- Research
- Open access
- Published:

# A dynamic model of viruses with the effect of removable media on a computer network with heterogeneous immunity

*Advances in Difference Equations*
**volumeÂ 2020**, ArticleÂ number:Â 260 (2020)

## Abstract

In this paper, we build a mathematical model to study the impact of external removable devices on a network with weakly- and strongly-protected computers. The model describes the dynamics between weak, strong, infected computers and susceptible, infected removable media. Analytical investigations of the model produce two equilibrium points: virus-free and endemic. Moreover, we investigate the local and global stability of both equilibria. The existence and stability conditions of the equilibrium points depend primarily on the basic reproduction number (\(R_{0}\)) of the model. Furthermore, we perform numerical simulations to substantiate the analytical results. Also, a sensitivity analysis is carried out to examine the critical parameters that lead to strategies to control the dissipation of viruses.

## 1 Introduction

The development of communication networks has made computers increasingly present in our daily lives. The human dependence on many electronic devices, such as mobile phones and laptops, is increasing every day since almost everything can be accessed online. For these reasons, a computer virus has become a major problem for individuals, institutions and even governments. AÂ virus is a malicious program developed to harm the operating systems of computers and mobile phones. It plays the same role as a biological virus in the human body. Computer viruses slow down or crash the operating system, erase data, steal information, disrupt normal operations, spy on users with webcams, microphones, and other damages. According to the Ponemon Institute, 7 out of 10 organizations say that security risks increased dramatically in 2017 [1]. In 2017, the Wannacry virus infected more than 400,000 devices from 100,000 groups in at least 150 countries, at a total damage cost of about 4 billion [2].

The propagation of computer viruses is similar to the spread of infectious diseases in which viruses are transmitted through communication. Computer viruses are usually transmitted in networks via e-mail messages and when downloading an infected file. In addition, connecting a computer to removable devices such as USB, mobile phones and hard drives is another way to spread viruses. Anti-virus software always strives to protect computers from viruses. However, due to the emergence of new viruses, this keeps the anti-virus programs lagging behind the new ones. As a result, this requires the user to update their anti-virus software regularly.

Mathematical experiments are necessary to understand the dynamics of computer virus spread in order to improve the safety and reliability of a computer network. Cohen [3] and Murray [4] were among the first to pave the way for the use of mathematical models of infectious diseases to explore the dynamics of the spread of computer viruses due to their similarity. Consequently, the computerâ€™s population is divided into compartments according to their status such as susceptible (S), latent (L), infectious (I), recovered (R), antidotal (A), and breaking out (B). By considering the dynamics between these compartments, different types of models have been studied [5â€“15]. In particular, Kephart and White [5] presented an SIS model of the biological epidemic to explore the way computer viruses spread on the Internet. L.Â Yang et al. [9] proposed an SLB model assuming that both latent and broken computers posses infectivity; however, the cure rate of latent computers is lower than the broken out computers. Zhu et al. [16] investigated theoretically, a computer virus model SIRS with an anti-virus strategy known as the countermeasure competing that was proposed in [17]. Their work provided a theoretical approach to assess the efficiency of different deployment strategies for anti-virus software. In [7], Gan et al. incorporated the probability of immunization into the classic SIRS model to examine the impact of vaccination (i.e. the measure that an uninfected computer has the latest version of anti-virus software installed) on the spread of computer viruses. Further, in [8], they studied the same model; however, expressing the infection rate as a generic nonlinear incidence rate. Khanh and Huy [11] investigated an SLIR model of computer network where some nodes have antidote rates to represent a vulnerability to viruses in the system. Meanwhile, in [12, 13], antidotal computers are expressed as a separate compartment generating an SAIR model. Recently, Upadhyay and Singh [18] proposed a model with two different classes of computer nodes, the attacking and targeting nodes. They studied the virus propagation from an attack node into the targeted system.

Furthermore, Liu et al. [6] proposed a different mathematical model that examines the impact of user security awareness on the spread of infectious malware. To understand how user security awareness affects the spread of malware, they have divided computers that are vulnerable to viruses into two compartments in terms of protection. They suggested two levels of protection: weakly-protected and strongly-protected, where they assumed that the latter has a lower infection rate than the former.

