- Research
- Open access
- Published:
Bifurcation analysis in a delayed computer virus model with the effect of external computers
Advances in Difference Equations volume 2015, Article number: 317 (2015)
Abstract
A delayed Susceptible-Infected-External (SIE) computer virus propagation model is investigated in the present paper. The linear stability conditions are obtained with characteristic root method. The Hopf bifurcation is demonstrated. Furthermore, some explicit formulae for determining the stability and the direction of the Hopf bifurcation are derived by using the normal form theory and the center manifold theorem. Finally, numerical simulations are carried out to support the theoretical predictions.
1 Introduction
Computer viruses are major threats to Internet security, and they have led to huge economic losses [1–3]. Inspired by the compelling analogies between computer viruses and their biological counterparts, many scholars investigate computer viruses spreading on the Internet with epidemic models since the work by Kephart and White [4]. Wierman and Marchette et al. [5–7] proposed the classical SIR computer virus propagation model respectively based on the SIR epidemic model. Considering the feasibility of the loss of immunity for the recovered computers, Gan et al. [8] proposed an SIRS computer propagation model and studied the stability of the model. Yuan et al. [9–11] studied the dynamics of the SEIR computer virus propagation model based on the fact that some viruses may purposely lay dormant for a period of time prior to infecting other computers for stealth reasons. However, the SEIR model assumes that the recovered computers have a permanent immunization period with a certain probability which is not consistent with real situation. Based on this, Mishra et al. [12, 13] presented the SEIRS computer virus propagation model. In [14], Mishra and Jia paid attention to the combination of computer virus propagation model and quarantine to study the prevalence of the viruses and proposed the SEIQRS model for the transmission of malicious objects in computer network. However, all the above computer virus models focused on the internal computers and neglected the effect of the external computers on virus spread. In order to study the effect of the external computers on virus spread, Chen et al. [15] proposed the following computer virus model under the influence of external computers:
where \(S(t)\), \(I(t)\) and \(E(t)\) denote the numbers of the susceptible computers, the infected computers and external computers, respectively. δ is the rate at which each computer dies out; εis the birth rate of external computers; \(\alpha_{1} \), \(\alpha_{2}\),\(\gamma_{1}\), \(\gamma_{2} \) and η are the states transmission rates. Chen et al. [15] studied the global stability of virus-free and viral equilibrium of system (1).
As stated in [9], some viruses may purposely lay dormant for a period of time prior to infecting other computers for stealth reasons, it may be more realistic to assume that the susceptible computers are infected at time \(t-\tau\) and then these infected computers have infection ability at time t. Therefore, we incorporate the latent period delay of the computer viruses into system (1) and get the following computer virus model with time delay:
where τ is the latent period delay of the computer viruses. The main purpose of this paper is to investigate the effect of the latent period delay on system (2), especially the Hopf bifurcation caused by the delay. It is well known that the time delay can have important influence on a dynamical system, and dynamical systems with time delay have been investigated extensively in recent years [10, 13, 16–19].
The organization of this paper is as follows. Section 2 considers stability of the positive equilibrium and existence of the Hopf bifurcation. Section 3 is devoted to the properties of the Hopf bifurcation. Some numerical simulations are carried out to verify the theoretical results in Section 4, and this work is summarized in Section 5.
2 Stability of the positive equilibrium and existence of Hopf bifurcation
By a direct computation, we can get that if
system (2) has a unique positive equilibrium \(E_{\ast}(S_{\ast}, I_{\ast}, E_{\ast})\), where
where
and
When \(\tau=0\), Eq. (3) becomes
Based on the expressions of \(A_{2}\), \(B_{2} \) and \(a_{1}\), \(a_{4}\), \(a_{7}\), \(b_{1}\), \(b_{4} \), we can get
Therefore if the condition (H1) \((A_{2} +B_{2} )(A_{1} +B_{1} )>A_{0} +B_{0} >0\) holds, then system (2) is locally asymptotically stable when\(\tau=0\).
For \(\tau>0\), let \(\lambda=i\omega\) (\(\omega>0\)) be the root of Eq. (3), then
Then we get
where
Let \(\omega^{2}=v\), then Eq. (5) can be transformed into the following form:
Next, we assume that (H2) Eq. (6) has at least one positive root.
