×

Stability analysis of a virulent code in a network of computers. (English) Zbl 1524.68016

Summary: Network of computers are vulnerable to attack by virulent codes which can halt an organization’s activities and in the process resulting in loss of revenue. The need to understand their dynamics if utmost importance and hence there is a need to develop mathematical models. These models will help us understand the impact these virulent codes have on the network of computers. In this article, we develop and solve numerically a mathematical model which can be used to understand the dynamics of a virulent code in a network of computers. This model is called the Immune, susceptible, exposed, infectious, quarantine, and recovered (MSEIQR). The model is solved using a very robust spectral method called the piecewise pseudospectral relaxation method (PPRM). PPRM accuracy is validated by comparing the results with the standard Runge-Kutta method. Stability analysis is also performed on the modified MSEIQR model for malicious code. Results generated are in agreement with the stability analysis performed. Results showing effect of crucial parameters in the dynamics of the model are presented in graphical form.

MSC:

68M10 Network design and communication in computer systems
34C60 Qualitative investigation and simulation of ordinary differential equation models
34D20 Stability of solutions to ordinary differential equations
68M25 Computer security

Software:

Matlab
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Billings, L.; Spears, W. M.; Schwartz, I. B., A unified prediction of computer virus spread in connected networks, Phys. Lett. A, 297, 3-4, 261-266 (2002) · Zbl 0995.68007
[2] Carr, J., Applications of Center Manifold Theory (1981), Springer-Verlag: Springer-Verlag New York · Zbl 0464.58001
[3] Castillo-Chavez, C.; Song, B., Dynamical models of tuberculosis and their applications, Math. Biosci. Eng., 1, 361-404 (2004) · Zbl 1060.92041
[4] Cheruvu, S.; Kumar, A.; Smith, N.; Wheeler, D. M., Demystifying Internet of Things Security (2020), Springer Nature
[5] Cohen, Fred, Computer viruses: theory and experiments, Comput. Secur., 6, 1, 22-35 (1987)
[6] Cohen, Frederick B.; Cohen, Frederick, A Short Course on Computer Viruses (1994), John Wiley & Sons, Inc. · Zbl 0821.68037
[7] Gan, C.; Yang, X.; Liu, W.; Zhu, Q., A propagation model of computer virus with nonlinear vaccination probability, Commun. Nonlinear Sci. Numer. Simul., 19, 1, 92-100 (2014)
[8] Gan, C.; Yang, X.; Liu, W.; Zhu, Q.; Zhang, X., Propagation of computer virus under human intervention: A dynamical model, Discrete Dyn. Nat. Soc., 2012, 8 (2012) · Zbl 1248.68074
[9] Gan, C.; Yang, X.; Liu, W.; Zhu, Q.; Zhang, X., An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate, Appl. Math. Comput., 222, 1, 265-274 (2013) · Zbl 1346.68031
[10] Hu, Xin, SEIQRS information diffusion model with the change of nodes, DEStech Trans. Comput. Sci. Eng. Cimns (2017)
[11] Kayes, Imrul; Iamnitchi, Adriana, Privacy and security in online social networks: A survey, Online Soc. Netw. Med., 3-4, 1-21 (2017)
[12] J.O. Kephart, S.R. White, Directed-graph epidemiological models of computer viruses, in: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, 1991, pp. 343-359.
[13] Kephart, Jeffrey O.; White, Steve R., Directed-graph epidemiological models of computer viruses, Comput Micro Macro View, 71-102 (1992)
[14] LaSalle, J. P., The stability of dynamical systems, (Regional Conference Series in Applied Mathematics (1976), SIAM: SIAM Philedelphia) · Zbl 0364.93002
[15] Malinzi, Joseph; Eladdadi, Amina; Sibanda, Precious, Modelling the spatiotemporal dynamics of chemovirotherapy cancer treatment, J. Biol. Dyn., 11, 1, 244-274 (2017) · Zbl 1447.92200
[16] Marino, S.; Hogue, I. B.; Ray, C. J.; Kirschner, D. E., A methodology for performing global uncertainty and sensitivity analysis in systems biology, J. Theoret. Biol., 254, 178-196 (2008) · Zbl 1400.92013
[17] McCluskey, C. C., Lyapunov functions for tuberculosis models with fast and slow progression, Math. Biosci. Eng., 3, 603-614 (2006) · Zbl 1113.92057
[18] Mishra, Bimal Kumar; Jha, Navnit, SEIQRS model for the transmission of malicious objects in computer network, Appl. Math. Model., 34, 3, 710-715 (2010) · Zbl 1185.68042
[19] Murray, William Hugh, The application of epidemiology to computer viruses, Comput. Secur., 7, 2, 139-145 (1988)
[20] Piqueira, José Roberto C.; Araujo, Vanessa O., A modified epidemiological model for computer viruses, Appl. Math. Comput., 213, 2, 355-360 (2009) · Zbl 1185.68133
[21] Qaisar, Badshah, Global stability of SEIQRS computer virus propagation model with non-linear incidence function, Appl. Math., 6, 11, 1926 (2015)
[22] Ren, J.; Yang, X.; Zhu, Q.; Yang, L. X.; Zhang, C., A novel computer virus model and its dynamics, Nonliear Anal. RWA, 13, 1, 376-384 (2012) · Zbl 1238.34076
[23] Saxena, U.; Sodhi, J. S.; Tanwar, R., Augmenting smart home network security using blockchain technology, Int. J. Electron. Secur. Dig. Forens., 12, 99-117 (2020)
[24] Asep K. Supriatna, Determining the Important Parameters of Mathematical Models of the Propagation of Malware, in: International Symposium of Information and Internet Technology, SYMINTECH 2018, 2019.
[25] Peter S. Tippett, The kinetics of computer virus replication: a theory and preliminary survey, in: Safe Computing: Proceedings of the Fourth Annual Computer Virus and Security Conference, 1991.
[26] Trefethen, L. N., Spectral Methods in MATLAB (2000), SIAM · Zbl 0953.68643
[27] van de Driessche, P.; Watmough, J., Reproduction number and sub-threshold endemic equilibria for compartmental models of disease transmission, Math. Biosci., 180, 29-48 (2002) · Zbl 1015.92036
[28] Wang, Fangwei, Stability analysis of a SEIQRS model with graded infection rates for internet worms, J. Comput. Phys., 9, 10, 2420-2427 (2014)
[29] Zhu, Q.; Yang, X.; Ren, J., Modeling and analysis of the spread of computer virus, Commun. Nonlinear Sci. Numer. Simul., 17, 12, 5117-5124 (2012) · Zbl 1261.93012
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.