Other mathematical models studied the dynamics between computers and external removable devices because these devices could be affected by viruses [19], which result in computer infection. For example, Zhu et al. [20] expressed explicitly in their SIR model compartments that represents removable devices. AÂ similar model is given in [21] but with an added compartment expressing latent computers. However, in [22, 23], the effect of removable media is analyzed without expressing it as a separate compartment. Also, in [24], Gan and Yang incorporated the effects of removable storage devices as well as anti-virus software in their SLIR model but not as separate compartments. Recently, in [25], Gan et al. studied the impact of network topology and removable devices on the transmission of viruses. They compared the theoretical results of the model with numerical experiments based on the Oregon routing network in order to verify their model.

In this paper, we build a mathematical model to study the effect of external removable devices on a network with weakly- and strongly-protected computers (i.e. heterogeneous immunity). Our model is an extended model to the compartment model given in [6]. We added to the model in [6] two compartments representing susceptible and infected removable media. We believe that a lack of user awareness regarding the correct use of removable devices plays a fundamental role in the spread of viruses. Connecting infected removable media to the computer causes the virus to spread. In particular, computers with weak protection will be more vulnerable to infection with the virus than those with strong protection. Therefore, to explore the effect of removable devices on the spread of viruses, we need to include removable devices in the dynamics of the model as explicit compartments. Moreover, we assume that strongly-protected computers are unlikely to possess an infection without being first weakly-protected. Therefore, we modify the model in [6] by removing the terms that demonstrate infection of strongly-protected computers due to the connection with infected computers. The study aims to investigate the impact of user awareness on the computer network during a virus outbreak.

The rest of this work is organized as follows. SectionÂ 2 deals with formulating the mathematical model with its notations and assumptions. In Sect.Â 3, the equilibrium points and their stabilities are investigated. Moreover, Sect.Â 4 illustrates numerical experiments of the model and demonstrates the analysis of the sensitivity of its parameters. Finally, a brief conclusion is given in Sect.Â 5.

## 2 Mathematical model

We consider the impact of removable devices in a network with weakly- and strongly-protected computers. We introduce two compartments: susceptible and infected removable devices to the model in [6]. Accordingly, the proposed model is divided into five compartments denoted as follows: \(S(t)\), strongly-protected computers (*S*-node); \(W(t)\), weakly-protected computers (*W*-node); \(I(t)\), infected computers (*I*-node); \(R_{S}(t)\), susceptible removable devices (\(R_{S}\)-node), and \(R_{I}(t)\), infected removable devices (\(R_{I}\)-node). We assume that the total number of computers and removable devices in the network are \(N(t)\) and \(R_{N}(t)\), respectively.

Strongly-protected computers are installed with anti-virus software that is updated continuously. Weakly-protected computers are either installed with outdated anti-virus software or without security products. An *S*-node is infected only when its anti-virus software is outdated; thus, it becomes a *W*-node. On the contrary, when the anti-virus software of a *W*-node is updated or installed, it then becomes an *S*-node. Virus infection is caused due to the connection between the *I* and *W* nodes. Also, viruses are transmitted to *W*-node when an infected removable device is connected to it. When *W*-node is infected, it becomes *I*-node. Meanwhile, if *I*-node is cleaned from all viruses and its anti-virus software is updated, it then becomes an *S*-node. An infected removable device, \(R_{I}\)-node, is cleaned when it is scanned by anti-virus software that is installed on a strongly-protected computer, *S*-node; therefore, it becomes an \(R_{S}\)-node. On the other hand, once the susceptible removable device is connected to an infected computer, it is infected again (see Fig.Â 1).

User security awareness plays a vital role in the dynamics of the model. High security awareness is regarded when users continuously update their anti-virus software and scan all removable devices when connected to their computers, and vice versa is considered as acts of low security awareness.

The state variables *S*, *W*, *I*, \(R_{S}\) and \(R_{I}\) are non-negative and the parameters *Î±*, *Î²*, *Ïµ*, *Î´*, *Î³*, \(\sigma _{1}\), \(\sigma _{2}\) are positive and lie in the interval \((0,1]\). AÂ summary of the modelâ€™s notations is given in TableÂ 1.

The model is based on the following reasonable assumptions:

- (H1)
The network in this model is static which means that the total number of nodes over the network is invariant.

