A modified epidemiological model for computer viruses.

*(English)*Zbl 1185.68133Summary: Since the computer viruses pose a serious problem to individual and corporative computer systems, a lot of effort has been dedicated to study how to avoid their deleterious actions, trying to create anti-virus programs acting as vaccines in personal computers or in strategic network nodes. Another way to combat viruses propagation is to establish preventive policies based on the whole operation of a system that can be modeled with population models, similar to those that are used in epidemiological studies. Here, a modified version of the SIR (Susceptible-Infected-Removed) model is presented and how its parameters are related to network characteristics is explained. Then, disease-free and endemic equilibrium points are calculated, stability and bifurcation conditions are derived and some numerical simulations are shown. The relations among the model parameters in the several bifurcation conditions allow a network design minimizing viruses risks.

PDF
BibTeX
XML
Cite

\textit{J. R. C. Piqueira} and \textit{V. O. Araujo}, Appl. Math. Comput. 213, No. 2, 355--360 (2009; Zbl 1185.68133)

Full Text:
DOI

##### References:

[1] | Denning, P.J., Computers under attack, (1990), Addison-Wesley Reading, Mass |

[2] | P.S. Tippett, The kinetics of computer viruses replication: A theory and preliminary survey, in: Safe Computing: Proceedings of the Fourth Annual Computer Virus and Security Conference, New York, March 1991, pp. 66-87. |

[3] | Cohen, F., A short course of computer viruses, Computer and security, 8, 149-160, (1990) |

[4] | Forrest, S.; Hofmayer, S.A.; Somayaj, A., Computer immunology, Communications of the ACM, 40, 10, 88-96, (1997) |

[5] | Piqueira, J.R.C.; Navarro, B.F.; Monteiro, L.H.A., Epidemiological models applied to viruses in computer networks, Journal of computer science, 1, 1, 31-34, (2005) |

[6] | Kephart, J.O.; Hogg, T.; Huberman, B.A., Dynamics of computational ecosystems, Physical review A, 40, 1, 404-421, (1989) |

[7] | Kephart, J.O.; White, S.R.; Chess, D.M., Computers and epidemiology, IEEE spectrum, 20-26, (1993) |

[8] | J.O. Kephart, G.B. Sorkin, M. Swimmer, An immune system for cyberspace, in: Proceedings of the IEEE International Conference on Systems, Men, and Cybernetics, Orlando, CA, October 1997, pp. 879-884. |

[9] | Piqueira, J.R.C.; Cesar, F.B., Dynamical models for computer viruses propagation, Mathematical problems in engineering, (2008), (ID 940526) · Zbl 1189.68036 |

[10] | Billings, L.; Spears, W.M.; Schartz, I.B., A unified prediction of computer virus spread in connected networks, Physics letters A, 297, 261-266, (2002) · Zbl 0995.68007 |

[11] | Newman, M.E.J.; Forrest, S.; Balthrop, J., Email networks and the spread of computer viruses, Physical review E, 66, 035101-1-035101-4, (2002) |

[12] | Mishra, B.K.; Saini, D., Mathematical models on computer viruses, Applied mathematics and computation, 187, 2, 929-936, (2007) · Zbl 1120.68041 |

[13] | Mishra, B.K.; Jha, N., Fixed period of temporary immunity after run of the anti-malicious software on computer nodes, Applied mathematics and computation, 190, 1207-1212, (2007) · Zbl 1117.92052 |

[14] | Draief, M.; Ganesh, A.; Massouili, L., Thresholds for virus spread on networks, Annals of applied probability, 18, 2, 359-378, (2008) · Zbl 1137.60051 |

[15] | Piqueira, J.R.C.; de Vasconcelos, A.A.; Gabriel, C.E.C.J.; Araujo, V.O., Dynamic models for computer viruses, Computers & security, 27, 7-8, 355-359, (2008) |

[16] | Murray, J.D., Mathematical biology, (2002), Springer New York |

[17] | Guckenheimer, J.; Holmes, P., Nonlinear oscillations, dynamical systems and bifurcation of vector fields, (1983), Springer New York · Zbl 0515.34001 |

[18] | Ogata, K., Modern control engineering, (1997), Prentice Hall New Jersey |

[19] | Moler, C.B., Numerical computing with MATLAB, (2004), SIAM Philadelphia · Zbl 1059.68162 |

This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.