Parameter | Value | Source |
b | 1 | [13] |
p | 0.9 | [13] |
β | 0.65 | [13] |
σ | 0.4 | [13] |
d | 0.1 | assumed |
δ | 0.7 | [13] |
ε | 0.14 | assumed |
γ | 0.3 | [13] |
η | 0.1 | assumed |
α1 | 0.1 | assumed |
α2 | 0.18 | assumed |
In this paper, a Susceptible-Infected-Quarantined-Susceptible (SIQRS) computer virus propagation model with nonlinear infection rate and two-delay is formulated. The local stability of virus-free equilibrium without delay is examined. Furthermore, we also expound and prove that time-delay plays a crucial role in sufficient conditions for the local stability of the virus-existence equilibrium and the occurrence of Hopf bifurcation at the critical value. Especially, direction and stability of the Hopf bifurcation are demonstrated. Finally, some numerical simulations are presented in order to verify the theoretical results.
Citation: Fangfang Yang, Zizhen Zhang. Dynamics of a nonlinear SIQRS computer virus spreading model with two delays[J]. AIMS Mathematics, 2021, 6(4): 4083-4104. doi: 10.3934/math.2021242
[1] | Jagdev Singh, Jitendra Kumar, Devendra kumar, Dumitru Baleanu . A reliable numerical algorithm based on an operational matrix method for treatment of a fractional order computer virus model. AIMS Mathematics, 2024, 9(2): 3195-3210. doi: 10.3934/math.2024155 |
[2] | Khalaf M. Alanazi . The asymptotic spreading speeds of COVID-19 with the effect of delay and quarantine. AIMS Mathematics, 2024, 9(7): 19397-19413. doi: 10.3934/math.2024945 |
[3] | Wajaree Weera, Thongchai Botmart, Teerapong La-inchua, Zulqurnain Sabir, Rafaél Artidoro Sandoval Núñez, Marwan Abukhaled, Juan Luis García Guirao . A stochastic computational scheme for the computer epidemic virus with delay effects. AIMS Mathematics, 2023, 8(1): 148-163. doi: 10.3934/math.2023007 |
[4] | Xin Jiang . Threshold dynamics of a general delayed HIV model with double transmission modes and latent viral infection. AIMS Mathematics, 2022, 7(2): 2456-2478. doi: 10.3934/math.2022138 |
[5] | Kalpana Umapathy, Balaganesan Palanivelu, Renuka Jayaraj, Dumitru Baleanu, Prasantha Bharathi Dhandapani . On the decomposition and analysis of novel simultaneous SEIQR epidemic model. AIMS Mathematics, 2023, 8(3): 5918-5933. doi: 10.3934/math.2023298 |
[6] | Liang Hong, Jie Li, Libin Rong, Xia Wang . Global dynamics of a delayed model with cytokine-enhanced viral infection and cell-to-cell transmission. AIMS Mathematics, 2024, 9(6): 16280-16296. doi: 10.3934/math.2024788 |
[7] | Ahmed M. Elaiw, Ghadeer S. Alsaadi, Aatef D. Hobiny . Global co-dynamics of viral infections with saturated incidence. AIMS Mathematics, 2024, 9(6): 13770-13818. doi: 10.3934/math.2024671 |
[8] | Jinting Lin, Changjin Xu, Yiya Xu, Yingyan Zhao, Yicheng Pang, Zixin Liu, Jianwei Shen . Bifurcation and controller design in a 3D delayed predator-prey model. AIMS Mathematics, 2024, 9(12): 33891-33929. doi: 10.3934/math.20241617 |
[9] | Heping Jiang . Complex dynamics induced by harvesting rate and delay in a diffusive Leslie-Gower predator-prey model. AIMS Mathematics, 2023, 8(9): 20718-20730. doi: 10.3934/math.20231056 |
[10] | Sahabuddin Sarwardi, Hasanur Mollah, Aeshah A. Raezah, Fahad Al Basir . Direction and stability of Hopf bifurcation in an eco-epidemic model with disease in prey and predator gestation delay using Crowley-Martin functional response. AIMS Mathematics, 2024, 9(10): 27930-27954. doi: 10.3934/math.20241356 |
In this paper, a Susceptible-Infected-Quarantined-Susceptible (SIQRS) computer virus propagation model with nonlinear infection rate and two-delay is formulated. The local stability of virus-free equilibrium without delay is examined. Furthermore, we also expound and prove that time-delay plays a crucial role in sufficient conditions for the local stability of the virus-existence equilibrium and the occurrence of Hopf bifurcation at the critical value. Especially, direction and stability of the Hopf bifurcation are demonstrated. Finally, some numerical simulations are presented in order to verify the theoretical results.