- (H2)
An up-to-data anti-virus software is powerful enough to keep

*S*-node computers immune from viruses. - (H3)
Every

*W*-node gets infected with probability*Î²*per day due to possible connection with I-node. - (H4)
Due to the contact with an infected removable device,

*W*-node computers become infected with constant probability*Î´*per day. - (H5)
When anti-virus software is expired or not updated, the computers in

*S*-node go to*W*-node with rateÂ*Î±*. - (H6)
*W*-node computers go to*S*-node with rate*Ïµ*, when installed by an updated anti-virus software. - (H7)
Each infected computer is successfully cured by the effect of anti-virus software with rateÂ

*Î³*. - (H8)
An infected removable device can become susceptible if it is connected to a strongly-protected computer with rate \(\sigma _{2}\) and a susceptible one can become infected if it is connected to an infected computer with rate \(\sigma _{1}\).

According to the above assumptions, one can immediately describe the dynamics of the model by the following system of nonlinear ordinary differential equations:

where *S*, *W*, *I*, *N*, \(R_{S}\), \(R_{I}\) and \(R_{N}\) are abbreviations of \(S(t)\), \(W(t)\), \(I(t)\), \(N(t)\), \(R_{S}(t)\), \(R_{I}(t)\) and \(R_{N}(t)\), respectively.

From the assumption (H1), the network is static, thus, the total number of computers connected to the network is constant, i.e., \(N(t)=W(t)+S(t)+I(t)=N_{0}=\mathit{constant}\) for all \(t\geq 0\). This is also the case for the total number of removable devices in the network, i.e., \(R_{N}(t)=R_{S}(t)+R_{I}(t)=R_{N0}=\mathit{constant}\). Therefore, model (1) can be normalized by setting the state variables as follows: \(w=W/N\), \(s=S/N \), \(i=I/N\), \(R_{s}=R_{S}/R_{N}\) and \(R_{i}=R_{I}/R_{N}\). Consequently, model (1) has the equivalent form

By using the identities \(w+s+i=1\) and \(R_{s}+R_{i}=1\) in (2), we can facilitate the study of the model by examining a reduced subsystem which is mainly the compartments where the virus appears. Thus, the model can be expressed by the following limiting system:

Let the feasible region for system (3) be

It follows, from system (3), that

This implies that, for \(t\geq 0\), all solutions that are non-negative remain non-negative.

Now, from system (3), we have

On the boundary of *Î©*, i.e., when \(w+i= 1\) and \(R_{i}= 1\), we find that the vector field in (4) points into the interior ofÂ *Î©*. Hence, *Î©* is positively invariant, that is, every solution of model (3), with initial conditions in *Î©*, remains there for all \(t\geq 0\).

## 3 Mathematical analysis of the model

In this section, we find the equilibria of model (3). Also, we use the next generation method [26] to calculate the basic reproductive number. Moreover, we examine the local stability of the equilibrium points using the linearization method [27] and Routhâ€“Hurwitzâ€™ criterion [28]. The global stability is investigated using Castillo-Chavez et al.â€™s theorem [29] and Lyapunovâ€™s theorem [28].

### 3.1 Equilibrium points and basic reproductive number

In general, the equilibrium points are obtained by equating the rates in system (3) to zero, that is,

By letting \(i=0\) in system (5), we obtain the virus-free equilibrium point \(E_{0}=(\frac{\alpha }{\epsilon +\alpha },0,0 )\), which exists always. Next, we apply the next generation method on system (3) in order to compute the basic reproductive number \(R_{0}\). Let \(x=(i, R_{i})^{T}\), then system (3) can be written as

where

The Jacobian matrices of \(F(x)\) and \(V(x)\) at the virus-free equilibrium point \(E_{0}\) are, respectively,

Consequently, the next generation matrix is \(G=f.v^{-1}\), i.e.,

It follows that the spectral radius of *G* is the basic reproductive number, thus,

Now, when \(i\neq 0\), the solution to system (5) gives the unique endemic equilibrium point of model (3), \(E^{*}=(w^{*},i^{*},R_{i}^{*})\), where

Here,

If \(R_{0}>1\), then \(c<0\) and if \(\sigma _{1}>\sigma _{2}\), then \(a>0\). This means that \(\sqrt{b^{2}-4ac}>b\), which leads to \(i^{*}>0\). As a result, \(w^{*}\), \(R^{*}_{i}\) and *d* are positive since \(0< i^{*}<1\). Consequently, \(E^{*}\) exists when \(R_{0} > 1\) and \(\sigma _{1}>\sigma _{2}\).

### 3.2 Local stability of the equilibrium points

### Theorem 1

*If*\(R_{0} < 1\), *the virus*-*free equilibrium point*\(E_{0}\)*is locally asymptotically stable*. *If*\(R_{0} =1\), \(E_{0}\)*is locally stable*. *If*\(R_{0} > 1\), \(E_{0}\)*is unstable*.