If the condition (H1) holds, then there exists one positive root \(v_{0}\) of Eq. (6) such that Eq. (3) has a pair of purely imaginary roots \(\pm i\omega _{0} =\pm i\sqrt{v_{0}}\).
Taking derivation on both sides of Eq. (3), we obtain
Thus, we can get
where \(f(v)=v^{3}+c_{2} v^{2}+c_{1} v+c_{0} \) and \(v_{0} =\omega_{0}^{2}\).
It is clear that if the condition (H3) \(f'({v_{0}})\ne0\) holds, then \(\operatorname{Re} [{\frac{d\lambda}{d\tau}} ]_{\tau=\tau_{0} }^{-1}\ne0\). Therefore, according to the Hopf bifurcation theorem in [20], we have the following results.
Theorem 1
For system (2), we assume that the conditions (H1)-(H3) hold for the parameters. Then the positive equilibrium \(E_{\ast}(S_{\ast}, I_{\ast}, E_{\ast})\) is asymptotically stable for \(\tau\in[0, \tau_{0} )\) and the positive equilibrium \(E_{\ast}(S_{\ast}, I_{\ast}, E_{\ast})\) becomes unstable for Ï„ staying in some right neighborhood of \(\tau_{0} \), with a Hopf bifurcation occurring when \(\tau =\tau_{0}\).
3 Direction and stability of the Hopf bifurcation
In this section, we shall obtain the explicit formulae for determining the direction, stability and period of these periodic solutions bifurcating from the positive equilibrium \(E_{\ast}(S_{\ast},I_{\ast},E_{\ast})\) of system (2) at the critical value \(\tau_{0} \). For convenience, let \(\tau=\tau_{0} +\upsilon\), \(\upsilon\in R\). Then \(\upsilon=0\) is the Hopf bifurcation value of system (2).
Let \(u_{1}=S(\tau t)\), \(u_{2}=I(\tau t)\), \(u_{3}=E(\tau t)\). Then system (2) is transformed into a functional differential equation in \(C=C([-1,0], R^{3})\) as
where \(u_{t} =(S(t),I(t),E(t))^{T}\in R^{3}\) and \(L_{\upsilon}: C\to R\), \(F: R\times C\to R\) are given respectively by
where
and
Clearly, \(L_{\upsilon}\) is a linear continuous operator from \(C=C([-1, 0], R^{3})\) to \(R^{3}\). By the Riesz representation theorem, there exists a matrix function with bounded variation components \(\eta(\theta,\upsilon)\), \(\theta \in [-1,0]\) such that
In fact we can choose
where \(\delta(\theta)\) is the Dirac delta function.
For \(\varphi\in C([-1,0],R^{3})\), we define
and
Then system (7) is equivalent to the abstract differential equation
where \(u_{t} =u(t+\theta)\) for \(\theta\in[-1,0]\).
For \(\phi\in C([-1,0],(R^{3})^{\ast})\), define
For \(\varphi\in C([-1,0],R^{3})\) and \(\phi\in C([-1,0],(R^{3})^{\ast})\), define the bilinear form
where \(\eta(\theta)=\eta(\theta,0)\).
Thus, we can conclude that \(A(0)\) and A∗ are adjoint operators. Let \(q(\theta)=(1, q_{2}, q_{3} )^{T} e^{i\omega_{0}\tau_{0}\theta}\) be the eigenvector of \(A(0)\) corresponding to the eigenvalue \(+i\omega_{0} \tau_{0} \) and \(q^{\ast}(s)=D(1, q_{2}^{\ast}, q_{3}^{\ast})e^{i\omega_{0}\tau_{0}s}\) be the eigenvector of \(A^{\ast}\) corresponding to the eigenvalue \(-i\omega_{0}\tau_{0} \). Namely, \(A(0)q(\theta)=i\omega_{0}\tau_{0}q(\theta)\) and \(A^{\ast}q^{\ast^{T}}(s)=-i\omega_{0}\tau_{0}q^{\ast^{T}}(s)\). From the definitions of \(A(0)\) and A∗, we can obtain
From Eq. (9), we can obtain
Then we can choose
such that
Next, we use the same notations as those in Hassard et al. [20], and we first compute the coordinates to describe the center manifold \(C_{0}\) at \(\upsilon=0\). Let \(x_{t}\) be the solution of Eq. (8) when \(\upsilon=0\). Define
on the center manifold \(C_{0}\), and we have
where
and z and z̄ are local coordinates for center manifold \(C_{0}\) in the direction of \(q^{*}\) and \(\bar{q}^{*}\). Note that W is real if \(x_{t}\) is real, we only deal with real solutions. For the solutions \(x_{t}\) of Eq. (8),
That is,
where
Hence, we have
where
Since
and
we have
From Eq. (15) and Eq. (16), we have
where
Thus, we have
Comparing the coefficients in Eq. (15) and Eq. (17), we can get
with
where \(E_{1} \) and \(E_{2} \) can be determined by the following equations respectively:
with
Then we can get the following coefficients:
Theorem 2
For system (2), we assume that the conditions (H1)-(H3) hold for the parameters. Then, if \(\mu_{2} >0\) (\(\mu_{2} <0\)), then the Hopf bifurcation is supercritical (subcritical); if \(\beta_{2}<0\) (\(\beta_{2} >0\)), then the bifurcating periodic solutions are stable (unstable); if \(T_{2}>0\) (\(T_{2}<0\)), then the bifurcating periodic solutions increase (decrease).
