Research Article | Open Access

# Analysis of a Model for Computer Virus Transmission

**Academic Editor:**Ivanka Stamova

#### Abstract

Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical basis to control the spread of computer virus.

#### 1. Introduction

With the rapid development of computer, communication, and network technology, network information system has become an important way of the development of countries and industries, amongst others. Information security has become one of the most important and challenging issues faced in the age of information sharing. The computer virus is one common information security threat.

Computer virus is not only destructive, but also highly contagious. Once the virus is copied or generates variety, its speed is difficult to be controlled. Infectivity is the basic characteristic of the virus. In biology, the virus can diffuse from one organism to another. Cohen, Kephart and White pointed out that the spread mechanisms of computer viruses and biological viruses have many similarities [1, 2]. Under appropriate conditions, biological viruses can multiply quickly, and the infected organisms exhibit symptoms or even die. Similarly, the computer virus can also spread to uninfected computers from the infected computer through many kinds of ways. In some cases, the infected computers do not work and even get paralysed. Unlike biological viruses, the computer virus is a software program designed to replicate itself and spread to other machines. Computer virus enters the computer and gets executed; it will search for other programs or storage media in line with the conditions of their infection and target and then insert the code itself, achieving the purpose of self-reproduction. As long as a computer is infected (if not promptly treated), the virus will spread rapidly on this computer, in which a large number of files (usually an executable file) will be infected. The infected file has become a new source of infection and then will exchange data with other machines or over the network exposure; the virus will continue to be contagious. A computer virus can enter your computer in any number of ways, such as via mobile hard disk, via an email attachment, during file downloads from the Internet, or even upon a visit to a contaminated web site. By the time you find the virus that infected the computer, the mobile hard disk which is often used on this computer has been infected with the virus. Other computers connected to the machine network might be infected with the virus. The network has no permanent immunity to the computer virus. Therefore, there is always computer virus.

Kephart et al. [2, 3] study the spread of computer virus using the biological virus model; they mainly focus on the influence of network topology on the spread of computer virus. In the homogeneous mixing nodes and only susceptible node input cases, Mishra et al. [4, 5] establish the mathematical model of Internet spread of computer virus. They analyze the propagation law of virus using threshold theory of infectious disease dynamics and predict the development trend of computer virus. Piqueira et al. [6] study the effects of equipping antivirus software on the virus in computer network. They prove the stability of the disease-free equilibrium and endemic equilibrium without incorporating new computers and removing old computers. For more studies on virus in computer network, see [7–13] and so on.

In this paper, the new computers are incorporated to the network, and the old computers are removed from the computer network. Meanwhile, the computers are equipped with antivirus software on the computer network. The remainder of this paper presents the model and results. In Section 2, the mathematical model on computer virus is described, and in Section 3 we obtain the equilibriums. In Section 4, the analysis of this model is derived. Numerical simulations supporting the theoretical analysis are given in Section 5. The paper ends with a conclusion and discussion in Section 6.

#### 2. The Dynamic Model

The model proposed here is based on the compartmental SAIR model [6–8], including an antidotal population compartment () representing nodes of the network equipped with fully effective antivirus programs, a susceptible compartment (), an infective compartment (), and a temporarily immune compartment (). Connections between the compartments represent operational parameters of the network and their control can be used as a strategy to maintain the reliability of the whole system, even in the presence of infections (see Figure 1).

The total population is divided into four groups. denote noninfected computers subjected to possible infection. denote infected computers. denote removed computers due to infection or not. denote noninfected computers equipped with antivirus.

The SAIR model for computer viruses propagation was proposed and can be described by where is influx rate, representing the incorporation of new computers to the network; is infection rate of susceptible computers; is proportion coefficient for the mortality rate, not due to the virus; is removal rate of infected computers; is recovering rate of removed computers, with an operator intervention; is conversion of susceptible computers into antidotal ones, occurring when susceptible computers establish effective communication with antidotal ones and the antidotal one installs the antivirus in the susceptible ones; represents infected computers that can be fixed by using antivirus programs being converted into antidotal ones.

Let ; then . Let Then, it is clear that is a positive invariant set. Hence, we will focus our attention only on the region .

But [6, 7] think the influx rate is considered to be , . In fact, every day new computers can be incorporated to the network or old computers can be removed from the network. Therefore, they can not be ignored. In this paper, we analyse completely dynamical behavior of the spread of the virus in computer network with incorporating new computers and removing old computers.