### Proof

By linearizing system (3), we obtain the following Jacobian matrix evaluated at the equilibrium \(E_{0}=(\frac{\alpha }{\epsilon +\alpha },0,0 )\):

One eigenvalue of the Jacobian matrix can be found easily, namely, \(\lambda _{1}=-(\epsilon +\alpha )\). The rest of the eigenvalues, \(\lambda _{2,3}\), satisfy the equation:

where

Solving (6) yields \(\lambda _{2,3}=(-A_{1}\pm \sqrt{A_{1}^{2}-4A_{2}})/2\). If \(\beta \alpha <\gamma (\epsilon +\alpha )\), then \(A_{1}>0\) and if \(\beta \alpha \sigma _{2} \epsilon +\sigma _{1} \delta \alpha ( \epsilon +\alpha )< \gamma \sigma _{2} \epsilon (\epsilon +\alpha )\), i.e., \(R_{0}<1\), then \(A_{2}>0\). Consequently, \(A_{1} > \sqrt{A_{1}^{2}-4A_{2}}\) which means that \(\lambda _{2,3}<0\). Notice that the condition \(R_{0}<1\) leads to \(\beta \alpha <\gamma (\epsilon +\alpha )\) since

Therefore, under the condition \(R_{0} < 1\), all the eigenvalues have negative real parts, this proves that \(E_{0}\) is locally asymptotically stable when \(R_{0} < 1\). On the other hand, when \(R_{0} > 1\), then \(A_{2}<0\), thus, Eq.Â (6) has at least one root with positive real part and. Hence, \(E_{0}\) is unstable provided \(R_{0} > 1\). If \(R_{0} =1\), then the eigenvalues are \(\lambda _{1,2}<0\) and \(\lambda _{3}=0\), thus, \(E_{0}\) is locally stable.â€ƒâ–¡

### Theorem 2

\(E^{*}\)*is locally asymptotically stable with respect to**Î©**if*\(\gamma <(\alpha +\epsilon )\).

### Proof

The characteristic equation of the Jacobian matrix of the linearized system of (3) at \(E^{*}\) is given by

which is equivalent to

where \(a_{11}=\beta i^{*}+\delta R_{i}^{*} +(\epsilon +\alpha )\), \(a_{12}= \beta w^{*}+\alpha \), \(a_{13}=\delta w^{*}\), \(a_{21}=\beta i^{*}+ \delta R_{i}^{*}\), \(a_{22}=-\beta w^{*}+\gamma \), \(a_{23}=\delta w^{*}\), \(a_{31}=\sigma _{2} R_{i}^{*}\), \(a_{32}=(\sigma _{2}-\sigma _{1})R_{i}^{*}+ \sigma _{1}\), \(a_{33}=(\sigma _{1}-\sigma _{2}) i^{*}+\sigma _{2} (1-w^{*})\).

Substituting \(w^{*}=\frac{\gamma i^{*}}{\beta i^{*}+\delta R^{*}_{i}}\) in \(a_{22}\), we get

Moreover, since \(\sigma _{1}>\sigma _{2}\) is the existence condition of \(E^{*}\), then \(a_{32}\) and \(a_{33}\) are positive. Clearly, the rest of the *a* are positive also.

By expanding the determinant we get the following cubic equation inÂ *Î»*:

where

According to the Hurwitz criteria,

Taking the term \((a_{22}+a_{33})\) as a common factor and evaluating the term \(a_{22}a_{33}-a_{23}a_{32}\), we have

Here, we used \((\sigma _{1}-\sigma _{2}) i^{*}+\sigma _{2} (1-w^{*})= \frac{\sigma _{1} i^{*}}{R^{*}_{i}}\) and \(i^{*}=\frac{\delta w^{*}R^{*}_{i}}{\gamma -\beta w^{*}}\). Therefore, \((a_{22}+a_{33})(a_{22}a_{33}-a_{23}a_{32})\geq 0\).