Since the first personal computer came out in 1980, computers gradually appeared in our daily life. In 1995, the emergence of the Internet further promoted the computers into all fields of production and living. By June 2020, China's Internet users had reached 940 million, an increase of 36.25 million compared with March 2020, and the Internet penetration rate reached 67.0%, an increase of 2.5 percentage points compared with March 2020 [1]. Computer network is a sharp double-edged sword, bringing conveniences as well as disasters. In October 2019, a total of 44.23 million new viruses was found in the National Computer Virus Emergency Response Center and 218.04 million computers were infected, which was 1.78% higher than that in September, and the main transmission channels were "phishing", "webpage pegging" and loopholes [2]. The propagation of computer virus has become more rapid and harmful, posing serious changes. In the early October 2019, Demant, the world's largest hearing aid manufacturer, was invaded by blackmail virus, resulting in a direct economic loss of more than 95 million dollars. Fractional derivative equations are often used to study the dynamic behavior of systems, which can help us understand the evolution law of the system [3,4,5,6]. Consequently, it is of great practical significance to analyze the propagation of computer virus to protect computers against viruses by use fractional derivative equations.
Some mathematical models, which characterized the spread of computer viruses over the internet, were proposed to help us study the problem quantitatively. There are many similarities between computer virus and biological virus, such as infectivity, destructiveness, variability and so on. Based on these similarities, J. O. Kephart and S. R. White applied the mathematical models of epidemics to the computer virus propagation model creatively [7]. On this foundation, many computer virus models have been established [8,9,10]. Singh et al. [11] considered a fractional epidemiological SIR model with an arbitrary order derivative having nonsingular kernel, and discussed the existence of the solution. Considering that the recovered nodes may become susceptible again once some new viruses appear or the known computer viruses mutate, Chen et al. [12] presented a new SIRS model. But they all assumed the infection rate in models is bilinear. But in fact, this situation is not the case. In most realistic situations, the bilinear infection rate is always impossible to achieve due to the increase of the susceptible computers and infectious computers. In view of the nonlinear infection rate, both of the inhibition effect owing to the uncertain behavior of susceptible computers and the crowding effect of infectious computers are considered at the same time.
Considering that the network topology in the proliferation of virus may lead to nonlinear infection rate, MadhuSudanan et al. [13] formulated a computer viruses model with nonlinear infection rate and incubation period delay:
{dS(t)dt=(1−p)b−βS(t−τ)I(t−τ)1+σS(t−τ)−dS(t)+δR(t),dI(t)dt=βS(t−τ)I(t−τ)1+σS(t−τ)−(d+α+γ)I(t),dR(t)dt=pb+γI(t)−(d+δ)R(t), | (1.1) |
where S(t), I(t), R(t) represent the number of susceptible computers, infected computers and recovered computers at time t, respectively. The meanings of all the parameters in system (1.1) can be referred to [13].
Quarantine strategy generally refers to the control of individuals with abnormal performance, so as to prevent others from being infected by viruses. Quarantine strategy is an important measure for the treatment of infectious diseases. It can not only conduct centralized management and treatment for infected individuals, but also effectively control the source of infection and greatly reduce the number of contacts. Later, inspired by the biological infectious disease model, many scholars applied the quarantine strategy to the research of computer virus model, and put forward a series of models accordingly [14,15]. Hence, quarantine strategy should be introduced into the computer virus model. The effect of Anti-virus can protect recovered computers from the known viruses, however, as time goes on, Anti-virus may lose function as a result of the emergence of new viruses and the variation of known viruses, and the update speed of anti-virus software is always slower than that of new virus. So it needs a short time before entering susceptible state, called the temporary immune time delay. Considering the effect of quarantine strategy and the existence of temporary immune time delay, we investigate a new SIQRS computer virus model with two delays:
{dS(t)dt=(1−p)b−βS(t−τ1)I(t−τ1)1+σS(t−τ1)−dS(t)+δR(t−τ2),dI(t)dt=βS(t−τ1)I(t−τ1)1+σS(t−τ1)−(d+α1+γ+ε)I(t),dQ(t)dt=εI(t)−(η+d+α2)Q(t),dR(t)dt=pb+γI(t)+ηQ(t)−dR(t)−δR(t−τ2), | (1.2) |
where Q(t) is the number of quarantine computers at time t; α1 is the death rate of infected computers due to virus; α2 is the death rate of quarantine computers due to virus; ε is the quarantine rate of infected computers; η is the recovered rate of the quarantine computers; τ1 is the incubation period delay; τ2 is the temporary immune time delay before the recovered computers come into the susceptible status.
