- Research
- Open access
- Published:

# Bifurcation analysis in a delayed computer virus model with the effect of external computers

*Advances in Difference Equations*
**volumeÂ 2015**, ArticleÂ number:Â 317 (2015)

## Abstract

A delayed Susceptible-Infected-External (SIE) computer virus propagation model is investigated in the present paper. The linear stability conditions are obtained with characteristic root method. The Hopf bifurcation is demonstrated. Furthermore, some explicit formulae for determining the stability and the direction of the Hopf bifurcation are derived by using the normal form theory and the center manifold theorem. Finally, numerical simulations are carried out to support the theoretical predictions.

## 1 Introduction

Computer viruses are major threats to Internet security, and they have led to huge economic losses [1â€“3]. Inspired by the compelling analogies between computer viruses and their biological counterparts, many scholars investigate computer viruses spreading on the Internet with epidemic models since the work by Kephart and White [4]. Wierman and Marchette *et al.* [5â€“7] proposed the classical SIR computer virus propagation model respectively based on the SIR epidemic model. Considering the feasibility of the loss of immunity for the recovered computers, Gan *et al.* [8] proposed an SIRS computer propagation model and studied the stability of the model. Yuan *et al.* [9â€“11] studied the dynamics of the SEIR computer virus propagation model based on the fact that some viruses may purposely lay dormant for a period of time prior to infecting other computers for stealth reasons. However, the SEIR model assumes that the recovered computers have a permanent immunization period with a certain probability which is not consistent with real situation. Based on this, Mishra *et al.* [12, 13] presented the SEIRS computer virus propagation model. In [14], Mishra and Jia paid attention to the combination of computer virus propagation model and quarantine to study the prevalence of the viruses and proposed the SEIQRS model for the transmission of malicious objects in computer network. However, all the above computer virus models focused on the internal computers and neglected the effect of the external computers on virus spread. In order to study the effect of the external computers on virus spread, Chen *et al.* [15] proposed the following computer virus model under the influence of external computers:

where \(S(t)\), \(I(t)\) and \(E(t)\) denote the numbers of the susceptible computers, the infected computers and external computers, respectively. *Î´* is the rate at which each computer dies out; *Îµ*is the birth rate of external computers; \(\alpha_{1} \), \(\alpha_{2}\),\(\gamma_{1}\), \(\gamma_{2} \) and *Î·* are the states transmission rates. Chen *et al.* [15] studied the global stability of virus-free and viral equilibrium of system (1).

As stated in [9], some viruses may purposely lay dormant for a period of time prior to infecting other computers for stealth reasons, it may be more realistic to assume that the susceptible computers are infected at time \(t-\tau\) and then these infected computers have infection ability at time *t*. Therefore, we incorporate the latent period delay of the computer viruses into system (1) and get the following computer virus model with time delay:

where *Ï„* is the latent period delay of the computer viruses. The main purpose of this paper is to investigate the effect of the latent period delay on system (2), especially the Hopf bifurcation caused by the delay. It is well known that the time delay can have important influence on a dynamical system, and dynamical systems with time delay have been investigated extensively in recent years [10, 13, 16â€“19].

The organization of this paper is as follows. Section 2 considers stability of the positive equilibrium and existence of the Hopf bifurcation. Section 3 is devoted to the properties of the Hopf bifurcation. Some numerical simulations are carried out to verify the theoretical results in Section 4, and this work is summarized in Section 5.

## 2 Stability of the positive equilibrium and existence of Hopf bifurcation

By a direct computation, we can get that if

system (2) has a unique positive equilibrium \(E_{\ast}(S_{\ast}, I_{\ast}, E_{\ast})\), where

where

and

When \(\tau=0\), Eq. (3) becomes

Based on the expressions of \(A_{2}\), \(B_{2} \) and \(a_{1}\), \(a_{4}\), \(a_{7}\), \(b_{1}\), \(b_{4} \), we can get

Therefore if the condition (H_{1}) \((A_{2} +B_{2} )(A_{1} +B_{1} )>A_{0} +B_{0} >0\) holds, then system (2) is locally asymptotically stable when\(\tau=0\).

For \(\tau>0\), let \(\lambda=i\omega\) (\(\omega>0\)) be the root of Eq. (3), then

Then we get

where

Let \(\omega^{2}=v\), then Eq. (5) can be transformed into the following form:

Next, we assume that (H_{2}) Eq. (6) has at least one positive root.