Next, we evaluate the terms

By substituting \(i^{*}=\frac{\delta w^{*}R^{*}_{i}}{\gamma -\beta w^{*}}\) in the above equation and since \(\sigma _{1}>\sigma _{2}\) leads to \(-\sigma _{2}>-\sigma _{1}\), we get

Thus, \(a_{11}a_{22}a_{33}+a_{11}a_{13}a_{31}-a_{12}a_{23}a_{31}\geq 0\) if \(\gamma <\epsilon +\alpha \). Lastly, we evaluate the terms

Hence, \(H_{2}>0\) if \(\gamma <\epsilon +\alpha \). Calculating \(H_{3}\), we get

We take the terms

Hence, \(C_{3}>0\) and therefore \(H_{3}\) is positive. Since \(H_{1}>0\), \(H_{2}>0\) and \(H_{3}>0\), all the eigenvalues of Eq.Â (8) have negative real parts. Thus, if \(\gamma <\epsilon +\alpha \), then the endemic equilibrium point \(E^{*}\) is locally asymptotically stable.â€ƒâ–¡

### 3.3 Global stability of the equilibrium points

First, we present some theories that we will use to investigate the stability of the virus-free equilibrium point of system (3).

### Lemma 1

([29])

*Consider a disease model system written in the form*:

*where*\(X\in R^{m}\)*denotes* (*its components*) *the number of uninfected individuals and*\(Y\in R^{n}\)*denotes* (*its components*) *the number of infected individuals including latent*, *infectious*, *etc*. \(U_{0} = (x_{0},0)\)*denotes the disease*-*free equilibrium of system* (9). *Assume the conditions* (C1) *and* (C2) *below*:

- (C1)
*For*\(\frac{dX}{dt}= F(X,0)\), \(x_{0}\)*is globally asymptotically stable*, - (C2)
\(G(X, Y) = AY - \hat{G}(X,Y)\),

*with*\(\hat{G}(X,Y)\geq 0\)*for*\((X,Y)\in \varOmega \),

*where*\(A = \frac{\partial G}{\partial Y}(x_{0},0)\)*has all non*-*negative off*-*diagonal elements and**Î©**is the region where the model makes biological sense*.

If system (9) satisfies the above two conditions then the following theorems hold.

### Theorem 3

([29])

*The fixed point*\(U_{0} = (x_{0},0)\)*is a globally asymptotic stable equilibrium of* (9) *provided that*\(R_{0} < 1\)*and that assumptions* (C*l*) *and* (C2) *are satisfied*.

### Theorem 4

*The virus*-*free equilibrium*\(E_{0}\)*of system* (3) *is globally asymptotically stable with respect to**Î©**if*\(\sigma _{2} <\sigma _{1}\), \(R_{0}<1\)*and the assumptions in LemmaÂ *1*are satisfied*.

### Proof

Apply LemmaÂ 1 to system (3). Consider \(X=w\) and Y=\left[\begin{array}{c}i\\ {R}_{i}\end{array}\right].

When \(i=R_{i}=0\), the uninfected subsystem becomes

which has the solution

Clearly, \(w(t)\rightarrow \frac{\alpha }{\epsilon +\alpha }=w_{0}\) as \(t\rightarrow \infty \) regardless of the initial condition value \(w(0)\). Thus, condition (C1) from LemmaÂ 1 is satisfied.

Next, we can write the right hand side of the infectious subsystem as

where

Clearly, *A* has all non-negative off-diagonal elements, and \(\hat{G}(X,Y)\geq 0\) for \((X,Y)\in \varOmega \) if \(\sigma _{1}>\sigma _{2}\). Thus, the condition (C2) in LemmaÂ 1 hold for system (3) when \(\sigma _{1}>\sigma _{2}\). Hence \(E_{0}\) is globally asymptotically stable if \(\sigma _{2} <\sigma _{1}\) and \(R_{0}<1\).â€ƒâ–¡

Next, we use Lyapunovâ€™s theorem to examine the global stability of the endemic equilibrium point of system (3).

### Theorem 5

*The endemic equilibrium*\(E^{*}\)*of system* (3) *is globally stable with respect to**Î©**if*\(\beta >\alpha \).

### Proof

Define the Lyapunov function as

Clearly, *L* is a positive definite function. Computing the derivative of *L* along the solutions of system (3), we obtain

Since \(E^{*}\) is an equilibrium point to system (3),

Thus, using (12)â€“(14) in (11), we have

Collecting and simplifying terms yield

From the inequality of arithmetic and geometric means, we have

Employing the above inequalities and recollecting terms give

where

Again using the fact that \(E^{*}\) is an equilibrium point, we have

Since \(\beta >\beta w^{*}i^{*}\), we have \(C\leq 0\) if \(\beta >\alpha \). Accordingly,

Since \(E^{*}\) exists when \(\sigma _{1}>\sigma _{2}\), it follows that \(L'\leq 0\) if \(\beta >\alpha \). Hence, \(E^{*}\) is globally stable inÂ *Î©*.â€ƒâ–¡

## 4 Numerical experiments

In this section, some numerical examples are conducted with the aid of MATLAB. In particular, we consider two different specifications for the parameters to substantiate the analytical results in the previous section. All the simulations are based on a network size of \(N= 100\) computers and \(R_{N}=100\) removable devices. Consequently, the results are expressed in terms of percentage of the total network size.