When the system (1.2) reaches the virus-free equilibrium, there is no virus, namely I∗0=0. Let us equate system (1.2) to be zero, we can obtain:
{δR∗0+(1−p)b−βS∗0I∗01+σS∗0−dS∗0=0,βS∗0I∗01+σS∗0−(d+α1+γ+ε)I∗0=0,εI∗0−(η+d+α2)Q∗0=0,γI∗0+ηQ∗0+pb−(d+δ)R∗0=0, | (2.1) |
Then, then system (1.2) has a virus-free equilibrium E∗0(S∗0,I∗0,Q∗0,R∗0). Here,
S∗0=δb+bd(1−p)d(d+δ),I∗0=0,Q∗0=0,R∗0=pbd+δ. |
The basic regeneration number is the critical threshold to determine whether there is a virus in system (1.2). According to the way in [16], it is easy to obtain the basic regeneration number of system (1.2). Let X=(I,S,Q,R)T, then system (1.2) can be equivalent to dX(t)dt=F−V, where
F=(βSI1+σS000),V=((d+α1+η+γ)I−(1−p)b+βSI1+σS+dS+δR(η+d+α2)Q−εIdR+δR−ηQ−γI−pb). |
The infected compartment is I, giving m=1, then the Jacobian matrixes of F and V at E∗0(S∗0,I∗0,Q∗0,R∗0) are
F′=(βS∗01+σS∗0),V′=(d+α1+η+γ). |
Then
R0=βS∗0(1+σS∗0)(d+α1+γ+ε). | (2.2) |
If R0<1, then system (1.2) has a virus-free equilibrium E∗0(S∗0,I∗0,Q∗0,R∗0). The Jacobian matrix of system (1.2) at E∗0(S∗0,I∗0,Q∗0,R∗0) is
J(E∗0)=(−d−βS∗01+σS∗00δ0βS∗01+σS∗0−(d+α1+γ+ε)000ε−(η+d+α2)00γη−(d+δ)), |
The corresponding characteristic equation becomes
(λ+d)(λ−βS∗01+σS∗0+d+α1+γ+ε)(λ+d+η+α2)(λ+d+δ)=0. | (2.3) |
Then the eigenvalues of Eq.(2.3) are
λ1=−d<0,λ2=βS∗01+σS∗0−(d+α1+γ+ε)<0,λ3=−(d+η+α2)<0,λ4=−(d+δ)<0, |
So, when all the eigenvalues are less than zero, the virus-free equilibrium of system (1.2) is locally stable according to Routh-Hurwitz criteria.
If R0=βS∗0(1+σS∗0)(d+α1+γ+ε)>1, then system (1.2) has a unique virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗). Here,
S∗=d+α1+γ+εβ−σ(d+α1+γ+ε),I∗=(d+δ)dS∗−(d+δ)(1−p)b−δpbk1+δγ−k2,Q∗=εη+d+α2I∗,R∗=pb+γI∗+ηQ∗d+δ, |
where
k1=δηεη+d+α2,k2=(δ+d)βS∗1+σS∗. |
The linearized part of system (1.2) is
{dS(t)dt=l11S(t)+m11S(t−τ1)+m12I(t−τ1)+n14R(t−τ2),dI(t)dt=m21S(t−τ1)+l22I(t)+m22I(t−τ1),dQ(t)dt=l32I(t)+l33Q(t),dR(t)dt=l42I(t)+l43Q(t)+l44R(t)+n44R(t−τ2), | (3.1) |
where
l11=−d,m11=−βI∗(1+σS∗)2,m12=−βS∗1+σS∗,n14=δ,m21=βI∗(1+σS∗)2,m22=βS∗1+σS∗,l22=−(d+α1+γ+ε),l32=ε,l33=−(η+d+α2),l42=γ,l43=η,l44=−d,n44=−δ, |
From the system (3.1), we can obtain that
X0(λ)+X1(λ)e−λτ1+X2(λ)e−λτ2+X3(λ)e−λ(τ1+τ2)+X4(λ)e−2λτ2+X5(λ)e−λ(2τ1+τ2)=0, | (3.2) |
where
