Fractional Dynamics of Computer Virus Propagation
Bonyah Ebenezer^{1, *}, Nyabadza Farai^{2}, Asiedu-Addo Samuel Kwesi^{3}
^{1}Department of Mathematics and Statistics, Kumasi Polytechnic, Kumasi, Ghana
^{2}Department of Mathematical Science, University of Stellenbosch, Matieland, South Africa
^{3}Department of Mathematics Education, University of Education, Winneba Ghana
Email address:
Bonyah Ebenezer, Nyabadza Farai, Asiedu-Addo Samuel Kwesi. Fractional Dynamics of Computer Virus Propagation. Science Journal of Applied Mathematics and Statistics. Vol. 3, No. 3, 2015, pp. 63-69. doi: 10.11648/j.sjams.20150303.11
Abstract: This paper studies the fractional order model for computer virus in SEIR model. Firstly, the basic reproduction number R_{0}, which determines the threshold of the spread of the virus is determined. The stability of equilibra was also determined and studied. The Adams-Bashforth-Moulton algorithm was employed to solve and simulate the system of differential equations. The results of the simulation depicts that by small change in led to big change in the associated numerical results.
Keywords: Nonlinear System, Fractional Calculus, Computer Virus Model
1. Introduction
While the information technology revolution has significantly improve business activities and made living comparatively easy to manage through services such as managing bank account, travelling arrangement, and buying items online, it has also come with a high cost operations and manipulations through propagation of computer virus. This computer virus does not only propagates and leads to huge losses in terms of money to companies and customers, but is also implicated for loss of important data. It is estimated that annually, millions dollars are lost by the virtue of various infection [13]. In early 1980(s) the idea of mathematical models for the study of computer virus spread became pronounced. Since 1988 Epidemic models for computer viruses have been studied. Murray [13] seems to be the first to propose the relationship between epidemiology and computer viruses, although he did not provide any specific models.
Viruses were once propagated by exchanging disk; now; global connectivity gives malicious code to propagate a farther and faster. Bad use of computer through network invasion is on the increase. Today, over 74000 different strains of computer viruses have been observed since in 1986 the first virus was identified (Symantec Security Response, 2010). The have been several challenges on cyber world due to cyber attack leading to a great defense to protect valuable information from certain malicious agents (Trojan horse, worms, virus). The spread of these dangerous agents is similar to that of spread of endemic in biological processes. Many studies have employed biological system to understand the dynamics of spread of malicious objects in a computer network and prescribe procedures for protecting the computer system [10,12].
The activity of malicious objects in entire network can be examined by applying epidemiological models for disease spread [2,5,12]. Richard et al. 2005 design an SEI (Susceptible-Exposed- Infected) model to study the propagation of computer virus. They however, did not consider the length of latency period and consider the effect of anti-virus software. Yen and Liu, 2006 also proposed SEIR that assumes that recovery hosts have a permanent immunization period with a certain probability, which is not consistent with real life situation. By obtaining solution to this obstacle, [2,3], also propose a SEIRS model with latent and temporary immune periods, which can identify common worm propagation. Garretto et al. [29] present a model that seeks to examine the propagation of virus and worms in distinct network topologies. Zou et al. [9] propose an internet worm monitoring system that checks a worm in its initial stage of propagation employing Kalman filter. Zhu et al. [21] apply optimal control method to study the dynamics of computer virus. They take into consideration a controlled delayed model and then use an optimal control technique, by making an assumption that there is a trade off between central loss and the effect. Carla and Teneriro also present fractional dynamics of computer virus propagation to study [21] model.
In this paper we analyze the fractional order version of the integer order model proposed by Mei et al. [30] for computer virus and its dynamics. We simulate numerically the model for different values of the order of the fractional derivatives. In this regard, the paper is arranged as follows. In Section3, we describe the model proposed for computer virus dynamics. In Section 4, we analyze several simulations of the model for different values of the fractional derivatives explain the implication of the results. In the last Section, we show the main conclusion and outline same future research figures.
2. Fractional Order Calculus (FOC)
The theory of differential calculus began when Leibniz wrote about for generalization of the derivative operator to fractional values of 𝛼, the order of the derivative.