4 Numerical simulation
In this section, we present a numerical example to validate the feasibility of the theoretical result obtained above. By extracting some values from [15] and considering the conditions for the existence of the Hopf bifurcation, we choose a set of parameters as follows: \(\alpha_{1}=0.2\), \(\alpha_{2}=0.3\), \(\gamma_{1}=0.1\), \(\gamma_{2}=0.4\), \(\eta=0.1\), \(\delta =0.12\) and \(\varepsilon=6\). Then system (2) becomes
By Matlab 7.0, we get \(R_{0}=5.2029>1\) and the positive equilibrium \(E_{\ast}(6.2000, 22.4389, 21.3611)\) of system (19). Then we have \(A_{0}+B_{0}=0.0520>0\), \(A_{1}+B_{1}=0.5023>0\), \(A_{2}+B_{2}=1.9439>0\) and \((A_{2}+B_{2})(A_{1}+B_{1})=0.9764>A_{0}+B_{0}=0.0520>0\). That is, the condition (H1) holds. Further, we get only one critical value of the time delay \(\tau_{0}=1.1598\), \(\omega_{0}=2.0232\) and \(f'(v_{0})=0.0081>0\). That is, the conditions (H2) and (H3) hold. Therefore, according to Theorem 1, we can conclude that \(E_{\ast}(6.2000, 22.4389, 21.3611)\) is locally asymptotically stable when \(\tau\in[0, \tau _{0} )\). As can be seen from Figures 1-4, \(E_{\ast}(6.2000, 22.4389, 21.3611)\) is locally asymptotically stable when \(\tau=1.05<\tau_{0}\). When the value of the delay passes through the critical value \(\tau _{0} \), a Hopf bifurcation occurs and a family of periodic solutions bifurcate from \(E_{\ast}(6.2000, 22.4389, 21.3611)\), which can be shown by Figures 5-8. As shown in Figures 5-8, we choose \(\tau=1.65>\tau_{0}\), \(E_{\ast}(6.2000, 22.4389, 21.3611)\) become unstable and a Hopf bifurcation occurs. The Hopf bifurcation phenomenon can be also illustrated by the bifurcation diagram with respect to Ï„ in Figure 9. Numerical simulations show that we should try to shorten the delay as much as possible so that we can control the computer viruses propagation effectively.
5 Conclusions
Considering that some computer viruses may purposely lay dormant for a period of time prior to infecting other computers, we incorporate the latent period delay of the computer viruses into the model considered in the literature [15] and propose a delayed SIE computer virus propagation model in this paper. Compared with the work in [15], we mainly consider the effect of the latent period delay on system (2). It is shown that the latent period delay plays an important role on the stability of system (2). When \(\tau <\tau_{0} \), system (2) is locally asymptotically stable and the characteristics of computer viruses propagation can be easily predicted and eliminated. However, when \(\tau\ge\tau_{0} \), a Hopf bifurcation occurs and the computer viruses propagation is unstable and may be out of control. Furthermore, the properties of the Hopf bifurcation are investigated by using the normal form theory and the center manifold theorem. It should be pointed out that the assumptions for the parameters of system (2) in this paper are only technical and we do not take the specific meanings of them into account. Namely, our study is restricted only to the theoretical analysis of the Hopf bifurcation phenomena of system (2). It may be helpful for field investigation or experimental studies on the propagation of computer viruses in networks. In addition, the other behaviors of system (2) out of the assumptions on the parameters have been disregarded. We leave these as our future work.