X0(λ)=λ4+λ3(−l11−l22−l33−l44)+λ2(l11l22+l11l33+l11l44+l22l33+l22l44+l33l44)+λ(−l11l22l33−l11l22l44−l11l33l44−l22l33l44)+l11l22l33l44,X1(λ)=λ3(−m11−m22)+λ2(l11m22+l22m11+l33m11+l33m22+l44m11+l44m22)+λ(−l33l44m22−l11l44m22−l11l33m22−l33l44m11−l22l44m11−l22l33m11)+l22l33l44m22+l22l33l44m11,X2(λ)=−n44λ3+λ2(l11n44+l22n44+l33n44)+λ(−l11l22n44−l11l33n44−l22l33n44)+l11l22l33n44,X3(λ)=λ2(m11n44+m22n44)+λ(−l11m22n44−l22m22n44−l33m11n44−l33m22n44+l42m21n44)+(l11l33m22n44+l22l33m11n44+l32l43m21n14−l33l42m21n14),X4(λ)=λ2(m11m22+m12m21)+λ(−l33m11m22−l44m11m22−l33m12m21−l44m12m21)+l33l44m11m22+l33l44m12m21,X5(λ)=λ(−m11m22n44−m12m21n44)+l33m11m22n44+l33m12m21n44. |
Case 1. τ1=τ2=0, Eq (3.2) becomes
λ4+X30λ3+X20λ2+X10λ+X00=0, | (3.3) |
where Xji(i=0,1,2,3,4,5;j=0,1,2,3,4) represents the coefficient of λj in Xi(λ).
Lemma 1 [13]. According to Routh-Hurwitz criteria, when R0>1, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable.
Case 2. τ1>0, τ2=0. Then, Eq (3.2) becomes
[X0(λ)+X2(λ)]+[X1(λ)+X3(λ)]e−λτ1+[X4(λ)+X5(λ)]e−2λτ1=0. | (3.4) |
Taking λ=iω1 into Eq (3.4) and separating the real and imaginary parts, we obtain
{A11cosτ1ω1+A21sinτ1ω1+B11=−A31sin2τ1ω1+A41cos2τ1ω1,A21cosτ1ω1−A11sinτ1ω1+B21=−A31cos2τ1ω1−A41sin2τ1ω1, | (3.5) |
with
A11=X01−X21ω21+X03−X23ω21,A21=X11ω1−X31ω31+X13ω1,A31=X14ω1+X15ω1,A41=X24ω21−X04−X05,B11=ω41−X20ω21+X00−X22ω21+X02,B21=X10ω11−X30ω31−X32ω31−X12ω1, |
Because cos2τ1ω1+sin2τ1ω1=1, sinτ1ω1=±√1−cos2τ1ω1.
(1) If sinτ1ω1=√1−cos2τ1ω1, after calculation, we have
A211+A221+B211+B221−A231−A241+2(A11B11+A21B21)cosτ1ω1+2(B11A21−A11B21)√1−cos2τ1ω1=0. | (3.6) |
Let f1(ω1)=cosτ1ω1, and we suppose that (G1): f1(ω1)=cosτ1ω1 has at least a positive root ω11, which makes Eq (3.6) true. Thus,
τ(i)11=1ω11×[arccos(f1(ω11))+2iπ],i=0,1,2,⋯. | (3.7) |
(2) If sinτ1ω1=−√1−cos2τ1ω1, after calculation, we have
A211+A221+B211+B221−A231−A241+2(A11B11+A21B21)cosτ1ω1+2(A11B21−A21B11)√1−cos2τ1ω1=0. | (3.8) |
Let g1(ω1)=cosτ1ω1, and we suppose that (G2): g1(ω1)=cosτ1ω1 has at least a positive root ω12, which makes Eq (3.8) true. Thus,
τ(i)12=1ω12×[arccos(g1(ω12))+2iπ],i=0,1,2,⋯. | (3.9) |
Define
τ10=min{τ(i)11,τ(i)12},i=0,1,2,⋯, | (3.10) |
where τ(i)11 and τ(i)12 are defined by Eq (3.7) and Eq (3.9), respectively.
Multiplying eλτ1 on both sides of Eq (3.4), and then after deriving from τ to λ, we can get
[dλdτ1]−1=−[X′0(λ)+X′2(λ)]eλτ1+[X′1(λ)+X′3(λ)]+[X′4(λ)+X′5(λ)]e−λτ1−λ[X0(λ)+X2(λ)]e−λτ1+λ[X4(λ)+X5(λ)]eλτ1−τ1λ. | (3.11) |
According to the Hopf bifurcation theorem [17], if the surmise (G3): Re[dλ/dτ1]−1τ1=τ10≠0 is true, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable. So, we have Theorem 1.
