  MathSciNet
 Y. Yao, L. Guo, H. Guo, G. Yu, F. Gao, and X. Tong, “Pulse quarantine strategy of internet worm propagation: modeling and analysis,” Computers and Electrical Engineering, vol. 38, no. 5, pp. 1047–1061, 2012. View at: Publisher Site  Google Scholar
 B. K. Mishra and N. Jha, “S{EIQRS} model for the transmission of malicious objects in computer network,” Applied Mathematical Modelling, vol. 34, no. 3, pp. 710–715, 2010. View at: Publisher Site  Google Scholar  MathSciNet
 B. D. Hassard, N. D. Kazarinoff, and Y. H. Wan, Theory and Applications of Hopf Bifurcation, vol. 41 of London Mathematical Society Lecture Note Series, Cambridge University Press, Cambridge, UK, 1981. View at: MathSciNet
 Y. Yao, N. Zhang, W. Xiang, G. Yu, and F. Gao, “Modeling and analysis of bifurcation in a delayed worm propagation model,” Journal of Applied Mathematics, vol. 2013, Article ID 927369, 11 pages, 2013. View at: Publisher Site  Google Scholar  MathSciNet
 W. Yu and J. Cao, “Hopf bifurcation and stability of periodic solutions for van der Pol equation with time delay,” Nonlinear Analysis: Theory, Methods and Applications, vol. 62, no. 1, pp. 141–165, 2005. View at: Publisher Site  Google Scholar
 J. Zhang, W. Li, and X. Yan, “Hopf bifurcation and stability of periodic solutions in a delayed ecoepidemiological system,” Applied Mathematics and Computation, vol. 198, no. 2, pp. 865–876, 2008. View at: Publisher Site  Google Scholar  MathSciNet
 X. Han and Q. Tan, “Dynamical behavior of computer virus on Internet,” Applied Mathematics and Computation, vol. 217, no. 6, pp. 2520–2526, 2010. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 T. Dong, X. Liao, and H. Li, “Stability and Hopf bifurcation in a computer virus model with multistate antivirus,” Abstract and Applied Analysis, vol. 2012, Article ID 841987, 16 pages, 2012. View at: Publisher Site  Google Scholar  MathSciNet
 Y. Yao, X. Xie, H. Guo, G. Yu, F. Gao, and X. Tong, “Hopf bifurcation in an Internet worm propagation model with time delay in quarantine,” Mathematical and Computer Modelling, vol. 57, no. 1112, pp. 2635–2646, 2013. View at: Publisher Site  Google Scholar  MathSciNet
 J. Ren, X. Yang, Q. Zhu, L. Yang, and C. Zhang, “A novel computer virus model and its dynamics,” Nonlinear Analysis: Real World Applications, vol. 13, no. 1, pp. 376–384, 2012. View at: Publisher Site  Google Scholar  MathSciNet
 L. Wu, X. Su, and P. Shi, “Sliding mode control with bounded ${l}_{2}$ gain performance of Markovian jump singular timedelay systems,” Automatica, vol. 48, no. 8, pp. 1929–1933, 2012. View at: Publisher Site  Google Scholar  MathSciNet
 F. Li and X. Zhang, “A delaydependent bounded real lemma for singular LPV systems with timevariant delay,” International Journal of Robust and Nonlinear Control, vol. 22, no. 5, pp. 559–574, 2012. View at: Publisher Site  Google Scholar  MathSciNet
 F. Li, P. Shi, L. Wu, and X. Zhang, “Fuzzymodelbased Dstability and nonfragile control for discretetime descriptor systems with multiple delays,” IEEE Transaction on Fuzzy System, vol. 99, 1 pages, 2013. View at: Publisher Site  Google Scholar
 L. Song, J. Zhen, G. Sun, J. Zhang, and X. Han, “Influence of removable devices on computer worms: dynamic analysis and control strategies,” Computers and Mathematics with Applications, vol. 61, no. 7, pp. 1823–1829, 2011. View at: Publisher Site  Google Scholar
 Q. Zhu, X. Yang, and J. Ren, “Modeling and analysis of the spread of computer virus,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 12, pp. 5117–5124, 2012. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 S. Wang, Q. Liu, X. Yu, and Y. Ma, “Bifurcation analysis of a model for network worm propagation with time delay,” Mathematical and Computer Modelling, vol. 52, no. 34, pp. 435–447, 2010. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 L. Wang, Y. Fan, and W. Li, “Multiple bifurcations in a predatorprey system with monotonic functional response,” Applied Mathematics and Computation, vol. 172, no. 2, pp. 1103–1120, 2006. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 J. K. Hale and S. M. Verduyn Lunel, Introduction to Functional Differential Equations, vol. 99, Springer, New York, NY, USA, 1993. View at: Publisher Site  MathSciNet
Copyright
Copyright © 2014 Yu Yao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.