ArticlePDF Available

Analysis of Computer Virus Propagation Based on Compartmental Model

Authors:

Abstract

Computer viruses pose a considerable problem for users of personal computers. In order to effectively defend against a virus, this paper proposes a compartmental model SAEIQRS (Susceptible-Antidotal-Exposed-Infected-Quarantine-Recovered-Susceptible) of virus transmission in a computer network. The differential transformation method (DTM) is applied to obtain an improved solution of each compartment. We have achieved an accuracy of order O(h 6) and validated the results of DTM with fourth-order Runge-Kutta (RK4) method. Based on the basic reproduction number, we analyzed the local stability of the model for virus free and endemic equilibria. Using a Lyapunov function, we demonstrated the global stability of virus free equilibria. Numerically the eigenvalues are computed using two different sets of parameter values and the corresponding dominant eigenvalues are determined by means of power method. Finally, we simulate the system in MATLAB. Based on the analysis, aspects of different compartments are investigated.
Applied
and
Computational
Mathematics
2018; 7(1-2): 12-21
http://www.sciencepublishinggroup.com/j/acm
doi: 10.11648/j.acm.s.2018070102.12
ISSN: 2328-5605 (Print); ISSN: 2328-5613 (Online)
Analysis of Computer Virus Propagation Based on
Compartmental Model
Pabel Shahrear1, Amit Kumar Chakraborty2, Md. Anowarul Islam1, Ummey Habiba3, *
1Department of Mathematics, Shahjalal University of Science & Technology, Sylhet, Bangladesh
2Department of Computer Science and Engineering, Metropolitan University, Sylhet, Bangladesh
3Government Teachers Training College, Sylhet, Bangladesh
Email address:
pabelshahrear@yahoo.com (P. Shahrear), amit.math.sust@gmail.com (A. K. Chakraborty), mislam32@gmail.com (Md. A. Islam),
habibaummey@yahoo.com (U. Habiba)
*Corresponding author
To cite this article:
Pabel Shahrear, Amit Kumar Chakraborty, Md. Anowarul Islam, Ummey Habiba. Analysis of Computer Virus Propagation Based on
Compartmental Model. Applied and Computational Mathematics. Special Issue: Recurrent neural networks, Bifurcation Analysis and
Control Theory of Complex Systems. Vol. 7, No. 1-2, 2018, pp. 12-21. doi: 10.11648/j.acm.s.2018070102.12
Received: June 25, 2017; Accepted: August 16, 2017; Published: September 6, 2017
Abstract: Computer viruses pose a considerable problem for users of personal computers. In order to effectively defend
against a virus, this paper proposes a compartmental model SAEIQRS (Susceptible - Antidotal - Exposed- Infected -
Quarantine - Recovered - Susceptible) of virus transmission in a computer network. The differential transformation method
(DTM) is applied to obtain an improved solution of each compartment. We have achieved an accuracy of order O(h6) and
validated the results of DTM with fourth-order Runge-Kutta (RK4) method. Based on the basic reproduction number, we
analyzed the local stability of the model for virus free and endemic equilibria. Using a Lyapunov function, we demonstrated
the global stability of virus free equilibria. Numerically the eigenvalues are computed using two different sets of parameter
values and the corresponding dominant eigenvalues are determined by means of power method. Finally, we simulate the
system in MATLAB. Based on the analysis, aspects of different compartments are investigated.
Keywords: Differential Equations, Stability Analysis and Epidemic Models
1. Introduction
To the best of our knowledge, computer viruses are in
action during the early 1980s. At the beginning, its
capabilities were not deadly. A computer virus is nothing but
a program that can spread across the computers using
networks. Typically, such viruses spread without the consent
of user’s and being able to crush the computer. Peoples are
used of technology and dependency on computer is
increasing exponentially. Consequently, a large number of
computer viruses and their harmful effects are roaring in
computer networks. Continuous appearance of new computer
viruses causes vigorous risk for both the corporations and
individuals [1].
A computer virus has some of the traits of the biological
virus [2]. It makes quick copies of itself when it attacks once
computer or it may be latent [3, 4]. Generally when a virus
attacks in a computer then at first it infects certain files.
When these files are opened by the user then the virus spread
throughout the whole computer. The infected files then cause
the virus to spread in the network when they are sheared with
others' computer. There are different types of computer
viruses and all of these behave in different ways [5]. Viruses
commonly slow down a computer and even stop it
completely. It can result in the loss of important files. Some
viruses can also compromise the security of a computer and
perform harmful operations such as accruing personal data’s,
encrypting files, formatting disks, etc. To defend the attack
from these viruses it is necessary to learn about their
spreading mechanisms, limitations, and protections [6].
Antivirus is a program that can secure computer from
viruses. By antivirus, a susceptible computer would have
temporary immunity. But to control the further risk of
attacking, a user need to update their antivirus regularly.
Applied and Computational Mathematics 2018; 7(1-2): 12-21 13
While antivirus is an important part of security but it cannot
detect or stop all attacks [7]. So, user awareness is the best
defense for the control of virus propagation [8, 9]. For better
understanding about spreading and to increase security in
computer networks, the spreading dynamics of computer
viruses is also an important matter [10, 11].
Isolation is another way to suspend the transmission of
these viruses. When antivirus has no available update for a
virus then isolation is the only remedy [12, 13, 14].
Quarantine is the process of isolating an infected computer.
In the biological world, quarantine is used to separate and
restrict the movement of persons to reduce the transmission
of human diseases. The same concept has been used in the
computer world. The most infected computers are
quarantined to prevent the spreading of virus from an
infected computer to other computers or networks. This may
help us to reduce the transmission of the virus to susceptible
computers.
Researchers have utilized the biological system to
understand the dynamics of the spread of computer virus in a
network. The spreading behavior of computer virus has
studied by using different epidemiological models.
Encouraged by the aspect between computer viruses and
biological analogue, Cohen [15] and Murray [16]
recommended that the concept used in the epidemic
dynamics of infectious disease should be applicable to study
the spread of computer viruses. Based on Kermack and
McKendrick SIR classical epidemic model [17, 18], different
models are formed to study the spread of computer viruses in
a network. Kephart and White [19] provided a biological
epidemic model SIS, to investigate the way that computer
viruses spread on the Internet. At present, the most
researchers give their attention to the combination of virus
propagation model and antivirus therapeutic. In [20], the
author presented SVEIR model showing partial
immunization for internet worm by vaccination. In [12, 13,
14], the authors developed some models by taking quarantine
as one of the compartments in the epidemic models.
In the year 2010, Mishra and Jha developed a SEIQRS
model [14]. In their paper, the effect of quarantine on
recovery was studied. They have pretended that the recovery
is possible by quarantining an affected file and then treated
the affected file with antivirus. The core concept is nothing
but to detach the infected files only. After infection,
quarantine plays an important role to outbreak further
transmission. Point to be noted that it is difficult to identify
all of the infected files in a computer because the viruses
have a latent ability. So quarantine is not always useful to get
rid of all the encountered problems generated by the virus.
This is because many of them remain unidentified. Moreover,
the transmission is not limited. For example, if the
susceptible computers are in contact with the infected
computers, then the virus may transmit subsequently. If there
is no communication with an infected computer, then the
transmission is not possible for that one. We have used that
concept by redefining the compartments of the previous
model in a broad sense. As a result of that modification, we
have generated the SAEIQRS (Susceptible-Antidotal-
Exposed-Infected-Quarantine-Recovered-Susceptible) model.
In this model, the quarantine concept can be used to restrict
infected computers from a network. Such development has
some superiority of the previous model SEIQRS, which deals
only with an infected file. However, Antivirus is also a
widely used technique to protect computers from viruses. If a
computer has an antivirus with the latest update then the
attack may shield. Both quarantine and antivirus play
important role in recovery. To some extent mathematically,
we have proven that in this paper. We obtain that the two
compartments simultaneously play a significant role to get
the recovery state back.
The model is expressed by a system of first order nonlinear
differential equations in section 2. In section 3, the
differential transform method is applied to obtain the solution
of the compartments. The expressions for disease free,
endemic equilibria and the basic reproduction number are
derived in section 4. In section 5, the stability of disease free
and endemic equilibria is established. In section 6,
numerically the eigenvalues are computed and the dominant
eigenvalue is obtained, based on power method. In section 7,
the simulations and solutions of the compartments are
conducted giving hints about how to control the virus
propagation. Finally, section 8 summarizes the work.
2. Model Formulation
It is our goal to investigate the role of viruses and its