Theorem 1. For system (1.2), when R0>1 and the conditions (G1)-(G3) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ1∈[0,τ10); there is a Hopf bifurcation at E∗(S∗,I∗, Q∗,R∗) when τ1=τ10.
Case 3. τ1=0, τ2>0. Then Eq (3.2) becomes
[X0(λ)+X1(λ)+X4(λ)]+[X2(λ)+X3(λ)+X5(λ)]e−λτ2=0, | (3.12) |
Substituting λ=iω2 into Eq (3.12), we obtain
{C11cosτ2ω2+C21sinτ2ω2=D11,C21cosτ2ω2−C11sinτ2ω2=D21, | (3.13) |
with
C11=−X22ω22+X02+X03+X05−X23ω22,C21=−X32ω32+X12ω2+X13ω2+X15ω2,D11=X20ω22+X21ω22+X24ω22−ω42−X00−X01−X04,D21=X30ω32+X31ω32−X10ω2−X11ω2−X14ω2, |
Squaring both sides of two equations in Eq (3.13), and adding them up, we obtain
C211+C221=D211+D221. | (3.14) |
We suppose that (G4): Eq (3.14) has at least one positive real root ω20. Then, from Eq (3.13), we derive
τ(i)2=1ω20×[arccosC11D11+C21D21C211+C221+2iπ], | (3.15) |
where i=0,1,2,⋯.
Define
τ20=min{τ(i)2,i=0,1,2,⋯}, | (3.16) |
and τ(i)2 is defined by Eq (3.15).
Taking the derivative of λ with respect to τ, we obtain
[dλdτ2]−1=−X′0+X′1+X′4λ[X0+X1+X4]+X′2+X′3+X′5λ[X2+X3+X5]−τ2λ, | (3.17) |
Thus, it is easy to obtain the expression of Re[dλ/dτ2]−1τ2=τ20. According to the Hopf bifurcation theorem [17], if the hypothesis (G5): Re[dλ/dτ2]−1τ2=τ20≠0 is true, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable. In conclusion, Theorem 2 can be obtained.
Theorem 2. For system (1.2), when R0>1 and the conditions (G4)-(G5) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ2∈[0,τ20); there is a Hopf bifurcation at E∗(S∗,I∗, Q∗,R∗) when τ2=τ20.
Case 4. τ1=τ2=τ∗. Then Eq (3.2) becomes
X0(λ)+[X1(λ)+X2(λ)]e−λτ∗+[X3(λ)+X4(λ)]e−2λτ∗+X5(λ)e−3λτ∗=0, | (3.18) |
Multiplying eλτ∗ on both sides of Eq (3.18), then we obtain
X0(λ)eλτ∗+[X1(λ)+X2(λ)]+[X3(λ)+X4(λ)]e−λτ∗+X5(λ)e−2λτ∗=0, | (3.19) |
Substituting λ=iω3 into Eq (3.19), we obtain
{A12cosτ∗ω3+A22sinτ∗ω3=−A32sin2τ∗ω3+A42cos2τ∗ω3,A′22cosτ∗ω3−A12sinτ∗ω3=−A32cos2τ∗ω3−A42sin2τ∗ω3, | (3.20) |
with
A12=X30ω33−X10ω3−X13ω3−X14ω3,A22=ω43−X20ω23−X23ω23+X24ω23+X00−X03−X04,A′22=ω43−X20ω23−X23ω23−X24ω23+X00+X03+X04,A32=X15ω3,A42=−X05,B12=−X21ω23+X01−X22ω23+X02,B22=−X31ω33−X32ω33+X11ω3+X12ω3, |
Squaring both sides of two equations in Eq (3.20), and adding them up, we obtain
(A12cosτ∗ω3+A22sinτ∗ω3+B12)2+(A′22cosτ∗ω3−A12sinτ∗ω3+B22)2=A232+A242. | (3.21) |
Because cos2τ∗ω3+sin2τ∗ω3=1, sinτ∗ω3=±√1−cos2τ∗ω3.