If the condition (H_{1}) holds, then there exists one positive root \(v_{0}\) of Eq. (6) such that Eq. (3) has a pair of purely imaginary roots \(\pm i\omega _{0} =\pm i\sqrt{v_{0}}\).

Taking derivation on both sides of Eq. (3), we obtain

Thus, we can get

where \(f(v)=v^{3}+c_{2} v^{2}+c_{1} v+c_{0} \) and \(v_{0} =\omega_{0}^{2}\).

It is clear that if the condition (H_{3}) \(f'({v_{0}})\ne0\) holds, then \(\operatorname{Re} [{\frac{d\lambda}{d\tau}} ]_{\tau=\tau_{0} }^{-1}\ne0\). Therefore, according to the Hopf bifurcation theorem in [20], we have the following results.

### Theorem 1

*For system* (2), *we assume that the conditions* (H_{1})-(H_{3}) *hold for the parameters*. *Then the positive equilibrium*
\(E_{\ast}(S_{\ast}, I_{\ast}, E_{\ast})\)
*is asymptotically stable for*
\(\tau\in[0, \tau_{0} )\)
*and the positive equilibrium*
\(E_{\ast}(S_{\ast}, I_{\ast}, E_{\ast})\)
*becomes unstable for*
*Ï„*
*staying in some right neighborhood of*
\(\tau_{0} \), *with a Hopf bifurcation occurring when*
\(\tau =\tau_{0}\).

## 3 Direction and stability of the Hopf bifurcation

In this section, we shall obtain the explicit formulae for determining the direction, stability and period of these periodic solutions bifurcating from the positive equilibrium \(E_{\ast}(S_{\ast},I_{\ast},E_{\ast})\) of system (2) at the critical value \(\tau_{0} \). For convenience, let \(\tau=\tau_{0} +\upsilon\), \(\upsilon\in R\). Then \(\upsilon=0\) is the Hopf bifurcation value of system (2).

Let \(u_{1}=S(\tau t)\), \(u_{2}=I(\tau t)\), \(u_{3}=E(\tau t)\). Then system (2) is transformed into a functional differential equation in \(C=C([-1,0], R^{3})\) as

where \(u_{t} =(S(t),I(t),E(t))^{T}\in R^{3}\) and \(L_{\upsilon}: C\to R\), \(F: R\times C\to R\) are given respectively by

where

and

Clearly, \(L_{\upsilon}\) is a linear continuous operator from \(C=C([-1, 0], R^{3})\) to \(R^{3}\). By the Riesz representation theorem, there exists a matrix function with bounded variation components \(\eta(\theta,\upsilon)\), \(\theta \in [-1,0]\) such that

In fact we can choose

where \(\delta(\theta)\) is the Dirac delta function.

For \(\varphi\in C([-1,0],R^{3})\), we define

and

Then system (7) is equivalent to the abstract differential equation

where \(u_{t} =u(t+\theta)\) for \(\theta\in[-1,0]\).

For \(\phi\in C([-1,0],(R^{3})^{\ast})\), define

For \(\varphi\in C([-1,0],R^{3})\) and \(\phi\in C([-1,0],(R^{3})^{\ast})\), define the bilinear form

where \(\eta(\theta)=\eta(\theta,0)\).

Thus, we can conclude that \(A(0)\) and *A*âˆ— are adjoint operators. Let \(q(\theta)=(1, q_{2}, q_{3} )^{T} e^{i\omega_{0}\tau_{0}\theta}\) be the eigenvector of \(A(0)\) corresponding to the eigenvalue \(+i\omega_{0} \tau_{0} \) and \(q^{\ast}(s)=D(1, q_{2}^{\ast}, q_{3}^{\ast})e^{i\omega_{0}\tau_{0}s}\) be the eigenvector of \(A^{\ast}\) corresponding to the eigenvalue \(-i\omega_{0}\tau_{0} \). Namely, \(A(0)q(\theta)=i\omega_{0}\tau_{0}q(\theta)\) and \(A^{\ast}q^{\ast^{T}}(s)=-i\omega_{0}\tau_{0}q^{\ast^{T}}(s)\). From the definitions of \(A(0)\) and *A*âˆ—, we can obtain

From Eq. (9), we can obtain

Then we can choose

such that

Next, we use the same notations as those in Hassard *et al.* [20], and we first compute the coordinates to describe the center manifold \(C_{0}\) at \(\upsilon=0\). Let \(x_{t}\) be the solution of Eq. (8) when \(\upsilon=0\). Define

on the center manifold \(C_{0}\), and we have

where

and *z* and *zÌ„* are local coordinates for center manifold \(C_{0}\) in the direction of \(q^{*}\) and \(\bar{q}^{*}\). Note that *W* is real if \(x_{t}\) is real, we only deal with real solutions. For the solutions \(x_{t}\) of Eq. (8),