propagation through the network. To do so, we have
developed the SAEIQRS (Susceptible-Antidotal-Exposed-
Infected-Quarantine-Recovered-Susceptible) model. We are
claiming that this model is an updated model conceived from
the originator SEIQRS developed in [14]. We have added a
new significant compartment in the SEIQRS. This
compartment is a representative of an antidotal computer in
the network. We consider a portion of antidotal computers
become recovered which has recent update, again a portion
of antidotal computers, which are not recently updated,
become exposed.
We are acquainting some notations to the reader as
follows: S(t), the number of susceptible computers at a time t,
which are uninfected, and having no immunity. A(t), the
number of antidotal computers at a time t that may be recent
or old updated. E(t), the number of exposed computers at a
time t that are susceptible to infection. I(t), the number of
infected computers at a time t that have to be cured. Q(t), the
number of infected computers at a time t that are quarantined.
Quarantine is a class that can interrupt communication with
the infected class of computers. R(t), Uninfected computers
at a time t having temporary immunity. N(t), the total number
of computers at a time t.
The total number of computers (N) is partitioned into six
different classes: Susceptible (S), Antidotal (A), Exposed (E),
Infected (I), Quarantine (Q) and Recovered (R). That is,
S(t)+A(t)+E(t)+I(t)+Q(t)+R(t)=N(t) (1)
14 Pabel Shahrear et al.: Analysis of Computer Virus Propagation Based on Compartmental Model
In the SAEIQRS model, a portion of susceptible
computers (S) goes through antidotal process (A) and another
portion through latent period (and is said to become exposed,
E) after infection before becoming infectious, thereafter some
computers go to infected class (I). Depending on the update
status of antidotal computers a portion goes to the recovered
class (R) and a portion to exposed class (E). Some infected
computers stay in the infected class while they are infectious
and then move to the recovered class (R) upon updated or
reinstall of anti-virus software. Other infected computers are
transferred into the quarantine class (Q) while they are
infectious and then moved to the recovered class (R). Since
in the cyber world the acquired immunity is not permanent,
the recovered computers return back to the susceptible class
(S).
The following assumptions are made to characterize the
model,
1. All newly connected computers are virus free and
susceptible.
2. Susceptible computers are moved into antivirus process
(which may be updated or not) at a rate
α
.
3. Each virus free computer and antidotal (old updated)
computers get contact with an infected computer at a
rate
β
and 1
φ
respectively.
4. Antidotal computers (that have recent update) are cured
at a rate 2
φ
.
5. Death rate other than the attack of virus is constant
µ
.
6. Exposed computers become infectious at a rate
γ
.
7. Infectious computers are cured at a rate 1
σ
.
8. Infectious computers are quarantined at a rate 2
σ
.
9. Quarantined computers are cured at a rate
δ
.
10. Recovered computers become susceptible again at a
rate
η
.
Our assumptions on the transmission of virus in a
computer network are depicted in figure 1.
Figure 1. Transfer diagram of SAEIQRS mode.
The system of ordinary differential equations representing
this model is as follows,
2 1
1
1 1 2
2 1
1 2
( )
( )
dS B S SI S R
dt
dA S A A AI
dt
dE SI E E AI
dt
dI E k I I I
dt
dQ I k Q Q
dt
dR I Q R A R
dt
µ β α η
α µ φ φ
β µ γ φ
γ µ σ σ
σ µ δ
σ δ µ φ η
= − +
= − −
= − +
= − +
= − +
= + +
(2)
where B is the birth rate (new computers attached to the
network),
µ
is the natural death rate (crashing of the
computers due to other reason other than the attack of virus),
1
kis the crashing rate of computer due to the attack of virus,
β
is the rate of transmission of virus attack when
susceptible computers contact with infected ones (S to E),
α
is the rate at which the susceptible computers begin the
antidotal process (S to A), point to be noted that 0
α
= bears
the meaning of no vaccination, 1
φ
is the rate of virus attack
when antidotal computers contact infected computers before
obtaining recent update (A to E), 2
φ
is the rate of recovery
by antidotal computers (A to R),
γ
is the rate coefficient of
exposed class (E to I), 1
σ
and 2
σ
are the rate of coefficients
of infectious class (I to R) and (I to Q),
δ
is the rate
coefficient of quarantine class (Q to R),
η
is the rate
coefficient of recovery class (R to S).
Summing the equations of system (2) we obtain,
1
( )
dN B N k I Q
dt
µ
= − +
(3)
Therefore the total population may vary with time t. In
absence of disease, the total population size  converges
to the equilibrium /B
µ
. Thus we study our system (2) in the
Applied and Computational Mathematics 2018; 7(1-2): 12-21 15
feasible region, 6
B
S A E I Q R S A E I Q R
µ
= ∈ℜ + + + + + ≤
+.
We next consider the dynamic behavior of model (2).
3. Differential Transform Method (DTM)
In this section we have applied differential transform
method (DTM) to solve the system of nonlinear differential
equation arises from SAEIQRS model. We compared the
numerical results obtained by fourth order Runge Kutta
(RK4) method with the results of DTM and check the
accuracy of the solutions.
Let S(k), A(k), E(k), I(k), Q(k) and R(k) denote the
differential transformation of s(t), a(t), e(t), i(t), q(t) and r(t)
respectively, then by using the fundamental operations of
differential transformation method (DTM), discussed in [21,
22], we obtained the following recurrence relation to each
equation of the system (2):
0
1
( 1) [ ( ) ( ) ( ) ( ) ( ) ( )]
1
k
m
S k B k R k S k S m I k m
k
δ η µ α β
=
+ = + +
+ (4)
2 1
0
1
( 1) [ ( ) ( ) ( ) ( ) ( )]
1
k
m
A k S k A k A m I k m
k
α µ φ φ
=
+ = +
+ (5)
1
0 0
1
( 1) [ ( ) ( ) ( ) ( ) ( ) ( )]
1
k k
m m
E k E k S m I k m A m I k m
k
µ γ β φ
= =
+ = + + +
+ (6)
1 1 2
1
( 1) [ ( ) ( ) ( )]
1
I k E k k I k
k
γ µ σ σ
+ = + + +
+
(7)
2 1
1
( 1) [ ( ) ( ) ( )]
1
Q k I k k Q k
k
σ µ δ
+ = + +
+
(8)
1 2
1
( 1) [ ( ) ( ) ( ) ( ) ( )]
1
R k I k Q k A k R k
k
σ δ φ µ η
+ = + + +
+
(9)
Applying initial conditions, S(0)=30, A(0)=5, E(0)=2, I(0)=0, Q(0)=0, R(0)=3 and parameter [13],
1 2 1 1 2
0.01, 0.09, 0.45, 0.35, 0.3, 0.65, 0.01, 0.05, 0
.035, 0.65, 0.2, 0.3
B k
β γ σ σ δ η µ α φ φ
= = = = = = = = = = = =
in equation (4)-(9) the closed form of the solution for k=7 can be written as,
2 3 4 5 6
07
2 3
0
( ) ( ) 30 20.96 + 6.1276 0.354410333333334 0.612774749166667 0.385621333823333 0.124970337
952831
0.011038050 444019
( ) ( ) 5 17.75 10 .36825 + 1.657525833333334 0.6513
=
=
= = − +
+ +
= = + +
k
k
k
k
s t t S k t t t t t t
t
a t t A k t t t
4 5 6
7
2 3 4 5 6
0
21997916667 0.689096313183333 + 0.317635394
362128
0.066789015984164
( ) ( ) 2 +1.915 0.505511666666667 0.118781722916667 + 0.276216114060417 0.178642739337144
0.05347074617269
=
− +
= = −
+
k
k
t t t
t
e t t E k t t t t t t
7
2 3 4 5 6
07
2 3 4
0
0
( ) ( ) 0 0.9 0.55575 0.42340875 0.134671420312500 0.009106343723437 +0.019600681448410
0.013542247652328
( ) ( ) 0 0 0.135 0.08865 +0.04804 50 9375 0.01 51429 1
=
=
+
= = − + +
− +
= = − +
k
k
k
k
t
i t t I k t t t t t t
t
q t t Q k t t t t 5 6 7
2 3 4 5 6
07
4 +0.002310324151172 0.000597445169059
( ) ( ) 3 1.32 + 2.7804 1.1280205 0.163877385625 0.033931654013125 0.035903411165431
0.015115253169110
=
+ +
= = + + +
+ +
k
k
t t t
r t t R k t t t t t t
t
Now, about the efficiency of DTM, we have compared the
solution of DTM with the solution of RK4. Matlab codes are
used to generate both the solutions. We give the comparison
of numerical results for the compartments in table-1. Here we
have chosen the time for one month. The profile of
comparison for the compartments is depicted in figure 2.
From table-1 and figure 2, we notice that the differences of
two solutions have close ties with the increment of time. In
comparison to RK4, we found the minimum numerical
accuracy of DTM is Οℎ [22]. It is noted that this
16 Pabel Shahrear et al.: Analysis of Computer Virus Propagation Based on Compartmental Model
comparison is performed for a time length of one month. For
longer period of time, we give a conjecture that the DTM
does not provide a better approximation. Since the epidemic
outbreak holds for short interval so we can use DTM to
approximate the solution of an epidemic model. In our
opinion, DTM is suitable for solving a system of nonlinear
differential equations but efficient for a shorter period of
time.
Table 1. The absolute error involved in DTM along with the result obtained by RK4.
t DTM (8 iterate) RK4 |DTM-RK4| Numerical Accuracy in comparison of RK4
s(t) 1.0 14.472103963814519 14.478957142777162 0.006853178962643 min
Ο
a(t) 1.0 14.252347896444633 14.248989476202851 0.003358420241781 min
Ο
e(t) 1.0 2.441750731312629 2.438086793421569 0.003663937891060 min
Ο
i(t) 1.0 0.648152107207019 0.651929388590734 0.003777281383715 min
Ο
q(t) 1.0 0.082159949070231 0.081759552977624 0.000400396092607 min
Ο
r(t) 1.0 6.149400381641805 6.146236384188384 0.003163997453421 min
Ο
Figure 2. Compartments versus time (t) for DTM and RK4. Figure is generated in Matlab.
Although the results found by DTM are satisfactory but we
can’t comment about the following things, does the system
stable? Is there any globally attractor? In the following
sections we are going to discuss about these things.
4. Equilibrium Points and Reproduction
Number
In this section, the existence of virus free equilibrium and
endemic equilibrium of system (2) is discussed. The basic
reproduction number (R) for the SAEIQRS model is
calculated.
Equilibrium points are the points where the variables do
not change with time. The equilibrium points of the system
(2) are found by setting 0
dS dA dE dI dQ d R
dt dt dt d t dt d t
= = = = = =
in (2).
We get the system of equations,
2 1
1
1 1 2
2 1
1 2
0
0
0
( ) 0
( ) 0
0
B S SI S R
S A A AI
SI E E AI
E k I I I
I k Q Q
I Q R A R
µ β α η
α µ φ φ
β µ γ φ
γ µ σ σ
σ µ δ
σ δ µ φ η
− − − + =
 