### Example 1

(Virus-free equilibrium point)

Let the parameters in model (3) be as follows: \(\epsilon =0.2\), \(\alpha =0.04\), \(\gamma =0.1\), \(\sigma _{1}=0.05\), \(\sigma _{2}=0.03\), \(\delta =0.03\), \(\beta =0.02\). Here, the threshold is \(R_{0}=0.1333\), which is less than unity. Therefore, the system in (3) will approach the virus-free equilibrium point \(E_{0}\) according to TheoremÂ 1.

FigureÂ 2 shows the time evolution of the compartments in model (3) for different initial conditions with parameters set as in ExampleÂ 1. It can be seen that both the infected computers and the infected removable devices eventually tend to extinction. However, weak computers tend to an equilibrium level with time. Thus, the solution curves converge to the virus-free equilibrium \(E_{0}=(0.1667,0,0)\). Hence, the numerical solution agrees with the analytical result in TheoremÂ 1.

### Example 2

(Endemic equilibrium point)

In this example, we set the parameters to different values as follows: \(\epsilon =0.25\), \(\alpha =0.3\), \(\gamma =0.1\), \(\sigma _{1}=0.4\), \(\sigma _{2}=0.3\), \(\delta =0.5\), \(\beta =0.7\). Calculating the threshold, we obtain \(R_{0}=11.818>1\). Also, the condition \(\sigma _{1}>\sigma _{2}\) is satisfied, thus, the endemic equilibrium \(E^{*}\) exists. Moreover, the parameters fulfill the conditions: \(\gamma <\epsilon +\alpha \) (TheoremÂ 2) and \(\beta >\alpha \) (TheoremÂ 5), as a result, the system in (3) approximates the endemic equilibrium \(E^{*}\).

The time variation of the compartments in model (3) with parameters specified as in ExampleÂ 2 is displayed in Fig.Â 3. We see that, for different initial conditions, the infected computers and removable devices eventually reach an equilibrium level that is higher than the equilibrium level reached by weak computers. Consequently, the solution curves converge to the endemic equilibrium \(E^{*}=(0.0777,0.6431,0.7544)\). Hence, the simulations are consistent with the qualitative analysis in TheoremÂ 2.

### 4.1 Sensitivity analysis

The basic reproductive number \(R_{0}\) plays a very important role in the design of efficient control strategies. Specifically, if \(R_{0}\) is less than unity, the virus outbreak dies out. Consequently, a reduction in the numeric value of \(R_{0}\) will be the main goal of all control strategies. Therefore, it is crucial to take various actions to control the system parameters so that \(R_{0}\) is remarkably below one. To examine the sensitivity of \(R_{0}\) to the modelâ€™s parameters, we vary \(R_{0}\) with respect to one parameter each time. Accordingly, we have the following variations of \(R_{0}\), taking into account that \(0 <\alpha,\epsilon ,\gamma ,\delta ,\beta ,\sigma _{1} ,\sigma _{2} \leq 1\):

In the above calculations, we considered that all the variables of \(R_{0}\) are constant except for one. We can see that \(R_{0}\) decreases with increasing *Î³*, *Ïµ* and \(\sigma _{2}\). On the other hand, \(R_{0}\) has a proportional increase relationship with the parameters: *Î²*, *Î±*, \(\sigma _{1}\) andÂ *Î´*. FigureÂ 4 demonstrates these results. Hence, from the sensitivity analysis, we conclude that the basic parameters to control the outbreak of viruses are: *Ïµ*, the rate of weak computers becoming strong; *Î³*, the recovery rate of infected computers; and \(\sigma _{2}\), the recovery rate of infected removable devices. These parameters are primarily concerned with user awareness toward immunizing computers and removable devices against viruses. Therefore, it is essential to protect all computers with regularly updated anti-virus software that is scheduled to be scanned every day. Also, we are to check each removable device against viruses before use.

