Piqueira, José Roberto C.; Araujo, Vanessa O. A modified epidemiological model for computer viruses. (English) Zbl 1185.68133 Appl. Math. Comput. 213, No. 2, 355-360 (2009). Summary: Since the computer viruses pose a serious problem to individual and corporative computer systems, a lot of effort has been dedicated to study how to avoid their deleterious actions, trying to create anti-virus programs acting as vaccines in personal computers or in strategic network nodes. Another way to combat viruses propagation is to establish preventive policies based on the whole operation of a system that can be modeled with population models, similar to those that are used in epidemiological studies. Here, a modified version of the SIR (Susceptible-Infected-Removed) model is presented and how its parameters are related to network characteristics is explained. Then, disease-free and endemic equilibrium points are calculated, stability and bifurcation conditions are derived and some numerical simulations are shown. The relations among the model parameters in the several bifurcation conditions allow a network design minimizing viruses risks. Cited in 2 ReviewsCited in 89 Documents MSC: 68M99 Computer system organization 68N99 Theory of software 92D30 Epidemiology Keywords:bifurcation; disease-free; endemic; equilibrium; SIR; stability PDF BibTeX XML Cite \textit{J. R. C. Piqueira} and \textit{V. O. Araujo}, Appl. Math. Comput. 213, No. 2, 355--360 (2009; Zbl 1185.68133) Full Text: DOI References: [1] Denning, P. J., Computers Under Attack (1990), Addison-Wesley: Addison-Wesley Reading, Mass [3] Cohen, F., A short course of computer viruses, Computer and Security, 8, 149-160 (1990) [4] Forrest, S.; Hofmayer, S. A.; Somayaj, A., Computer immunology, Communications of the ACM, 40, 10, 88-96 (1997) [5] Piqueira, J. R.C.; Navarro, B. F.; Monteiro, L. H.A., Epidemiological models applied to viruses in computer networks, Journal of Computer Science, 1, 1, 31-34 (2005) [6] Kephart, J. O.; Hogg, T.; Huberman, B. A., Dynamics of computational ecosystems, Physical Review A, 40, 1, 404-421 (1989) [7] Kephart, J. O.; White, S. R.; Chess, D. M., Computers and epidemiology, IEEE Spectrum, 20-26 (1993) [9] Piqueira, J. R.C.; Cesar, F. B., Dynamical models for computer viruses propagation, Mathematical Problems in Engineering (2008), (ID 940526) · Zbl 1189.68036 [10] Billings, L.; Spears, W. M.; Schartz, I. B., A unified prediction of computer virus spread in connected networks, Physics Letters A, 297, 261-266 (2002) · Zbl 0995.68007 [11] Newman, M. E.J.; Forrest, S.; Balthrop, J., Email networks and the spread of computer viruses, Physical Review E, 66, 035101-1-035101-4 (2002) [12] Mishra, B. K.; Saini, D., Mathematical models on computer viruses, Applied Mathematics and Computation, 187, 2, 929-936 (2007) · Zbl 1120.68041 [13] Mishra, B. K.; Jha, N., Fixed period of temporary immunity after run of the anti-malicious software on computer nodes, Applied Mathematics and Computation, 190, 1207-1212 (2007) · Zbl 1117.92052 [14] Draief, M.; Ganesh, A.; Massouili, L., Thresholds for virus spread on networks, Annals of Applied Probability, 18, 2, 359-378 (2008) · Zbl 1137.60051 [15] Piqueira, J. R.C.; de Vasconcelos, A. A.; Gabriel, C. E.C. J.; Araujo, V. O., Dynamic models for computer viruses, Computers & Security, 27, 7-8, 355-359 (2008) [16] Murray, J. D., Mathematical Biology (2002), Springer: Springer New York [17] Guckenheimer, J.; Holmes, P., Nonlinear Oscillations, Dynamical Systems and Bifurcation of Vector Fields (1983), Springer: Springer New York · Zbl 0515.34001 [18] Ogata, K., Modern Control Engineering (1997), Prentice Hall: Prentice Hall New Jersey [19] Moler, C. B., Numerical Computing with MATLAB (2004), SIAM: SIAM Philadelphia · Zbl 1059.68162 This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.