#### 3. The Disease-Free and Endemic Equilibrium

When , if , the disease-free equilibrium of system (1) is . If , we obtain the threshold . When , the disease-free equilibrium of system (1) is .

In the following, we compute the positive equilibrium; namely, .

According to the third equation of system (1), we have When , using the second equation of system (1), we have According to the first equation of system (1), we obtain Therefore, when the threshold , we have the positive equilibrium

When , taking advantage of the second equation of system (1), we have According to the fourth equation of system (1), we have Substituting (7) and (8) into the first equation of system (1), we have Namely,Hence, In order to make , it must satisfy the following conditions:Namely, Therefore, if the threshold , we obtain In order to make , it must satisfy When (namely, the threshold ), we have the positive equilibrium

#### 4. Stability of Equilibrium

##### 4.1. Stability of the Disease-Free Equilibrium

The Jacobin matrix of system (1) at the disease-free equilibrium is The characteristic equation of is given by where and . Therefore, we have if and only if , and if and only if . It follows from the Routh-Hurwitz criterion that the eigenvalues have negative real parts if and only if and . Hence, the disease-free equilibrium of model (1) is locally asymptotically stable if and and unstable if or .

If , the disease-free equilibrium is unstable, and system (1) exhibits the other disease-free equilibrium .

If , the disease-free equilibrium is unstable, and system (1) exhibits the positive equilibrium .

The Jacobin matrix of system (1) at the disease-free equilibrium is Since , the characteristic equation of is given by By calculating, we obtain that the characteristic equation has the four eigenvalues: , , , and . When , . We have if and only if . Hence, the disease-free equilibrium of model (1) is locally asymptotically stable if and . The disease-free equilibrium of model (1) is unstable if and .

Theorem 1. *(1) If and , the disease-free equilibrium of system (1) is locally asymptotically stable. If or , the disease-free equilibrium of system (1) is unstable.**(2) If , the disease-free equilibrium is unstable, and system (1) exhibits the other disease-free equilibrium .**(3) If , the disease-free equilibrium is unstable, and system (1) exhibits the positive equilibrium .**(4) If and , the disease-free equilibrium is locally asymptotically stable. If , the disease-free equilibrium is unstable.*

##### 4.2. Stability of the Endemic Equilibrium

In the following, we study the stability of the endemic equilibriums.

The Jacobin matrix of system (1) at the endemic equilibrium is Since , the characteristic equation of is given by where It is easy to calculate . Hence, the eigenvalues of have negative real parts.

Therefore, if the eigenvalues of the characteristic equation in want to have negative real parts, only . Namely,

According to Routh-Hurwitz criterion, the epidemic equilibrium is locally asymptotically stable if and unstable if .

System (1) has the following limiting system:

In the following, we prove the stability of the endemic equilibrium by the limit system. The Jacobin matrix of system (25) at the endemic equilibrium is Because , , the above matrix becomes

The characteristic equation of is given by where Because of , we have It is easy to calculate . Therefore, in order to make , only there is . Hence, if the threshold , the endemic equilibrium is locally asymptotically stable.

Theorem 2. *(1) If , the positive equilibrium is locally asymptotically stable. If , the positive equilibrium is unstable.**(2) If and , the positive equilibrium is locally asymptotically stable. If , the positive equilibrium is unstable.*

#### 5. Numerical Simulation

In this section, we will perform a series of numerical simulations to verify the mathematical analysis. In Figure 2, when and , the disease-free equilibrium is asymptotically stable, where the initial values are , , , and . The parameters are , , , , , , and .

**(a)**

**(b)**

**(c)**

**(d)**

**(e)**

**(f)**

If and , Figure 3 signifies that the disease-free equilibrium of system (1) is asymptotically stable. The initial values are , , , and . Choose the parameters as follows: , , , , , , and .

**(a)**

**(b)**

**(c)**

**(d)**

**(e)**

**(f)**

If , the positive equilibrium of system (1) is asymptotically stable (see Figure 4). The initial values are , , , and . Choose the parameters as follows: , , , , , , and .

**(a)**

**(b)**

**(c)**

**(d)**

**(e)**

**(f)**

If + and , the positive equilibrium of system (1) is asymptotically stable (see Figure 5). The initial values are , , , and . Choose the parameters as follows: , , , , , , and .