 
− − =
 
 
− + =
 
 
− + =
 
 
− + =
 
+ − + − =
 
 
(10)
4.1. Virus Free Equilibrium
The virus free equilibrium (VFE) of the system (2) is
00 0 0
( , ,0, 0, 0, )P S A R=. Where,
0
0
0
2
2 2
2 2
2
2 2
( )( ) ,
( )( )( )
( ) ,
( )( )( )
( )( )( )
µ η µ φ
µ η µ α µ φ αηφ
α µ η
µ η µ α µ φ αηφ
αφ
µ η µ α µ φ αηφ
+ +
=+ + + −
+
=+ + + −
=+ + + −
B
S
B
A
B
R
Applied and Computational Mathematics 2018; 7(1-2): 12-21 17
4.2. Basic Reproduction Number
The basic reproduction number is defined as the expected
number of secondary cases that would arise from the
introduction of a single primary infectious case into a fully
susceptible population [23]. To obtain the basic reproduction
number (R), we will use the next generation matrix approach.
Since the model has three infected classes E, I and Q, so to
get the basic reproduction number (R) we take only three
equations from the system (2) corresponding to these classes.
That is,
1
1 1 2
2 1
( )
( )
dE SI E E AI
dt
dI
E k I I I
dt
dQ I k Q Q
dt
β µ γ φ
γ µ σ σ
σ µ δ
 
= − +
 
 
 
= − +
 
 
 
= − +
 
 
(11)
Let
(
)
X E, I, Q
=, then (11) can be written as,
( ) ( )
dX
f X v X
dt
= −
(12)
Where,
1
1 1 2
2 1
( ) ( )
( ) 0 ( ) ( )
0 ( )
S A I E
f X and v X E k I
I k Q
β φ µ γ
γ µ σ σ
σ µ δ
+ +
 