(1) If sinτ∗ω3=√1−cos2τ∗ω3, after calculation, we have
A212+A222+B212+B222−A232−A242+2(A12A22+A12B12+A22B12)cosτ∗ω3+2(A′22B22−A′22A12−A12B22)√1−cos2τ∗ω3=0. | (3.22) |
Let f2(ω3)=cosτ∗ω3, and we suppose that (G6): f2(ω3)=cosτ∗ω3 has at least a positive root ω31, which makes Eq (3.22) true. Thus,
τ(i)∗1=1ω31×[arccos(f2(ω31))+2iπ],i=0,1,2,⋯. | (3.23) |
(2) If sinτ∗ω3=−√1−cos2τ∗ω3, after calculation, we have
A212+A222+B212+B222−A232−A242+2(A12A22+A12B12+A22B12)cosτ∗ω3−2(A′22B22−A′22A12−A12B22)√1−cos2τ∗ω3=0. | (3.24) |
Let g2(ω3)=cosτ∗ω3, and we suppose that (G7): g2(ω3)=cosτ∗ω3 has at least a positive root ω32, which makes Eq (3.24) true. Thus,
τ(i)∗2=1ω32×[arccos(g2(ω32))+2iπ],i=0,1,2,⋯. | (3.25) |
Define
τ∗0=min{τ(i)∗1,τ(i)∗2},i=0,1,2,⋯, | (3.26) |
where τ(i)∗1 and τ(i)∗2 are defined by Eq (3.23) and Eq (3.25), respectively.
Then after deriving from τ to λ, we can get
[dλdτ∗]−1=−X′0(λ)eλτ∗+[X′1(λ)+X′2(λ)]+[X′3(λ)+X′4(λ)]e−λτ∗+X′5(λ)e−2λτ∗−λX0(λ)eλτ∗+λ[X3(λ)+X4(λ)]e−λτ∗+2λX5(λ)e−2λτ∗−τ∗λ. | (3.27) |
Based on the Hopf bifurcation theorem [17], if the surmise (G8): Re[dλ/dτ∗]−1τ∗=τ∗0≠0 is true, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable. Therefore, Theorem 3 can be obtained.
Theorem 3. For system (1.2), when R0>1 and the conditions (G6)-(G8) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ∗∈[0,τ∗0); there is a Hopf bifurcation at E∗(S∗,I∗, Q∗,R∗) when τ∗=τ∗0.
Case 5. τ1>0, τ2∈(0,τ20). For convenience, let ω4 be equal to ω1. Then, this case is similar as in Case 2.
[X0(λ)+X1(λ)+X4(λ)]+[X1(λ)+X3(λ)]e−λτ1+[X4(λ)+X5(λ)]e−2λτ1=0. | (3.28) |
{A13cosτ1∗ω4+A23sinτ1∗ω4+B13=−A33sin2τ1∗ω4+A43cos2τ1∗ω4,A23cosτ1∗ω4−A13sinτ1∗ω4+B23=−A33cos2τ1∗ω4−A43sin2τ1∗ω4, | (3.29) |
with
A13=X01−X21ω24+X03−X23ω24,A23=X11ω4−X31ω34+X13ω4,A33=X14ω4+X15ω4,A43=X24ω24−X04−X05,B13=ω44−X20ω24+X00−X22ω24+X02,B23=X10ω14−X30ω34−X32ω34−X12ω4, |
Because cos2τ1∗ω4+sin2τ1∗ω4=1, sinτ1∗ω4=±√1−cos2τ1∗ω4.
(1) If sinτ1∗ω4=√1−cos2τ1∗ω4, after calculation, we have
A213+A223+B213+B223−A233−A243+2(A13B13+A23B23)cosτ1∗ω4+2(B13A23−A13B23)√1−cos2τ1∗ω4=0. | (3.30) |
Let f3(ω4)=cosτ1∗ω4, and we suppose that (G9): f3(ω4)=cosτ1∗ω4 has at least a positive root ω41, which makes Eq (3.30) true. Thus,
τ(i)1∗1=1ω41×[arccos(f3(ω41))+2iπ],i=0,1,2,⋯. | (3.31) |
(2) If sinτ1∗ω4=−√1−cos2τ1∗ω4, after calculation, we have
A213+A223+B213+B223−A233−A243+2(A13B13+A23B23)cosτ1∗ω4+2(A13B23−A23B13)√1−cos2τ1∗ω4=0. | (3.32) |
Let g3(ω4)=cosτ1∗ω4, and we suppose that (G10): g3(ω4)=cosτ1∗ω4 has at least a positive root ω42, which makes Eq (3.32) true. Thus,
τ(i)1∗2=1ω42×[arccos(g3(ω42))+2iπ],i=0,1,2,⋯. | (3.33) |
Define
τ1∗0=min{τ(i)1∗1,τ(i)1∗2},i=0,1,2,⋯, | (3.34) |
where τ(i)1∗1 and τ(i)1∗2 are defined by Eq (3.31) and Eq (3.33), respectively. Multiplying eλτ1∗ on both sides of Eq (3.28), and then after deriving from τ to λ, we can get
[dλdτ1∗]−1=−[X′0(λ)+X′2(λ)]eλτ1∗+[X′1(λ)+X′3(λ)]+[X′4(λ)+X′5(λ)]e−λτ1∗−λ[X0(λ)+X2(λ)]e−λτ1∗+λ[X4(λ)+X5(λ)]eλτ1∗−τ1∗λ. | (3.35) |
According to the Hopf bifurcation theorem [17], if the surmise (G11): Re[dλ/dτ1∗]−1τ1∗=τ1∗0≠0 is true, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable. Thus, we have Theorem 4.