**(a)**

**(b)**

**(c)**

**(d)**

**(e)**

**(f)**

#### 6. Conclusion

This paper mainly considers the incorporation of new computers to the network, the removal of old computers from the network, the computer equipped with antivirus software, and so forth. They affect the spread of the virus. The model for computer virus transmission is established. Through the analysis of the model, two disease-free and two positive equilibriums are obtained. The stability conditions of the equilibriums are derived.

Through the qualitative analysis of computer virus propagation model, mastering the virus prevention and control technology is very necessary. In the meantime, computer users have been advised to update their security settings. We can strengthen the knowledge of the computer virus spread (e.g., enhance the user’s information security awareness) in a timely manner to install antivirus software or fix bugs, to minimize the impact on network computer virus.

#### Conflict of Interests

The author declares that there is no conflict of interests regarding the publication of this paper.

#### Acknowledgments

This work is partially supported by the National Natural Science Foundation of China (11301491) and the Youth Science Fund of Shanxi Province (2011021001-2).

#### References

- F. Cohen, “Computer viruses: theory and experiments,”
*Computers & Security*, vol. 6, no. 1, pp. 22–35, 1987. View at: Publisher Site | Google Scholar - J. O. Kephart and S. R. White, “Directed-graph epidemiological models of computer viruses,” in
*Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy*, pp. 343–358, May 1991. View at: Google Scholar - J. O. Kephart and S. R. White, “Measuring and modeling computer virus prevalence,” in
*Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy*, pp. 2–15, IEEE, Oakland, Calif, USA, May 1993. View at: Publisher Site | Google Scholar - B. K. Mishra and N. Jha, “Fixed period of temporary immunity after run of anti-malicious software on computer nodes,”
*Applied Mathematics and Computation*, vol. 190, no. 2, pp. 1207–1212, 2007. View at: Publisher Site | Google Scholar | Zentralblatt MATH - B. K. Mishra and D. K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network,”
*Applied Mathematics and Computation*, vol. 188, no. 2, pp. 1476–1482, 2007. View at: Publisher Site | Google Scholar | MathSciNet - J. R. C. Piqueira, B. F. Navarro, and H. A. M. Luiz, “Epidemiological models applied to viruses in computer networks,”
*Journal of Computer Science*, vol. 1, no. 1, pp. 31–34, 2005. View at: Publisher Site | Google Scholar - J. R. Piqueira and V. O. Araujo, “A modified epidemiological model for computer viruses,”
*Applied Mathematics and Computation*, vol. 213, no. 2, pp. 355–360, 2009. View at: Publisher Site | Google Scholar | Zentralblatt MATH | MathSciNet - J. R. C. Piqueira, A. A. de Vasconcelos, C. E. C. J. Gabriel, and V. O. Araujo, “Dynamic models for computer viruses,”
*Computers and Security*, vol. 27, no. 7-8, pp. 355–359, 2008. View at: Publisher Site | Google Scholar - F. W. Wang, Y. K. Zhang, C. G. Wang, J. F. Ma, and S. Moon, “Stability analysis of a SEIQV epidemic model for rapid spreading worms,”
*Computers and Security*, vol. 29, no. 4, pp. 410–418, 2010. View at: Publisher Site | Google Scholar - B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in computer network,”
*Applied Mathematical Modelling*, vol. 34, no. 3, pp. 710–715, 2010. View at: Publisher Site | Google Scholar | MathSciNet - B. K. Mishra and S. K. Pandey, “Fuzzy epidemic model for the transmission of worms in computer network,”
*Nonlinear Analysis: Real World Applications*, vol. 11, no. 5, pp. 4335–4341, 2010. View at: Publisher Site | Google Scholar - B. K. Mishra and G. M. Ansari, “Differential epidemic model of virus and worms in computer network,”
*International Journal of Network Security*, vol. 14, no. 3, pp. 149–155, 2012. View at: Google Scholar - Z. Zhang and H. Yang, “Hopf bifurcation of an SIQR computer virus model with time delay,”
*Discrete Dynamics in Nature and Society*, vol. 2015, Article ID 101874, 8 pages, 2015. View at: Publisher Site | Google Scholar | MathSciNet

#### Copyright

Copyright © 2015 Peng Qin. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.