 
= = − + + + +
 
 
+ + +
 
Thus the basic reproduction number (R) is,
0 1 0
1 1 2
( )
( )( )
S A
Rk
γ β φ
µ γ µ σ σ
+
=+ + + + (13)
4.3. Endemic Equilibrium Point
When the disease is present at the population one has
*
0
I
. There may be several critical points when *
0
I
,
which are the endemic equilibrium points (EEP) of the
model. These points will be denoted by,
* * * * * * *
( , , , , , )
e
P S A E I Q R
=. Where
* * * * * *
, , , , ,
S A E I Q R
represent the positive solution of the set of system (10).
Solving the system of equations (10) we get,
* * *
*3 4 2 1 2 1 1 4 2
* *
4 1 2 1 3 2
( ) ( ) ( )
,
{ ( ) ( ) }
φ η φ σ δ σ
β φ α η φ
+ + + +
=+ + −
B B B B I B I B I
S
B B I B I B
*
*3 4 1 4 2
* *
4 1 2 1 3 2
( )
,
{ ( ) ( ) }
α α η σ δσ
β φ α η φ
+ +
=+ + −
B B B B I
A
B B I B I B
* * *
*3 4 1 4 2 2 1 1
* *
4 6 1 2 1 3 2
{ ( ) }{ ( ) }
{( )( ) }
BB B B I B I I
E
B B B I B I B
η σ δσ β φ αφ
β φ αηφ
+ + + +
=+ + − ,
*
*2
4
I
Q
B
σ
=,
* * *
*
1 2 1 1 4 2 2 4
*
4 1 2 1 3 2
( )( )( )
*
{( )( ) }
B I B I B I BB
R
B B I B I B
β φ σ δσ αφ
β φ αηφ
+ + + +
=+ + −
While
*
I
is the positive root of the equation,
* *
2
( ) 0
a I bI c
+ + =
Here,
1 1 4 1 2 1 3 4 5 6
a B B B B B
γ βφ η σ γ βφ η δ σ βφ
= + −
1 1 4 1 2 4 2 2 2 1
1 3 4 1 1 3 4 5 6 2 3 4 5 6
η σ γ α φ η σ γ β η δ σ γ β η δ σ γ α φ
γ βφ φ β
= + + +
+ −
b B B B B
B B B B B B B B B B B B B
1 2 3 4 2 4
( )
c B B B B B R
αηφ
= −
,
1 2 2 3 4 1
,
5 1 2 1 6
, , ,
µ α µ φ µ η µ δ
µ σ σ µ γ
= + = + = + = + +
= + + + = +
B B B B k
B k B
5. Stability Analysis
In this section, the stability analysis of virus free
equilibrium point,
0
P
and endemic equilibrium point,
*
e
P
of
the system (2) are studied. Analysis of various types of
stability for hopfield neural networks are studied in [28, 29,
30]. Here at first we have stated the necessary theorems for
stability analysis. Moreover we have used equation (2) to
prove the following theorems for this particular model
SAEIQRS.
The necessary theorems for stability analysis are stated
below.
Theorem 5.1: when R<1, the virus free equilibrium (VFE)
0
P
is locally asymptotically stable. When R>1, the virus free
equilibrium (VFE)
0
P
is an unstable saddle point.
Theorem 5.2: When
1
R
, the virus free equilibrium
0
P
is
globally asymptotically stable.
Theorem 5.3: when
1
R
>
, the endemic equilibrium
*
e
P
is
locally asymptotically stable.
Now we shall proof these theorems using the system of
equations (2) generated from SAEIQRS model.
Proof of theorem 5.1: The Jacobian matrices of the model
(2) at
0
P
is
0
2 1 0
1 0 1 0
2
2 1
2 1 1
0
( ) 0 0 0
0 0 0
0 0 0 0
( )
0 0 0 0
0 0 0 ( ) 0
0 0
S
D A
C S A
J P C
k
D
µ α β η
α φ
β φ
γσ µ δ
φ σ δ
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
− +
− −
− +
= + +
where,
1 2 1 1 2 1 2 2
, , ,
µ γ µ σ σ µ η µ φ
= + = + + + = + = +
C C k D D
By [20],
0
P
is locally asymptotically stable if all the
eigenvalues of
0
( )
J P
has negative real part. Again
0
P
is
unstable if at least one of the eigenvalues of
0
( )
J P
has
positive real part.
The characteristic polynomial of
0
( )
J P
is
2
1 1 2 2 1
21 2 0 1 0 1 2
( ) ( ) ( ){ ( ) ( ) }
{ ( ) ( ) }
λ λ µ δ λ µ λ α λ α αη
λ λ γ β φ
= + + + + + + + + + +
+ + + +
f k D D D D
C C S A C C
18 Pabel Shahrear et al.: Analysis of Computer Virus Propagation Based on Compartmental Model
The eigenvalues of
0
( )
J P
are, 1 1
( )
k
λ µ δ
= − + +
,
2
λ µ
= −
,
2
1 2 1 2 2 1
3, 4
( ) ( ) 4{ ( ) }
2
D D D D D D
α α α α η
λ
+ + ± + + + +
=,
and,
2
1 2 1 2 1 2 0 1 0
5, 6
( ) ( ) 4{ ( ) }
2
C C C C C C S A
γ β φ
λ
− + ± + +
=
Here
1
λ
,
2
λ
and
3, 4
λ
are negative. The real part of
5 ,6
λ
will be negative if 1 2 0 1 0
( ) 0
C C S A
γ β φ
+ >
or
1
R
<
. Thus for
1
R
<
, the real part of all eigenvalues of
0
( )
J P
are negative
and consequently the virus free equilibrium (DEF)
0
P
is
locally asymptotically stable. Again one of the real part of
5, 6
λ
will be positive if 1 2 0 1 0
( ) 0
C C S A
γ β φ
+ <
or
1
R
>
.
Thus for
1
R
>
, at least one of the eigenvalues of
0
( )
J P
has
positive real part and consequently the virus free equilibrium
(DEF)
0
P
is unstable saddle point.
Proof of theorem 5.2: According to [20, 24], Consider the
following positive definite Lyapunov function
1 1 1 2
1 1 1 2
1 1 1 2
1
1 1 2
1 1 2
( )
( )
( ) ( ){ ( ) }
( ) ( ) ( )( )
{ ( ) ( )( )}
( )
( )( ){ 1}
( )( )
( )
L E I
L E I
SI E E AI E k I
S I E AI E k I
S A k I
S A
k I
k
γ µ γ
γ µ γ
γ β µ γ φ µ γ γ µ σ σ
γ β µ γ γ γφ µ γ γ µ γ µ σ σ
γ β φ µ γ µ σ σ
γ β φ
µ γ µ σ σ µ γ µ σ σ
µ γ
= + +
′ ′
= + +
= + + + − + + +
= − + + + + − + + + +
= + − + + + +
+
= + + + +
+ + + +
= + 1 1 2
( )( 1)
0
k R I
µ σ σ
+ + +
Furthermore,
0
L
=
if and only if
0
I
=
or
1
R
=
. Thus,
the largest compact invariant set in
{( , , , , , ) | 0}
S A E I Q R L
=
is the singleton
0
{ }
P
. When
1
R
, the global stability of
0
P
follows from LaSalle’s
invariance principle [25]. So,
0
P
is globally asymptotically
stable in
. When
1
R
, it follows from the fact
0
L
>
if
0
I
>
. This completes the proof.
Proof of theorem 5.3: The Jacobian matrix of the model
(2) at
* * * * * * *
( , , , , , )
e
P S A E I Q R
=is
* *
* *
2 1 1
* * * *
*1 1
1 1 2
2 1
2 1
0 0 0
0 0 0
0 0
( )
0 0 0 0
0 0 0 0
0 0
e
I S
I A
I I A S
J P
k
k
µ β α β η
α µ φ φ φ
β φ µ γ φ β
γ µ σ σ
σ µ δ
φ σ δ µ η
 
− −
 
 
− −
 
 
− − +
=
 
− −
 
 
− −
 
 
− −
 
* *
2 1 1
1 2 1
*
( )
0
µ β α µ φ φ µ γ µ
σ σ µ δ µ η
= − − − − − − −
− − − − − <
e
trace J P I I k
k
1 1 1 1
1 2 1
1 2 2 1 1 2 1 1
2 2 1 1
1
φ µ δ γ φ µ β α µ η ηασ
φ γα β µ β α µ η ηδσ γηβ µ δ
φ φ µ φ φ σ γβ µ φ φ µ δ
µ η β ηδσ µ β α µ φ φ µ δ
µ η µ γ µ
= + + + + +
+ + + + + + +
+ + + + + + +
+ + + + + + + +
+ + + +
* * * *
e
* * * *
* * * *
* * *
de t J ( P ) I ( k ) { A ( I )( ) }
I { S ( I )( ) } I ( k )
{ A ( I ) } I ( I ){( k )
( ) S } ( I )( I ) ( k )
( ) {( ) ( k
1 2 1
2 1 1 1 2
1
σ σ γ φ β
ηαφ µ δ µ η µ σ σ
+ − +
+ + + + + + +
* *
) ( A S )}
( k ) ( )( k )( R )
Now det *
( ) 0
e
J P
>
if
1
R
>
. Thus for
1
R
>
the
eigenvalues of
*
( )
e
J P
has negative real part. So by [26] and
[27], the endemic equilibrium
*
e
P
is locally asymptotically
stable if
1
R
>
.
6. Numerical Eigenvalues and Power
Method
This section comprises of two sets of different parameter
values. For each set, we have evaluated the eigenvalues
numerically and verified theorem 5.1. Moreover, dominant
eigenvalues are determined based on the power method.
Based on [13], we consider the value of the parameters
1 2
1 1 2
0.01, 0.09, 0.45, 0.35, 0.3, 0.65,
0.01, 0.05, 0.035, 0.65, 0.2, 0.3
B
k
β γ σ σ δ
η µ α φ φ
= = = = = =
= = = = = = (14)
Using parameter (14), we get the reproduction number,
R= 0.009306122448980, which is less than one. So by
theorem 5.1, the virus free equilibria is asymptotically stable
and all the eigenvalues of Jacobian matrix should has
negative real part.
We have the Jacobian matrix using parameter (14) at virus
free equilibria
1
0
-0.7000 0 0 -0.0015 0 0.0100
0.6500 -0.3500 0 -0.0061 0 0
0 0 -0.5000 0.0076 0 0
0 0 0.4500 -0.7350 0 0
0 0 0 0.3000 -0.7350 0
0 0.3000 0 0.3500 0.6500 -0.0600
J
 