References
Yuan, H, Chen, G, Wu, J, Xiong, H: Towards controlling virus propagation in information systems with point-to-group information sharing. Decis. Support Syst. 48(1), 57-68 (2009)
Luiijf, E: Understanding cyber threats and vulnerabilities. Lect. Notes Comput. Sci. 7130(1), 52-67 (2012)
Huang, CY, Lee, CL, Wen, TH, Sun, CT: A computer virus spreading model based on resource limitations and interaction costs. J. Syst. Softw. 86(3), 801-808 (2013)
Kephart, JO, White, SR: Directed-graph epidemiological models of computer viruses. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 343-359 (1991)
Wierman, JC, Marchette, DJ: Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction. Comput. Stat. Data Anal. 45(1), 3-23 (2004)
Piqueira, JRC, Araujo, VO: A modified epidemiological model for computer viruses. Appl. Math. Comput. 213(2), 355-360 (2009)
Ren, JG, Yang, XF, Zhu, QY, Yang, LX, Zhang, CM: A novel computer virus model and its dynamics. Nonlinear Anal., Real World Appl. 13(1), 376-384 (2012)
Gan, CQ, Yang, XF, Liu, WP, Zhu, QY, Zhang, XL: Propagation of computer virus under human intervention: a dynamical model. Discrete Dyn. Nat. Soc. 2012, Article ID 106950 (2012)
Yuan, H, Chen, GQ: Network virus-epidemic model with the point-to-group information propagation. Appl. Math. Comput. 206(1), 357-367 (2008)
Dong, T, Liao, XF, Li, HQ: Stability and Hopf bifurcation in a computer virus model with multistate antivirus. Abstr. Appl. Anal. 2012, Article ID 841987 (2012)
Zhang, CM, Zhao, Y, Wu, YJ, Deng, SW: A stochastic dynamic model of computer viruses. Discrete Dyn. Nat. Soc. 2012, Article ID 264874 (2012)
Mishra, BK, Pandey, SK: Dynamics model of worms with vertical transmission in computer network. Appl. Math. Comput. 217(21), 8438-8446 (2011)
Mishra, BK, Saini, DK: SEIRS epidemic model with delay for transmission of malicious objects in computer network. Appl. Math. Comput. 188(2), 1476-1482 (2007)
Mishra, BK, Jia, N: SEIQRS model for the transmission of malicious objects in computer network. Appl. Math. Model. 34(3), 710-715 (2010)
Chen, JY, Yang, XF, Gan, CQ: Propagation of computer virus under the influence of external computers: a dynamical model. J. Inf. Comput. Sci. 10(16), 5275-5282 (2013)
Bianca, C, Guerrini, L: On the Dalgaard-Strulik model with logistic population growth rate and delayed-carrying capacity. Acta Appl. Math. 128(1), 39-48 (2013)
Bianca, C, Guerrini, L, Riposoj, J: A delayed mathematical model for the acute inflammatory response to infection. Appl. Math. Inf. Sci. 9(6), 2775-2782 (2015)
Xu, CJ, He, XF: Stability and bifurcation analysis in a class of two-neuron networks with resonant bilinear terms. Abstr. Appl. Anal. 2011, Article ID 697630 (2011)
Bianca, C, Guerrini, L: Hopf bifurcations in a delayed microscopic model of credit risk contagion. Appl. Math. Inf. Sci. 9(3), 1493-1497 (2015)
Hassard, BD, Kazarinoff, ND, Wan, YH: Theory and Applications of Hopf Bifurcation. Cambridge University Press, Cambridge (1981)
Acknowledgements
The authors would like to thank the editor and the anonymous referees for their work on the paper. This work was supported by the Natural Science Foundation of Higher Education Institutions of Anhui Province (KJ2014A005, KJ2014A006).
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ contributions
All authors contributed equally to the writing of this paper. All authors read and approved the final manuscript.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Zhang, Z., Bi, D. Bifurcation analysis in a delayed computer virus model with the effect of external computers. Adv Differ Equ 2015, 317 (2015). https://doi.org/10.1186/s13662-015-0652-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13662-015-0652-y