Furthermore, Fig.Â 5 illustrates the impact of high user awareness on network security through the key parameters: *Î³*, *Ïµ* and \(\sigma _{2}\). We see that the increase in these parameters leads to a decrease in both *i*-node and \(R_{i}\)-node. Moreover, a further increase in the parameters yields the virus-free equilibrium. On the contrary, Fig.Â 6 demonstrates the effect of low user awareness on network security. Actions such as plugging a removable device into an infected computer and neglecting anti-virus updates are represented in the parameters: \(\sigma _{1}\) and *Î±*, that is, the infection rate of a removable device and the rate of strong computers becoming weak. The figure shows that the increase in these parameters rises the proportion of infected computers and removable devices. Higher values of \(\sigma _{1}\) and *Î±* lead to the endemic equilibrium. Finally, Fig.Â 7 depicts the effect of *Î³* on the size of infected removable devices. We see that when the recovery rate of infected computers increases, a decrease in the percentage of infected removable devices results.

Based on the sensitivity analysis and simulation results, the following suggestions are proposed to control the virus outbreak:

Installing effective anti-virus software and updating it regularly. This reduces the infectious rate

*Î²*and the*W*-node conversion rateÂ*Î±*. At the same time, it increases the rate*Ïµ*and the recovery rateÂ*Î³*.Filtering removable devices with anti-virus software and disconnecting them from the computer whenever unused. This minimizes the infectious rates \(\sigma _{1}\) and

*Î´*, while maximizing the recovery rate \(\sigma _{2}\).

## 5 Conclusion

In this paper, we extended the model of computer virus propagation in [6] by introducing two new compartments representing removable devices, because these devices play a crucial role in transmitting viruses. The model consists of two populations: computers and removable media. We aimed to investigate the influence of diverse levels of protection on the spread of viruses. We assumed that infected computers and infected removable devices posses infectivity. Up-to-date anti-virus software is powerful enough to keep computers immune from viruses. The model was analyzed qualitatively using the stability theory of nonlinear ordinary differential equations. As a result, two equilibrium points were produced: virus-free and endemic equilibrium points. The stability of both equilibrium points was examined. We found that when \(R_{0}<1\), the virus-free equilibrium was locally asymptotically stable, and when \(\sigma _{2}<\sigma _{1}\), it was globally asymptotically stable. On the other hand, when \(R_{0}>1\), \(\sigma _{2}<\sigma _{1}\), and \(\gamma <(\alpha +\epsilon )\), then the endemic equilibrium was locally asymptotically stable, and it is globally stable when \(\beta >\alpha \). Furthermore, we showed that numerical simulations were consistent with the analytical results. In addition, a sensitivity analysis was performed to understand the role of each parameter in dissipating viruses. We found that an increase in the parameters *Î³*, *Ïµ* and \(\sigma _{2}\) leads to a virus-free equilibrium, a state of high user awareness. However, the rise in the parameters \(\sigma _{1}\) and *Î±* leads to an endemic equilibrium that represents a decrease in user awareness.

In conclusion, user awareness plays an essential role in limiting the spread of viruses. Ongoing educational campaigns are recommended regarding the correct use of removable devices and the protection of computers with updated antivirus software.

## References

Crowe, J.: 10 must-know cybersecurity statistics for 2018 (2018). https://blog.barkly.com/2018-cybersecurity-statistics/

Sobers, R.: 60 must-know cybersecurity statistics for 2018 (2018). https://www.varonis.com/blog/cybersecurity-statistics/

Cohen, F.: Computer viruses. Theory and experiments. Comput. Secur.

**6**, 22â€“35 (1987)Murray, W.H.: The application of epidemiology to computer viruses. Comput. Secur.

**7**, 139â€“145 (1988)Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: IEEE Symposium on Security and Privacy, pp.Â 343â€“358 (1991)

Liu, W., Liu, C., Liu, X., Cui, S., Huang, X.: Modeling the spread of malware with the influence of heterogeneous immunization. Appl. Math. Model.

**40**, 3141â€“3152 (2016)Gan, C., Yang, X., Zhu, Q., Liu, W.: AÂ propagation model of computer virus with nonlinear vaccination probability. Commun. Nonlinear Sci. Numer. Simul.

**19**, 92â€“100 (2014)Gan, C., Yang, X., Zhu, Q.: Global stability of a computer virus propagation model with two kinds of generic nonlinear probabilities. Discrete Dyn. Nat. Soc.

**2014**, 735327 (2014)Yang, L., Yang, X., Zhu, Q., Wen, L.: AÂ computer virus model with graded cure rates. Nonlinear Anal., Real World Appl.