 
 
 
=
 
 
 
 
 
 
The eigenvalues of the matrix
1
0
J
are: -
0.690934769394311, -0.369065230605689, -
0.486251190481589, -0.7350, -0.748748809518410, -0.050,
which are all negative. So the criterion of theorem 5.1 holds
for the set of parameter (14). Using the power method we
find the dominant eigenvalue is, -0.748748809518410.
Again based on [14], we consider parameter values
2
1 1 2
0.3, 0.3, 0.3, 1.8, 3.8, 0.3,
1
0.2, 0.1, 0.2, 0.6, 0.12, 0.6
B
k
β γ σ σ δ
η µ α φ φ
= = = = = =
= = = = = =
(15)
Using parameter (15), we get the reproduction number,
R= 0.043016949152542, which is less than one. And the
Jacobian matrix using parameter (15) at virus free equilibria
Applied and Computational Mathematics 2018; 7(1-2): 12-21 19
2
0
-0.70000 0 0 -0.25200 0 0.20000
0.60000 -0.70000 0 -0.08640 0 0
0 0 -0.40000 0.33840 0 0
0 0 0.30000 -5.90000 0 0
0 0 0 3.80000 -0.60000 0
0 0.60000 0 1.80000 0.300000 -0.30000
J
 
 
 
 
 
 
 
 
 
 
 