The growth of the fractional calculus (FC) is attributable to many contributions of mathematicians for example Euler, Liouville, Riemann, and Letnikov [17].
Presently fractional calculus has been associated with long memory in the fields such as physics and engineering [18, 15]. Notwithstanding the FC applications in engineering there are ongoing effort to explore new areas of applications of FC such as the modeling of dynamical [19].
We present some of the definitions of fractional calculus. The most common applied definitions of a fractional derivative of order are the Riemann-Liouville (RL), Gr¨unwald-Letnikov (GL), and Caputo (C) formulations. GL is stated as
(2.1)
Definition 2.2. The Caputo fractional derivative of order of a continuous function is given by
(2.2)
where is Euler’s gamma function, [𝑥] means the integer part of 𝑥, and ℎ is the step time increment. These expressions contain the history of the past dynamics, divergent to the integer counterpart that is a "local" operator. This property was observed in numerous phenomena and their modeling turns easier employing the FC formalism, while integer order models are often looks more complicated. We observe that the definition of time-fractional derivative of a function at deals with integration and computing time-fractional derivative that demands. The concept of fractional derivative, we will implement Caputo’s definition which is a variation of the Riemann- Liouville definition and has the advantage of solving initial value problems.
3. Model Formulation
By considering connection of computers, it is classified as external if connected to internet and external not connected. We subdivide the population into four classes. represents the susceptible computers, that is, uninfected computers and new computers which connected to network at time , represents the exposed computers, that is, infected but not yet broken-out, denotes the infectious computers and the recovered computers, that is, virus-free computer having immunity. Let 𝑆(𝑡), 𝐸(𝑡), 𝐼(𝑡), 𝑅(𝑡) denote their corresponding numbers at time 𝑡, without ambiguity; 𝑆(𝑡), 𝐸(𝑡), 𝐼(𝑡), 𝑅(𝑡) will be abbreviated as 𝑆, 𝐸, 𝐼, 𝑅, respectively. The model is formulated as the following system of differential equations:
Now we introduce fractional order into the ODE model by Mei et al. [30]. The new system is described by the following set of ODE
(3.1)
(3.2)
It can be obviously noticed that the first three equations in (3.1) are independent of the fourth equation, and hence, the fourth equation can be done away with without loss of generality. Therefore, system (3.1) can be stated as
(3.3)
where represents the rate at which external computers are connected to the network; represents the recovery rate of susceptible computer as a results of the anti-virus ability of network; stands for the recovery rate of exposed computer due to the anti-virus ability of network; denotes the rate at which, when having a connection to one infected computer, one susceptible computer can turn into exposed but has not broken-out; indicates the rate of which, when having connection to one exposed computer, one susceptible computer can turn into exposed; symbolizes the rate of the exposed computers cannot be cured by anti-virus software and broken-out; represents the recovery rate of infected computers that are cured; indicates the rate at which one computer is removed from the network.
where
The reason for considering a fractional order system instead of its integer order counterpart is that fractional order differential equations are generalizations of integer order differential equations. Also, using fractional order differential equations can help us to reduce the errors arising from the neglected parameters in modeling real life phenomena. We should note that the system (3.1) can be reduced to an integer order system by setting .
Adding up the equations given in (3.1), we obtain
Let and. For the proof of the theorem about non-negative solutions we shall require the following Lemma [20].
Lemma 3.1 (Generalized Mean Value Theorem) Let and for. Then we state
with .
Remark 3.2 Suppose and for. It is obvious from the Lemma 3.1 that if ), then the function is nondecreasing, and if then the function is nonincreasing for all .
Theorem 3.1 There is a unique solution for the initial value problem given by (2.1) - (2.2), and the solution remains in
Proof. The existence and uniqueness of the solution of (2.1)-(2.2) in can be obtained from [10, Theorem 3.1 and Remark 3.2]. We need to show that the domain is positively invariant. Since
(3.4)
on each hyperplane bounding the nonnegative orthant, the vector field points into .
