Dynamical behavior of computer virus on internet. (English) Zbl 1209.68139

Summary: We presented a computer virus model using an SIRS model and the threshold value \(R_{0}\) determining whether the disease dies out is obtained. If \(R_{0}\) is less than one, the disease-free equilibrium is globally asymptotically stable. By using the time delay as a bifurcation parameter, the local stability and Hopf bifurcation for the endemic state is investigated. Numerical results demonstrate that the system has periodic solution when time delay is larger than a critical values. The obtained results may provide some new insight to prevent the computer virus.


68N99 Theory of software
68M11 Internet topics
Full Text: DOI


[1] Aron, J.L.; O’Leary, M.; Gove, R.A.; Azadegan, S.; Schneider, M.C., The benefits of a notification process in addressing the worsening computer virus problem: results of a survey and a simulation model, Computers and security, 21, 142-163, (2002)
[2] Billings, L.; Spears, W.M.; Schwartz, I.B., A unified prediction of computer virus spread in connected networks, Physics letters A, 297, 261-266, (2002) · Zbl 0995.68007
[3] Bissett, A., Some human dimensions of computer virus creation and infection, International journal of human-computer studies, 52, 899-913, (2000)
[4] Cohen, F., Computer viruses: theory and experiments, Computers and security, 6, 22-35, (1987)
[5] Goldberg, L.A.; Goldberg, P.W.; Phillips, C.A.; Sorkin, G.B., Constructing computer virus phylogenies, Journal of algorithms, 26, 188-208, (1998) · Zbl 0891.68045
[6] Jiang, Guirong; Yang, Qigui, Bifurcation analysis in an SIR epidemic model with birth pulse and pulse vaccination, Applied mathematics and computation, 215, 1035-1046, (2009) · Zbl 1172.92031
[7] Kafai, Y.B., Understanding virtual epidemics: children’s folk conceptions of a computer virus, Journal of science education and technology, 6, 523-529, (2009)
[8] J. Kephart, S. White, Directed-graph epidemiological models of computer viruses, in: 1991 IEEE Symposium on Security and Privacy, 1991, pp. 343-359.
[9] J. Kephart, S. White, Measuring and modeling computer virus prevalence, in: 1993 IEEE Symposium on Security and Privacy, 1993, pp. 2-15.
[10] J.O. Kephart, S.R. White, Measuring and modeling computer virus prevalence, in: 1993 IEEE Computer Society Symposium On Research In Security and Privacy: Proceedings, 1993, pp. 2-15.
[11] Kuang, Y., Delay differential equations with applications in population dynamics, Mathematics in science and engineering, vol. 191, (1993), Academic Press Boston, Mass, USA · Zbl 0777.34002
[12] Li, T., Dynamic detection for computer virus based on immune system, Science in China series F-information sciences, 51, 1475-1486, (2008) · Zbl 1210.94091
[13] Makinen, E., Comment on ‘A framework for modelling trojans and computer virus infection’, Computer journal, 44, 321-323, (2004) · Zbl 1051.68539
[14] Mishra, B.; Jha, N., Fixed period of temporary immunity after run of anti-malicious software on computer nodes, Applied mathematics and computation, 190, 1207-1212, (2007) · Zbl 1117.92052
[15] Nachenberg, C., Computer virus-coevolution, Communications of the ACM, 40, 46-51, (1997)
[16] Perdisci, R.; Lanzi, A.; Lee, W., Classification of packed executables for accurate computer virus detection, Pattern recognition letters, 29, 1941-1946, (2008)
[17] Sawyer, J.E.; Kernan, M.C.; Conlon, D.E.; Garland, H., Responses to the michelangelo computer virus threat: the role of information sources and risk homeostasis theory, Journal of applied social psychology, 29, 23-51, (1999)
[18] Shi, Ruiqing; Jiang, Xiaowu; Chen, Lansun, The effect of impulsive vaccination on an SIR epidemic model, Applied mathematics and computation, 212, 305-311, (2009) · Zbl 1186.92040
[19] Stroud, Phillip D.; Sydoriak, Stephen J.; Riese, Jane M.; Smith, James P.; Mniszewski, Susan M.; Romero, Phillip R., Semi-empirical power-law scaling of new infection rate to model epidemic dynamics with inhomogeneous mixing, Mathematical biosciences, 203, 301-318, (2006) · Zbl 1101.92045
[20] Thimbleby, H.; Anderson, S.; Cairns, P., A framework for modelling trojans and computer virus infection, Computer journal, 41, 444-458, (1998) · Zbl 0929.68017
[21] Wierman, J.C.; Marchette, D.J., Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction, Computational statistics and data analysis, 45, 3-23, (2004) · Zbl 1429.68037
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.