=
The eigenvalues corresponds to the matrix 2
0
J are: -
0.8+0.331662479035540i, -0.8-0.331662479035540i, -
5.918396647881225, -0.6, -0.381603352118776, -0.1. All of
these have negative real part. So the theorem 5.1 holds for the
set of parameter (15). And by power method the dominant
eigenvalue is, -5.918396647881225.
Thus for both parameter set the reproduction number is
less than one and the real parts of the eigenvalues are
negative. So the virus free equilibrium (VEF) 0
P is locally
asymptotically stable. This verifies theorem 5.1 numerically.
7. Numerical Simulations
In this section, we simulate various compartments of
SAEIQRS model. For this, we have used built-in solver
ode45 in Matlab. For the set of parameter value in (14), we
consider the number of susceptible, antidotal, exposed,
infectious, quarantined and recovered computers at the
beginning are S(0)=30, A(0)=5, E(0)=3, I(0)=0, Q(0)=0,
R(0)=2 respectively. And for the set of parameter value in
(15), we consider the number of susceptible, antidotal,
exposed, infectious, quarantined and recovered computers at
the beginning are S(0)=65, A(0)=20, E(0)=10, I(0)=0,
Q(0)=0, R(0)=5 respectively. The behaviors of susceptible,
antivirus, exposed, infected, quarantine and recovered class
with respect to time for both set of parameter (14) and (15)
with their corresponding initial conditions is depicted in
figure 3.
Figure 3. Dynamical behavior of the system (2). Figure is generated in Matlab with parameters,
1 2
0 .0 1, 0 .0 9 , 0 . 4 5, 0 .3 5 , 0 . 3,
B
β γ σ σ
= = = = =
1 1 2 1 2
0 .6 5 , 0 .0 1, 0 . 0 5, 0 .0 3 5 , 0 .6 5 , 0 . 2, 0 .3 , 0 .3 , 0 .
3, 0 . 3, 1 .8 , 3 . 8, 0 . 3,
δ η µ α φ φ β γ σ σ δ
= = = = = = = = = = = = =k a n d B
1 1 2
0 . 2, 0 . 1, 0 . 2, 0 . 6, 0 . 1 2 , 0 . 6
η µ α φ φ
= = = = = =k
.
Figure 3 is the representative of the behavior of the
susceptible, antivirus, exposed, infected, quarantine and
recovered class. We get the insight of the behavior of the
system regardless of the sets of parameters. As a
consequence, we have to choose one set of parameter. Based
on the analysis of power method in the previous section we
choose the set of parameter, which is in equation (15).
Between two sets of parameters this set gives the most
dominating eigenvalue. From now, we prefer the values of
the parameter in equation (15) for further analysis.
The effect of quarantine class (Q) on infected class (I),
quarantine class (Q) on recovered class (R) also infected
class (I) on recovered class (R) is depicted in figure 4. We
simulate the system with 1000 of different initial conditions.
As the simulation runs over time, we observe that different
set of initial conditions is approaching to a particular curve.
Such behaviors are depicted in figure 4. Point to be noted that
these behavior are not quite visible in this low amplitude.
Finally, we conclude that these two figures have global
attractor where subsequent iterations converge. Of course, we
observe such behavior in the light of numeric.
Now we will keep the value of other parameters same and
vary the parameter 2
φ
, to observe the recovery rate from
antidotal compartment (A) is influenced on recovery (R) or
not. We will vary the parameter 2
φ
from 0.3 to 0.9. Figure 5
shows that the effect of changing of the recovery rate from
antidotal compartment (A) on recovered compartment (R).
From figure 5, we see that a higher recovery rate from
antidotal compartment (A) results rapid increment on
recovered compartment (R) and a lower recovery rate give
less activity. Higher recovery rate from antidotal (A)
compartment means more presence of recently updated
antidotal computers in network. So an updated antivirus
gives immunization from virus attack and thus to get
20 Pabel Shahrear et al.: Analysis of Computer Virus Propagation Based on Compartmental Model
immunization user should update their antivirus regularly.
Figure 4. Left panel shows dynamical behavior of quarantine class (Q) on infected class (I), middle panel shows dynamical behavior of quarantine class (Q)
on recovered class (R), and right panel shows dynamical behavior of infected class (I) and recovered class (R). Figures are generated in Matlab with
parameters, 1 2 1 1 2
0 .3 , 0 . 3, 0. 3, 1 .8 , 3 . 8, 0 .3 , 0 .2 , 0 . 1, 0 . 2, 0 .6 , 0 . 1 2, 0 .6B k
β γ σ σ δ η µ α φ φ
= = = = = = = = = = = = .
Figure 5.
Effect of recovery rate
2
φ
form antidotal (A) compartment on
recovered (R) compartment. Other parameters are,
0 .3, 0 .3 ,
β
= =B
1 2 1 1
0.3, 1.8, 3.8, 0.3, 0.2, 0.1, 0.2, 0.6, 0.12.
γ σ σ δ η µ α φ
= = = = = = = = =k
8. Conclusion
The model we analyzed is expressed by a system of
nonlinear ordinary differential equations. We have developed
the SAEIQRS model to understand the transmission of
computer viruses. The efficiency and accuracy of the results
of DTM are justified based on the results of RK4. We found
DTM is convenient to approximate the solution of a system
of nonlinear differential for a period of time, which is not
lasting long. Virus free equilibrium and endemic equilibrium
of the system are analyzed. By the method of next generation
matrix, we obtain the basic reproduction number R. The
stability of the system as well as the annihilation of the virus
depends on the basic reproduction number. Once the basic
reproduction number is less than or equal to one, we have
shown that the behavior of the model is stable. We also give
conjecture that the users can predict virus propagation to
some extent. If the reproduction number does not lie in the
above-mentioned range, at this point the proposed model will
be unstable and the virus perseveres in the whole population.
Numerically, the eigenvalues of Jacobian matrix and the
dominant eigenvalue are computed by using two different
parameter set. Numerical simulations represent the behavior
of different compartments. Based on the analysis, we
observed that the dynamics of the system are asymptotically
stable. The global stability of virus free equilibrium and the
local stability of endemic equilibrium have been proven.
Moreover, the whole population in the long term is in a
recovery state. Simulation shows, antidotal compartment
plays important role in recovery. We have proven
mathematically that the user can prevent virus attack by
updating their antivirus regularly. Although in real world
network it’s very difficult to achieve full immunization by
antivirus. To get rid of the virus attack we need a higher
recovery rate of 2
φ
. We found a fascinating case where the
antidotal compartment plays a crucial role to get our work
and data free from virus.
References
[1] J. Aycock. Computer viruses and malware, volume 22.
Springer Science & Business Media, 2006.
[2] J. Li and P. Knickerbocker. Functional similarities between
computer worms and biological pathogens. Computers &
Security, 26(4): 338-347, 2007.
[3] J. O. Kephart, S. R. White, and D. M. Chess. Computers and
epidemiology. IEEE Spectrum, 30(5):20-26, 1993.
[4] B. Ebenezer, N. Farai, and A. A. S Kwesi. Fractional
dynamics of computer virus propagation. Science Journal of
Applied Mathematics and Statistics, 3(3):63-69, 2015.
[5] J. Hruska. Computer viruses and anti-virus warfare. Ellis
Horwood, 1992.
[6] E. Al Daoud, I. H. Jebril, and B. Zaqaibeh. Computer virus
strategies and detection methods. International Journal of
Open Problems Compt. Math, 1(2):12-20, 2008.
[7] A. Thengade, A. Khaire, D. Mitra, and A. Goyal. Virus detection
techniques and their limitations. International Journal of
Scientific & Engineering Research, 5(10):1334-1337, 2014.
Applied and Computational Mathematics 2018; 7(1-2): 12-21 21
[8] J. O. Kephart and S. R. White. Measuring and modeling
computer virus prevalence. In Research in Security and
Privacy, Proceedings, IEEE Computer Society Symposium on,
pages 2-15. IEEE, 1993.
[9] X. Zhang, S. Chen, H. Lu, and F. Zhang. An improved
computer multi-virus propagation model with user awareness.
Journal of Information and Computational Science, pages
4301-4308, 2011.
[10] S. Xu, W. Lu, and Z. Zhan. A stochastic model of multivirus
dynamics. IEEE Transactions on Dependable and Secure
Computing, 9(1):30-45, 2012.
[11] J. R. C. Piqueira, A. A. De Vasconcelos, C. E. C. J. Gabriel,
and V. O. Araujo. Dynamic models for computer viruses.
Computers & Security, 27(7):355-359, 2008.
[12] B. K. Mishra and A. K. Singh. Two quarantine models on the
attack of malicious objects in computer network.
Mathematical Problems in Engineering, 2012:1-13, 2011.
[13] M. Kumar, B. K. Mishra, and T. C. Panda. Effect of
quarantine and vaccination on infectious nodes in computer
network. International Journal of Computer Networks and
Applications, 2(2):92-98, 2015.
[14] B. K. Mishra and N. Jha. SEIQRS model for the transmission
of malicious objects in computer network. Applied
Mathematical Modelling, 34(3):710-715, 2010.
[15] F. Cohen. Computer viruses: theory and experiments.
Computers & Security, 6(1):22-35, 1987.
[16] W. H. Murray. The application of epidemiology to computer
viruses. Computers & Security, 7(2):139-145, 1988.
[17] W. O. Kermack and A. G. McKendrick. A contribution to the
mathematical theory of epidemics. In Proceedings of the
Royal Society of London A: mathematical, physical and
engineering sciences, volume 115, pages 700-721. The Royal
Society, 1927.
[18] W. O. Kermack and A. G. McKendrick. Contributions to the
mathematical theory of epidemics II, the problem of
endemicity. In Proceedings of the Royal Society of London A:
mathematical, physical and engineering sciences, volume 138,
pages 55-83. The Royal Society, 1932.
[19] J. O. Kephart and S. R. White. Directed-graph
epidemiological models of computer viruses. In Research in
Security and Privacy, 1991. Proceedings, 1991 IEEE
Computer Society Symposium on, pages 343-359. IEEE, 1991.
[20] F. Wang, Y. Yang, D. Zhao, and Y. Zhang. A worm defending
model with partial immunization and its stability analysis.
Journal of Communications, 10(4):276-283, 2015.
[21] I. H. A. H. Hassan. Application to Differential Transformation
Method for Solving Systems of Differential Equations.
Applied Mathematical Modeling, 32 (2008), PP. 2552–2559.
[22] A. K. Chakraborty, P. Shahrear, M. A. Islam, Analysis of
Epidemic Model by Differential Transform Method. Journal
of Multidisciplinary Engineering Science and Technology,
4(2): 6574-6581, 2017.
[23] B. K. Mishra and A. Prajapati. Spread of malicious objects in
computer network: A fuzzy approach. Applications & Applied
Mathematics, 8(2):684-700, 2013.
[24] A. L. V. Barber, C. C. Chavez, and E. Barany. Dynamics of an
SAIQR influenza model. BIOMATH, 3(2):1409251, 2014.
[25] J. P. LaSalle. The stability of dynamical systems, volume 25.
SIAM, 1976.
[26] F. Brauer and C. C. Chavez. Mathematical models in
population biology and epidemiology, volume 40. Springer,
2001.
[27] M. A. Khan, Z. Ali, L. C. C. Dennis, I. Khan, S. Islam, M.
Ullah, and T. Gul. Stability analysis of an SVIR epidemic
model with non-linear saturated incidence rate. Applied
Mathematical Sciences, 9(23):1145-1158, 2015.
[28] A. Arbi, C. Aouiti, F. Chérif, A. Touati and A. M. Alimi.
Stability analysis for delayed high-order type of Hopfield
neural networks with impulses. Neurocomputing, volume 165,