Theorem 4. For system (1.2), when R0>1 and the conditions (G9)-(G11) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ1∗∈[0,τ1∗0); there is a Hopf bifurcation at E∗(S∗,I∗,Q∗,R∗) when τ1∗=τ1∗0.
Case 6. τ1∈[0,τ10), τ2>0. Assume that λ=iω5 is the root of Eq (3.2). For convenience, let ω5 be equal to ω2. Then, this case is similar as in Case 3. Then we can get
[X0(λ)+X1(λ)+X4(λ)]+[X2(λ)+X3(λ)+X5(λ)]e−λτ2∗=0, | (3.36) |
Substituting λ=iω5 into Eq.(3.36), we obtain
{C12cosτ2∗ω5+C22sinτ2∗ω5=D12,C22cosτ2∗ω5−C12sinτ2∗ω5=D22, | (3.37) |
with
C12=−X22ω25+X02+X03+X05−X23ω25,C22=−X32ω35+X12ω5+X13ω5+X15ω5,D12=X20ω25+X21ω25+X24ω25−ω45−X00−X01−X04,D22=X30ω35+X31ω35−X10ω5−X11ω5−X14ω5, |
Squaring both sides of two equations in Eq.(3.37), and adding them up, we obtain
C212+C222=D212+D222. | (3.38) |
We suppose that (G12): Eq (3.38) has at least one positive real root ω50. Then, from Eq (3.36), we derive
τ(i)2∗=1ω50×[arccosC13D13+C13D13C213+C223+2iπ], | (3.39) |
where i=0,1,2,⋯.
Define
τ2∗0=min{τ(i)2∗,1=0,1,2,⋯}, | (3.40) |
and τ(i)2∗ is defined by Eq (3.39).
Taking the derivative of λ with respect to τ, we obtain
[dλdτ2∗]−1=−X′0+X′1+X′4λ[X0+X1+X4]+X′2+X′3+X′5λ[X2+X3+X5]−τ2∗λ, | (3.41) |
Thus, it is easy to obtain the expression of Re[dλ/dτ2∗]−1τ2∗=τ2∗0. Based on the Hopf bifurcation theorem [17], when the hypothesis (G13): Re[dλ/dτ2∗]−1τ2∗=τ2∗0≠0 is true. In conclusion, Theorem 5 can be gotten.
Theorem 5. For system (1.2), when R0>1 and the conditions (G12)-(G13) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ2∗∈[0,τ2∗0); there is a Hopf bifurcation at E∗(S∗,I∗,Q∗,R∗) when τ2∗=τ2∗0.