**14**, 414â€“422 (2013)Parsaei, M.R., Javidan, R., Kargar, N.S., Nik, H.S.: On the global stability of an epidemic model of computer viruses. Theory Biosci.

**136**, 169â€“178 (2017)Khanh, N.H., Huy, N.B.: Stability analysis of a computer virus propagation model with antidote in vulnerable system. Acta Math. Sci.

**1**, 49â€“61 (2016)Qin, P.: Analysis of a model for computer virus transmission. Math. Probl. Eng.

**2015**, 720696 (2015)Khanh, N.H.: Dynamical analysis and approximate iterative solutions of an antidotal computer virus model. Int. J. Appl. Comput. Math.

**3**, S829â€“S841 (2017)Khanh, N.H.: The spread of computer virus under the effect of external computers. Nonlinear Dyn.

**73**, 1615â€“1620 (2013)Gan, C., Yang, M., Zhang, Z., Liu, W.: Global dynamics and optimal control of a viral infection model with generic nonlinear infection rate. Discrete Dyn. Nat. Soc.

**2017**, 7571017 (2017)Zhu, Q., Yang, X., Yang, L.X., Zhang, X.: AÂ mixing propagation model of computer viruses and countermeasure. Nonlinear Dyn.

**3**, 1433â€“1441 (2013)Chen, L., Carley, K.: The impact of countermeasure propagation on the prevalence of computer viruses. IEEE Trans. Cybern.

**34**, 823â€“833 (2004)Upadhyay, R.K., Singh, P.: Modeling and control of computer virus attack on a targeted network. Phys.Â A, Stat. Mech. Appl.

**538**, 122617 (2020)Schwarz, R.: Malware protection. White paper (2010)

Zhu, Q., Yang, X., Ren, J.: Modeling and analysis of the spread of computer virus. Commun. Nonlinear Sci. Numer. Simul.

**17**, 5117â€“5124 (2012)Hu, Z., Wang, H., Liao, F., Ma, W.: Stability analysis of a computer virus model in latent period. Chaos Solitons Fractals

**75**, 20â€“28 (2015)Yang, L.X., Yang, X.: AÂ new epidemic model of computer viruses. Commun. Nonlinear Sci. Numer. Simul.

**19**, 1935â€“1944 (2014)Erdogan, M.E., Uslu, K.: Stability analysis on effect of system restore on epidemic model for computer viruses. In: IFSCOM 2016, vol.Â 1, pp.Â 91â€“104 (2016)

Gan, C., Yang, X.: Theoretical and experimental analysis of the impacts of removable storage media and antivirus software on viral spread. Commun. Nonlinear Sci. Numer. Simul.

**22**, 167â€“174 (2015)Gan, C., Feng, Q., Zhu, Q., Zhang, Z., Zhang, Y., Xiang, Y.: Analysis of computer virus propagation behaviors over complex networks: a case study of Oregon routing network. Nonlinear Dyn.

**100**, 1725â€“1740 (2020)Watmough, J., van den Driessche, P.: Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. Math. Biosci.

**180**, 29â€“48 (2002)Perko, L.: Differential Equations and Dynamic Systems. Springer, Berlin (1991)

Martcheva, M.: An Introduction to Mathematical Epidemiology. Springer, Berlin (2015)

Chavez, C.C., Feng, Z., Huang, W.: On the computation of R0 and its role in global stability. In: Math Approaches Emerg Reemerg Infect Dis Intro. IMA, vol.Â 125, pp.Â 229â€“250 (2002)

### Acknowledgements

Not applicable.

### Availability of data and materials

Not applicable.

## Funding

Not applicable.

## Author information

### Authors and Affiliations

### Contributions

SA and WB contributed to the design and implementation of the research, to the analysis of the results and to the writing of the manuscript. All authors read and approved the final manuscript.

### Corresponding author

## Ethics declarations

### Ethics approval and consent to participate

Not applicable.

### Competing interests

The authors declare that they have no competing interests.

### Consent for publication

Not applicable.

## Rights and permissions

**Open Access** This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the articleâ€™s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the articleâ€™s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

## About this article

### Cite this article

Al-Tuwairqi, S.M., Bahashwan, W. A dynamic model of viruses with the effect of removable media on a computer network with heterogeneous immunity.
*Adv Differ Equ* **2020**, 260 (2020). https://doi.org/10.1186/s13662-020-02710-0

Received:

Accepted:

Published:

DOI: https://doi.org/10.1186/s13662-020-02710-0