Dynamical behavior of computer virus on Internet

被引:154
作者
Han, Xie
Tan, Qiulin [1 ]
机构
[1] N Univ China, Natl Key Lab Elect Measurement Technol, Taiyuan 030051, Shanxi, Peoples R China
关键词
Computer virus; Time delay; Global stability; INFECTION; MODEL;
D O I
10.1016/j.amc.2010.07.064
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, we presented a computer virus model using an SIRS model and the threshold value R(0) determining whether the disease dies out is obtained. If R0 is less than one, the disease-free equilibrium is globally asymptotically stable. By using the time delay as a bifurcation parameter, the local stability and Hopf bifurcation for the endemic state is investigated. Numerical results demonstrate that the system has periodic solution when time delay is larger than a critical values. The obtained results may provide some new insight to prevent the computer virus. Crown Copyright (C) 2010 Published by Elsevier Inc. All rights reserved.
引用
收藏
页码:2520 / 2526
页数:7
相关论文
共 20 条
[1]   The benefits of a notification process in addressing the worsening computer virus problem: Results of a survey and a simulation model (vol 20, pg 693, 2001) [J].
Aron, JL ;
O'Leary, M ;
Gove, RA ;
Azadegan, S ;
Schneider, MC .
COMPUTERS & SECURITY, 2002, 21 (02) :142-163
[2]   A unified prediction of computer virus spread in connected networks [J].
Billings, L ;
Spears, WM ;
Schwartz, IB .
PHYSICS LETTERS A, 2002, 297 (3-4) :261-266
[3]   Some human dimensions of computer virus creation and infection [J].
Bissett, A .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2000, 52 (05) :899-913
[4]  
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[5]   Constructing computer virus phylogenies [J].
Goldberg, LA ;
Goldberg, PW ;
Phillips, CA ;
Sorkin, GB .
JOURNAL OF ALGORITHMS, 1998, 26 (01) :188-208
[6]   Bifurcation analysis in an SIR epidemic model with birth pulse and pulse vaccination [J].
Jiang, Guirong ;
Yang, Qigui .
APPLIED MATHEMATICS AND COMPUTATION, 2009, 215 (03) :1035-1046
[7]  
Kafai Y. B., 2009, J SCI EDUC TECHNOL, V6, P523
[8]  
KEPHART JO, 1993, 1993 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P2
[9]  
KEPHART JO, 1991, 1991 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY, P343
[10]  
Kuang Y., 1993, MATH SCI ENG, V191