pages 312-329, 2015
[29] A. Arbi, C. Aouiti, F. Chérif, A. Touati and A. M. Alimi.
Stability analysis of delayed Hopfield neural networks with
impulses via inequality techniques. Neurocomputing, volume
158, pages 281-294, 2015.
[30] A. Arbi, F. Chérif, C. Aouiti and A. Touati. Dynamics of new
class of hopfield neural networks with time-varying and
distributed delays. Acta Mathematica Scientia, 36(3), 891-
912, 2016.
... Now, to compute the basic reproduction number of the Eq. (2.1) using the next-generation matrix technique [16], [17], the non-negative matrix F of the infection terms (E m , I m , E h , I h ) and the non-singular matrix V of transition terms are computed by ...
Article
Full-text available
Climate change and global warming have caused catastrophic effects that are already being felt in Bangladesh. The rise in temperature associated with global warming, as well as the broader impacts of climate change, are damaging the planet. These effects are spatial and temporal and have led to unexpected outcomes, such as the coexistence of humans and mosquitoes in regions where it was previously unimaginable. Despite being the smallest animals on earth, mosquitoes are also the deadliest, killing thousands of humans each year. The Culex mosquito, a common type of mosquito in Bangladesh, is easily accessible and poses a significant threat to human health. The transmission of viruses to humans is a significant concern. This article introduces and discusses the LMSEI-SEIR mathematical model, which can help in understanding this process. The disease-free equilibrium point and its stability are presented, and the reproduction number is calculated. To further investigate the implications of this model, a numerical analysis is conducted using MATLAB. The resulting figures can be used to inform future measures aimed at protecting against human fatalities.
... Furthermore, numerical simulations support the theoretical findings, highlighting the profound impact of memory effects on virus propagation dynamics. In Shahrear et al. (2018), the authors present the SAEIQRS (susceptible, antivirus, exposed, infected, quarantined, removed, susceptible) compartmental model for analysing the spread of computer viruses within networks. They employ differential equations and apply the differential transformation method (DTM), validating their results using the fourth-order Runge-Kutta method (RK4). ...
Article
Full-text available
We present a new fractional-order infection model for how computer viruses spread. This model uses the Caputo fractional derivative to better represent the complex dynamics and memory effects that happen naturally during virus transmission. We demonstrate the well-posedness of the model and determine the basic reproduction number R0 R_0 using the next generation matrix method. Two equilibrium points are identified: the virus-free equilibrium E0 E^0 and the persistent virus equilibrium E E^* . Global stability analysis, conducted via LaSalle’s invariance principle and Lyapunov functions, reveals that E0 E^0 is stable if R01 R_0 \le 1 , and E E^* is stable if R0>1 R_0 > 1 . Numerical simulations confirm that the fractional-order parameter influences the speed at which equilibrium points are approached without affecting their stability. A sensitivity analysis was conducted to identify the parameters that have a significant impact on the spread of computer viruses. Finally, we discuss the model’s limitations, particularly the simplification of interactions between different types of computer viruses and the saturation of defensive mechanisms.
... Sensitivity analysis helps the researcher to determine the effect of the parameter in the model. It is a technique to evaluate how the result will change based on changing input variables [24][25][26][27][28][29][30]. Here, we study the influence on basic reproduction number by the variation of the parameters in the expression of basic reproduction number. ...
Preprint
Full-text available
The ever-changing world of disease study heavily relies on mathematical models. They are key in finding and controlling infectious diseases. We aim to explore these mathematical tools used for studying disease spread in biology. The SEIR model holds our focus. It is a super important tool known for being flexible and useful. We look at the modified SEIR models' design and analysis. We dive right into vital parts like the equations that make the modified SEIR model work, setting parameter identities, and then checking its solutions' positivity and limits. The study begins with a detailed examination of the design and analysis of a modified SEIR model, demonstrating its angularity. We delve into the model's heart, dealing with critical issues such as the equations that drive the modified SEIR model, establishing parameter identities, and ensuring the positivity and boundlessness of its solutions. Basic Reproduction Number marks a significant milestone. We investigate the local stability, DFE, and EE. Global stability, a paramount consideration in understanding the long-term behaviors of the systems, is scrutinized by employing the Lyapunov stability theorem. The bifurcation analysis classifies and elucidates the fundamental concepts therein. One-dimensional bifurcation and forward and backward bifurcation analyses are intricately examined, providing a comprehensive understanding of the dynamical behavior and basic concepts. In summary, we offer a thorough description and analysis of the SEIR model but also lay the groundwork for advancing mathematical modeling in epidemiology. By bridging theoretical insights with practical implications, this study strives to empower researchers and policymakers with a deep understanding of infectious disease dynamics, thereby contributing to targeted public health strategies.
... We know t h a t the equilibrium points without infection are called disease-free equilibria [14,15]. Therefore, system (1) has a disease-free equilibrium at E°=(S,0,0,0,0,0,0) = (1,0,0,0,0), and the equilibrium point with an infection is called endemic equilibrium. ...
Preprint
This article presents an overview of vaccine effects and analyses a case study of the COVID-19 outbreaks and the effectiveness of vaccinations in Bangladesh. We have conceptually and numerically explored the model. We determined the reproduction number (R0) using the next-generation matrix methodology. We have evaluated the model's local stability for disease-free and endemic equilibria, determined by the basic reproduction number. We calculated sensitivity indices to examine the parameters' impact on the reproduction number. We present an SVIR model to simulate the impact of the vaccination process, solve it using the fourth-order Runge-Kutta technique, and validate our findings using fourth-order polynomial regression. The results suggest that the COVID-19 situation will improve if a significant proportion of individuals in Bangladesh are vaccinated (2 doses of the available vaccine). In the end, the numerical simulation provides a clear picture of the rising and falling tendency of this disease's spread in parallel with vaccination, as shown by the parameters in the mathematical model. From the perspective of Bangladesh, this study highlights the effect of the COVID-19 vaccine.
... Many studies [21][22][23][24][25][26][27][28][29][30][31][32] have looked into the current situation of the new coronavirus in various epidemiological areas. To solve the epidemic model SAEIQRS, Chakraborty [33] employed a compartmental model to develop a series of solutions based on the differential transformation method (DTM) (Susceptible-Antidotal-Exposed-Infected-Quarantined-Recovered-Susceptible). ...
Article
Full-text available
We look at the SQIRP mathematical model for new coronavirus transmission in Bangladesh and India in this study. The basic reproduction number of the SQIRP system is designed using the next cohort matrix process. The SQIRP system has asymptotically stable locally at an infection-free equilibrium point when the basic reproduction number is not more than unity and unsteady when the value is greater than unity. The SQIRP system is found to go through a backward bifurcation, which is a novel perspective for Coronavirus infection transmission. The infection-free equilibrium and endemic equilibrium are shown to be asymptotically stable globally using the Lyapunov function hypothesis and the invariance principle of Lasalle. An SQIRP system with backward bifurcation is explored using stochastic analysis. The ecological stochasticity in the appearance of white noise best describes the system's value. To verify the results, more numerical simulations are run.
... A theoretical study of the Stuxnet's malicious code behavior was conducted through the strength of epidemic modeling of virus spread [7][8][9]. The control scheme of these malicious codes is very challenging because they often hide, and may exploit zero-day vulnerabilities, gain administrative rights and execute code as an authenticated program. ...
Article
Full-text available
The designed fractional order Stuxnet, the virus model, is analyzed to investigate the spread of the virus in the regime of isolated industrial networks environment by bridging the air-gap between the traditional and the critical control network infrastructures. Removable storage devices are commonly used to exploit the vulnerability of individual nodes, as well as the associated networks, by transferring data and viruses in the isolated industrial control system. A mathematical model of an arbitrary order system is constructed and analyzed numerically to depict the control mechanism. A local and global stability analysis of the system is performed on the equilibrium points derived for the value of α = 1. To understand the depth of fractional model behavior, numerical simulations are carried out for the distinct order of the fractional derivative system, and the results show that fractional order models provide rich dynamics by means of fast transient and super-slow evolution of the model’s steady-state behavior, which are seldom perceived in integer-order counterparts.
... Substituting I = 0 into dA dt of model (6) gives A = 0 (refer to [1] and [17]). If ℜ 0 ≤ 1 , then L ′ ≤ 0 . ...
Article
Full-text available
Computer viruses have the potential to wreak havoc on domestic and industrial computer networks by targeting and deleting important operational programs. Antivirus software is normally installed to detect and remove viruses from infected network computers. In recent times, the compartmental model approach commonly utilized to describe the dynamics of spread for biological viruses in a population has been employed successfully to document the spread of computer viruses in a network. In this paper, we adopt a modified SIRA (Susceptible–Infected–Recovered–Antidotal) model to study the propagation of stealth viruses, and to investigate the impact of antivirus renewal on the dynamics of viral spread in a computer network. The virus-free and endemic equilibria are identified, and a stability analysis is performed on the system. The importance of key parameters on the dynamics of viral spread in the network is illustrated numerically.