It is clear that also remains nonnegative. For convenience in calculations we the following system, which can be obtained from (3.1):
(3.5)
with initial conditions
(3.6)
The basic reproduction number, , of the integer order model is computed in [22] to be
(3.7)
The basic reproduction number, , is expressed as the number of secondary infections owing to a single infection in a completely susceptible population. For the disease-free equilibrium is globally asymptotically stable and if, the endemic equilibrium is globally asymptotically stable [21].
3.1. Equilibrium Points and Stability
We consider the initial value problem (3.5)-(3.6) with satisfying in order to estimate the equilibrium points of (3.5), let
Then the equilibrium points are and, where
The Jacobian matrix for the system given by (2.6), computed at the disease free equilibrium is below
Theorem 3.2 Disease free equilibrium of the system (3.5) is asymptotically stable if
Proof. Disease free equilibrium is asymptotically stable if all of the eigenvalues, = of satisfy the following conditions [26, 22]:
(3.8)
These eigenvalues can be obtained by solving the characteristic equation
Hence, we obtain the following algebraic equation:
where
,
If , then the condition given by (3.8) is met.
We now examine the asymptotic stability of the endemic (positive) equilibrium of the system given by (3.1). The Jacobian matrix determined at the endemic equilibrium is expressed as
Thus, the characteristic equation of the linearized system is expressed of the form
,
,
Let stands for the discriminant of a polynomial . If then Denote
Following [22; 23]. we arrive at the proposition
Proposition 3.2. One assume that exists in
1) If the discriminant of , is positive and Routh-Hurwitz are satisfied, that is, then is locally asymptotically stable.
2) If then is locally asymptotically stable.
3) If then is unstable.
4. Numerical Methods and Simulations
In view of the fact that most of the fractional-order differential equations hardly have exact analytic solutions, approximation and numerical techniques is the most effective way of solving such systems. Numerous analytical and numerical methods have been developed to solve the fractional order differential equations. For numerical solutions of system (3.1), one can apply the generalized Adams-Bashforth- Moulton method. In order to give the approximate solution by means of this algorithm, we consider the following nonlinear fractional differential equation [24, 25].
where
This equation corresponds to the Volterra integral equation
(4.1)
Diethelm et al. employed the predictor-correctors scheme [24, 25], depended on the Adams-Bashforth- Moulton algorithm to integrate Eq. (4.1). By employing this scheme to the fractional-order model for computer virus, and putting Eq. (4.1) can be discretized as follows [24, 25]:
where
The parameter values used for the simulations were, ,,,,,,and the following set of for each compartment. Now we take into account the initial population include susceptible nodes, exposed to infected nodes, infected nodes for numerical simulation.
5. Discussion
In this paper, we have considered a fractional calculus model for computer virus propagation. From the numerical results in Figures 1,2 and 3, it is obvious that the approximate solutions depend continuously on the fractional derivative 𝛼.The approximate solutions , , and are shown in Figures 1,2 and 3 with four different values of 𝛼. In each figure four different values of 𝛼 are taken into account. Given = 1, system (3.3) is termed as the classical integer-order system (3.1). We showed in Figure 1, the variation of versus time 𝑡 with varying values of 𝛼 = 1, 0.95, 0.90, 0.85 by fixing other parameters. It is observed that does not drop sharply in a relatively small period of time for small values of 𝛼. Figure 2 depicts versus time 𝑡 and Figure 3 also shows versus time 𝑡. However, variation in 𝛼 for Figure 2 and 3 is more apparent than that of Figure 1. This buttresses the sensitive nature of fractional order models. Following [27 , 28], one observes that both steady states of integer order and fractional order turn to point to the fixed point given a long period of time. In dealing with situations in real life, data collected can help determine the order of the system. One also needs to mention that when dealing with real life problems, the order of the system can be determined by using the collected data.
6. Conclusion
In this paper, it is assumed that the virus process has a latent period and computers infected by the virus have also infectivity. An SEIR compartmental model for transmission of virus in computer network is formulated and studied. The threshold parameter is determined. The steady states of the model is also derived and analyzed in order to determine the stability of the system. Adams-Bashforth-Moulton method is used to carry out the numerical simulations of the fraction order model. The simulation results show that by varying 𝛼 small result in a big change in the associated numerical results. By transforming classical into a fractional order type gives impetus to the transformed model to be more sensitive to order of differentiation α.
References