That is,

where

Hence, we have

where

Since

and

we have

From Eq. (15) and Eq. (16), we have

where

Thus, we have

Comparing the coefficients in Eq. (15) and Eq. (17), we can get

with

where \(E_{1} \) and \(E_{2} \) can be determined by the following equations respectively:

with

Then we can get the following coefficients:

### Theorem 2

*For system* (2), *we assume that the conditions* (H_{1})-(H_{3}) *hold for the parameters*. *Then*, *if*
\(\mu_{2} >0\) (\(\mu_{2} <0\)), *then the Hopf bifurcation is supercritical* (*subcritical*); *if*
\(\beta_{2}<0\) (\(\beta_{2} >0\)), *then the bifurcating periodic solutions are stable* (*unstable*); *if*
\(T_{2}>0\) (\(T_{2}<0\)), *then the bifurcating periodic solutions increase* (*decrease*).

## 4 Numerical simulation

In this section, we present a numerical example to validate the feasibility of the theoretical result obtained above. By extracting some values from [15] and considering the conditions for the existence of the Hopf bifurcation, we choose a set of parameters as follows: \(\alpha_{1}=0.2\), \(\alpha_{2}=0.3\), \(\gamma_{1}=0.1\), \(\gamma_{2}=0.4\), \(\eta=0.1\), \(\delta =0.12\) and \(\varepsilon=6\). Then system (2) becomes

By Matlab 7.0, we get \(R_{0}=5.2029>1\) and the positive equilibrium \(E_{\ast}(6.2000, 22.4389, 21.3611)\) of system (19). Then we have \(A_{0}+B_{0}=0.0520>0\), \(A_{1}+B_{1}=0.5023>0\), \(A_{2}+B_{2}=1.9439>0\) and \((A_{2}+B_{2})(A_{1}+B_{1})=0.9764>A_{0}+B_{0}=0.0520>0\). That is, the condition (H_{1}) holds. Further, we get only one critical value of the time delay \(\tau_{0}=1.1598\), \(\omega_{0}=2.0232\) and \(f'(v_{0})=0.0081>0\). That is, the conditions (H_{2}) and (H_{3}) hold. Therefore, according to Theorem 1, we can conclude that \(E_{\ast}(6.2000, 22.4389, 21.3611)\) is locally asymptotically stable when \(\tau\in[0, \tau _{0} )\). As can be seen from Figures 1-4, \(E_{\ast}(6.2000, 22.4389, 21.3611)\) is locally asymptotically stable when \(\tau=1.05<\tau_{0}\). When the value of the delay passes through the critical value \(\tau _{0} \), a Hopf bifurcation occurs and a family of periodic solutions bifurcate from \(E_{\ast}(6.2000, 22.4389, 21.3611)\), which can be shown by Figures 5-8. As shown in Figures 5-8, we choose \(\tau=1.65>\tau_{0}\), \(E_{\ast}(6.2000, 22.4389, 21.3611)\) become unstable and a Hopf bifurcation occurs. The Hopf bifurcation phenomenon can be also illustrated by the bifurcation diagram with respect to *Ï„* in Figure 9. Numerical simulations show that we should try to shorten the delay as much as possible so that we can control the computer viruses propagation effectively.

## 5 Conclusions

Considering that some computer viruses may purposely lay dormant for a period of time prior to infecting other computers, we incorporate the latent period delay of the computer viruses into the model considered in the literature [15] and propose a delayed SIE computer virus propagation model in this paper. Compared with the work in [15], we mainly consider the effect of the latent period delay on system (2). It is shown that the latent period delay plays an important role on the stability of system (2). When \(\tau <\tau_{0} \), system (2) is locally asymptotically stable and the characteristics of computer viruses propagation can be easily predicted and eliminated. However, when \(\tau\ge\tau_{0} \), a Hopf bifurcation occurs and the computer viruses propagation is unstable and may be out of control. Furthermore, the properties of the Hopf bifurcation are investigated by using the normal form theory and the center manifold theorem. It should be pointed out that the assumptions for the parameters of system (2) in this paper are only technical and we do not take the specific meanings of them into account. Namely, our study is restricted only to the theoretical analysis of the Hopf bifurcation phenomena of system (2). It may be helpful for field investigation or experimental studies on the propagation of computer viruses in networks. In addition, the other behaviors of system (2) out of the assumptions on the parameters have been disregarded. We leave these as our future work.