Preprint
This file describes a model called SEQIRP model [8] which is a modifies SIR model and it has been proposed by Dr Pabel Shahrear, S. M. Saydur Rahman, Md Mahadi Hasan Nahid from Shahjalal University of Science and Technology, Bangladesh which uses some basic parameters of Covid-19 to predict the future of Covid 19 situation. We have used the data from 01 December 2021 to January 05, 2022, to predict the next peak point of Covid-19 in next 250 days from December 01, 2021. Here we calculated the Basic Reproduction Number R0 by using Next-generation matrix and to state the result from the model we have used MATLAB to simulate our analysis by using the fourth-order Runge-Kutta (RK4) method and validate the results using fourth order Polynomial Regression. Finally, we have got our prediction for Covid-19. After getting the result we have taken the data from April 01, 2021, to February 28, 2022, and do a Statistical analysis by using Descriptive Statistics and Histogram by using Microsoft Excel which will validate the accuracy of our model. We have analysis SEQIRP model [8] with newly available data and tried to predict the next wave of Covid 19 in Bangladesh and then we tried to validate the result with Statistical analysis to achieve the model's accuracy. Finally, we can claim the usefulness of the model in Bangladesh that, in future should we use the model to determine the wave of Covid 19 or not. This result of our model represents the effect of Covid 19 in Bangladesh.
Article
The Vx Works system can meet the requirements of real-time, multi-task scheduling and high software reliability, but because the system is protected and developed by the Wind River, this system is not suitable for national defense equipment, so it is necessary to develop other operating systems. According to the research of related software tasks and work requirements, select the appropriate software and hardware platform, carry out embedded development and strong real-time expansion of the Linux system, after debugging the Linux system, run and test the real-time function and network of the system Features. Matrix-assisted laser analysis and time-of-flight mass spectrometry are a new type of soft-ionized biological mass spectrometry that has developed rapidly in recent years, with the characteristics of high sensitivity, high precision and high resolution. Maldin-TF-Ms includes sampling system, matrix-assisted laser ion source analysis, time-of-flight mass analyzer and high-speed ion beam acquisition. The high-speed acquisition of the ion beam is divided into two parts: the ion detector system and the high-speed data acquisition system. The system completes the data collection, transmission, processing and analysis of the ion pulse signal output by the measuring instrument. The system is consistent with the understanding of Internet information security issues in this article, and hacker attacks caused by computer viruses and service attacks are analyzed. Now that we have understood the main problems of Internet information security, there are several methods to learn from, and through this method to create a complete Internet information environment.
Article
Full-text available
The aim of this paper is to apply the differential transformation method (DTM) to solve epidemic model SAEIQRS (Susceptible-Antidotal-Exposed-Infected-Quarantined-Recovered-Susceptible) for a given constant population. This mathematical model is described by nonlinear first order ordinary differential equations. First, we find the solution of this model by using the differential transformation method (DTM). In order to show the efficiency of the method, we compute the solution by using fourth-order Runge-Kutta method (RK4) and then compare the solutions obtained by DTM and RK4. We illustrated the profiles of the solutions, from which we speculate that the DTM and RK4 solutions agreed very well.
Article
Full-text available
This paper studies the fractional order model for computer virus in SEIR model. Firstly, the basic reproduction number R0, which determines the threshold of the spread of the virus is determined. The stability of equilibra was also determined and studied. The Adams-Bashforth-Moulton algorithm was employed to solve and simulate the system of differential equations. The results of the simulation depicts that by small change in α led to big change in the associated numerical results.
Article
Full-text available
In this paper, we present an SVIR epidemic model with non-linear saturated incidence rate. Initially the basic formulation of the model is presented. Two equilibrium point exists for the system; disease free and endemic equilibrium. The stability of the disease free and endemic equilibrium exists when the basic reproduction less or greater than unity, respectively. If the value of R0, less then one then the disease free equilibrium is locally as well as globally asymptotically stable, and if its exceeds, the endemic equilibrium is stable both locally and globally. The numerical results are presented for illustration.
Article
Full-text available
Modifications or extensions of the classical Susceptible-Infected-Recovered (SIR) model that account for a Quarantine (Q) class have shown to be capable of supporting recurrent, that is, periodic disease outbreaks. The fact that in such outbreaks a significant proportion of individuals escape symptomatic or experience mild infections has not been explored extensively. Motivated by our interests on the transmission dynamics and evolution of influenza A in human populations, we proceed to explore the role of an asymptomatic class (A) of individuals on the long-term transmission dynamics of influenza. We focus on a Susceptible-Asymptomatic-Infectious-Quarantine-Recovered (SAIQR) model that limits the interactions of Q-individuals and assumes that A-individuals are infectious, possibly not as infectious as those with clear symptoms. The analysis is carried out taking advantage of the significant time scale differences provided by the demographic and epidemic processes involved. It is shown that SAIQR models with vital dynamics (births and deaths) support recurrent outbreaks under reasonable disease or intervention periods. Further, we show that recurrence is possible within regions of parameter space that are consistent with influenza A transmission in human populations.
Article
In this paper, we investigate the dynamics and the global exponential stability of a new class of Hopfield neural network with time-varying and distributed delays. In fact, the properties of norms and the contraction principle are adjusted to ensure the existence as well as the uniqueness of the pseudo almost periodic solution, which is also its derivative pseudo almost periodic. This results are without resorting to the theory of exponential dichotomy. Furthermore, by employing the suitable Lyapunov function, some delay-independent sufficient conditions are derived for exponential convergence. The main originality lies in the fact that spaces considered in this paper generalize the notion of periodicity and almost periodicity. Lastly, two examples are given to demonstrate the validity of the proposed theoretical results.
Article
In this paper, an improved computer virus propagation model with user awareness is proposed and how its parameters are related to network characteristics is explained. Unlike other existing computer virus propagation models, we consider an important factor-user awareness. Furthermore, the stability and dynamics of the model are studied, and the simulation results show that the virus-free equilibrium and virus-endemic equilibrium are globally stable, whenever the population of network increases or decreases. Finally, the problem how to control the virus propagation is discussed, and we obtain that user awareness is closely related to the virus propagation.
Article
Internet worms, a great threat to the Internet infrastructure, can propagate horrendously through networks, and reduce network security and cause economic losses. In order to effectively defend against worms, this paper proposes a novel epidemic SVEIR model with partial immunization. In the SVEIR model, we obtain the basic reproduction number for determining whether the worm dies out completely. The global stabilities of infection-free equilibrium and endemic equilibrium are proven using a Lyapunov function and a geometrical approach. The impact of different parameters of this model is studied. Simulation results show that the number of susceptible and infected hosts is consistent with theoretical analysis. The model provides a theoretical foundation for control and forecasting Internet worms.
Article
This paper can be regarded as the continuation of the work of the authors contained in papers (2015). At the same time, it represents the extension of the paper Lou et al. (2007), the paper Sannay (2007) and the paper Acka et al. (2004). This work discusses a generalized model of high-order Hopfield-type neural networks with time-varying delays. By utilizing Lyapunov functional method and the linear inequality approach, some new stability criteria for such system are derived. The results are related to the size of delays and impulses. The exponential convergence rate of the equilibrium point is also estimated. Finally, we analyze and interpret four numerical examples proving the efficiency of our theoretical results and showing that impulse can be used to stabilize and exponentially stabilize some high-order Hopfield-type neural networks.
Article
In this paper, the problem of stability for a class of time-delay Hopfield neural networks with impulsive perturbation is investigated. The existence of a unique equilibrium point is proved by using the Arzelà-Ascoli's theorem and Rolle's theorem. Some sufficient stability criteria have proved that the uniform stability, the uniform asymptotic stability, the global asymptotic stability and the global exponential stability of the system, are derived from using the Lyapunov functional method and the linear matrix inequality approach by estimating the upper bound of the derivative of Lyapunov functional. The exponential convergence rate of the equilibrium point is also estimated. Finally, we analyse and interpret some numerical examples showing the efficiency of our theoretical results.
Article
In this paper, we present an analytical solution for different systems of differential equations by using the differential transformation method. The convergence of this method has been discussed with some examples which are presented to show the ability of the method for linear and non-linear systems of differential equations. We begin by showing how the differential transformation method applies to a non-linear system of differential equations and give two examples to illustrate the sufficiency of the method for linear and non-linear stiff systems of differential equations. The results obtained are in good agreement with the exact solution and Runge-Kutta method. These results show that the technique introduced here is accurate and easy to apply.