## References

Yuan, H, Chen, G, Wu, J, Xiong, H: Towards controlling virus propagation in information systems with point-to-group information sharing. Decis. Support Syst.

**48**(1), 57-68 (2009)Luiijf, E: Understanding cyber threats and vulnerabilities. Lect. Notes Comput. Sci.

**7130**(1), 52-67 (2012)Huang, CY, Lee, CL, Wen, TH, Sun, CT: A computer virus spreading model based on resource limitations and interaction costs. J. Syst. Softw.

**86**(3), 801-808 (2013)Kephart, JO, White, SR: Directed-graph epidemiological models of computer viruses. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp.Â 343-359 (1991)

Wierman, JC, Marchette, DJ: Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction. Comput. Stat. Data Anal.

**45**(1), 3-23 (2004)Piqueira, JRC, Araujo, VO: A modified epidemiological model for computer viruses. Appl. Math. Comput.

**213**(2), 355-360 (2009)Ren, JG, Yang, XF, Zhu, QY, Yang, LX, Zhang, CM: A novel computer virus model and its dynamics. Nonlinear Anal., Real World Appl.

**13**(1), 376-384 (2012)Gan, CQ, Yang, XF, Liu, WP, Zhu, QY, Zhang, XL: Propagation of computer virus under human intervention: a dynamical model. Discrete Dyn. Nat. Soc.

**2012**, Article ID 106950 (2012)Yuan, H, Chen, GQ: Network virus-epidemic model with the point-to-group information propagation. Appl. Math. Comput.

**206**(1), 357-367 (2008)Dong, T, Liao, XF, Li, HQ: Stability and Hopf bifurcation in a computer virus model with multistate antivirus. Abstr. Appl. Anal.

**2012**, Article ID 841987 (2012)Zhang, CM, Zhao, Y, Wu, YJ, Deng, SW: A stochastic dynamic model of computer viruses. Discrete Dyn. Nat. Soc.

**2012**, Article ID 264874 (2012)Mishra, BK, Pandey, SK: Dynamics model of worms with vertical transmission in computer network. Appl. Math. Comput.

**217**(21), 8438-8446 (2011)Mishra, BK, Saini, DK: SEIRS epidemic model with delay for transmission of malicious objects in computer network. Appl. Math. Comput.

**188**(2), 1476-1482 (2007)Mishra, BK, Jia, N: SEIQRS model for the transmission of malicious objects in computer network. Appl. Math. Model.

**34**(3), 710-715 (2010)Chen, JY, Yang, XF, Gan, CQ: Propagation of computer virus under the influence of external computers: a dynamical model. J. Inf. Comput. Sci.

**10**(16), 5275-5282 (2013)Bianca, C, Guerrini, L: On the Dalgaard-Strulik model with logistic population growth rate and delayed-carrying capacity. Acta Appl. Math.

**128**(1), 39-48 (2013)Bianca, C, Guerrini, L, Riposoj, J: A delayed mathematical model for the acute inflammatory response to infection. Appl. Math. Inf. Sci.

**9**(6), 2775-2782 (2015)Xu, CJ, He, XF: Stability and bifurcation analysis in a class of two-neuron networks with resonant bilinear terms. Abstr. Appl. Anal.

**2011**, Article ID 697630 (2011)Bianca, C, Guerrini, L: Hopf bifurcations in a delayed microscopic model of credit risk contagion. Appl. Math. Inf. Sci.

**9**(3), 1493-1497 (2015)Hassard, BD, Kazarinoff, ND, Wan, YH: Theory and Applications of Hopf Bifurcation. Cambridge University Press, Cambridge (1981)

## Acknowledgements

The authors would like to thank the editor and the anonymous referees for their work on the paper. This work was supported by the Natural Science Foundation of Higher Education Institutions of Anhui Province (KJ2014A005, KJ2014A006).

## Author information

### Authors and Affiliations

### Corresponding author

## Additional information

### Competing interests

The authors declare that they have no competing interests.

### Authorsâ€™ contributions

All authors contributed equally to the writing of this paper. All authors read and approved the final manuscript.

## Rights and permissions

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## About this article

### Cite this article

Zhang, Z., Bi, D. Bifurcation analysis in a delayed computer virus model with the effect of external computers.
*Adv Differ Equ* **2015**, 317 (2015). https://doi.org/10.1186/s13662-015-0652-y

Received:

Accepted:

Published:

DOI: https://doi.org/10.1186/s13662-015-0652-y