Center manifold theory is one of the important theories for studying Hopf bifurcation. Considering this idea, in this section, we use the method in [18,19] to study direction and stability of Hopf bifurcation of system (1.2). We assume that τ∗2<τ∗1, where τ∗2∈(0,τ20). Let τ1=τ∗1+ϖ(ϖ∈R), χ1=S(τ1t), χ2=I(τ1t), χ3=Q(τ1t), χ4=R(τ1t). System (1.2) becomes
˙χ(t)=Lϖ(χt)+F(ϖ,χt), | (4.1) |
where χ(t)=(χ1,χ2,χ3,χ4)T∈C=C([−1,0],R4) and Lϖ: C→R4 and F: R×C→R4 are defined as
Lϖφ=(τ∗1+ϖ)(L′φ(0)+M′φ(−τ∗2τ∗1)+N′φ(−1)), | (4.2) |
and
F(ϖ,φ)=(τ∗1+ϖ)[F1,F2,0,0]T, | (4.3) |
with
L′=(l110000l22000l32l3300l42l43l44),M′=(0m1200m21m220000000000),N′=(000n1400000000000n44), |
and
F1=h11φ1(0)φ2(0)+h12φ21(0)+h13φ21(0)φ2(0)+h14φ31(0)+⋯,F2=h21φ1(0)φ2(0)+h22φ21(0)+h23φ21(0)φ2(0)+h24φ31(0)+⋯, |
h11=−β(1+σS∗)2,h12=−2σβI∗(1+σS∗)3,h13=2σβ(1+σS∗)3,h14=6σ2βI∗(1+σS∗)4,h21=β(1+σS∗)2,h22=2σβI∗(1+σS∗)3,h23=−2σβI∗(1+σS∗)3,h24=−6σ2βI∗(1+σS∗)4. |
According to Riesz representation theorem, there exists η(ϑ,ϖ) and ϑ∈[−1,0) such that
Lϖφ=∫0−1dη(ϑ,ϖ)φ(ϑ). | (4.4) |
In fact, we choose
η(ϑ,ϖ)={(τ∗1+ϖ)(L′+M′+N′),ϑ=0,(τ∗1+ϖ)(M′+N′),ϑ∈[−τ∗2τ∗1,0),(τ∗1+ϖ)(N′),ϑ∈(−1,−τ∗2τ∗1),0,ϑ=−1. | (4.5) |
with ϕ(ϑ) is the Dirac delta function.
For φ∈C([−1,0],R4), define
A(ϖ)φ={dφ(ϑ)dϑ,−1≤ϑ<0,∫0−1dη(ϑ,ϖ)φ(ϑ),ϑ=0, |
and
R(ϖ)φ={0,−1≤ϑ<0,F(ϖ,φ),ϑ=0. |
Then system (1.2) is equivalent to
˙χ(t)=A(ϖ)χt+R(ϖ)χt. | (4.6) |
For ψ∈C1([0,1],(R4)∗), define
A∗(ψ)={−dψ(s)ds,0<s≤1,∫0−1dηT(s,0)ψ(−s),s=0, |
and the bilinear inner form for A(0) and A∗
⟨ψ(s),φ(ϑ)⟩=ˉψ(0)φ(0)−∫0ϑ=−1∫ϑζ=0ˉψ(ζ−ϑ)dη(ϑ)φ(ζ)dζ, | (4.7) |
where η(ϑ)=η(ϑ,0).
Let u(ϑ)=(1,u2,u3,u4)Teiτ∗1ω∗1ϑ and u∗(s)=D(1,u∗2,u∗3,u∗4)Teiτ∗1ω∗1s. Based on definitions of A(0) and A∗(0), one can obtain
u2=m21e−iτ∗1ω∗1iω∗1−l22−m22e−iτ∗1ω∗1,u3=l32u2iω∗1−l33,u4=l42u2+l43u3iω∗1−l44−n44e−iτ∗2ω∗1,u∗2=−iω∗1+l11m21eiτ∗1ω∗1,u∗3=−l43u∗2iτ∗1ω∗1+l33,u∗4=−n14eiτ∗2ω∗1l44+n14eiτ∗2ω∗1+iω∗1. |
Then, we have
ˉD=[1+u2ˉu∗2+u3ˉu∗3+u4ˉu∗4+τ∗1e−iτ∗1ω∗1u2(m12+m22ˉu∗2)+τ∗1e−iτ∗1ω∗1m21ˉu∗2+τ∗2e−iτ∗2ω∗1u4(n14+n44ˉu∗4)]−1. |
Next, g20, g11, g02 and g21 can be obtained with aid of the method in [20]:
g20=2τ∗1ˉD[h11u2+h12+ˉu∗2(h21u2+h22)],g11=τ∗1ˉD[h11(u2+ˉu2)+2h12+ˉu∗2h21(u2+ˉu2)+2h22ˉu∗2)],g20=2τ∗1ˉD[h11ˉu2+h12+ˉu∗2h21ˉu2+h22ˉu∗2)],g21=2τ∗1ˉD[h11(u2W(1)11(0)+12W(1)20(0)ˉu2+W(2)11(0)+12W(2)20(0))+h12(W(2)11(0)+W(1)20(0))+h13(2u2+ˉu2)+3h14+ˉu∗2h21(W(1)11(0)u2+12W(1)20(0)ˉu2+W(2)11(0)+12W(2)20(0))+h22ˉu∗2(W(2)11(0)+W(1)20(0))+h22(2u2+ˉu2)+3h24], |
with
W20(ϑ)=ig20u(0)τ∗1ω∗1eiτ∗1ω∗1ϑ+iˉg02ˉu(0)3τ∗1ω∗1e−iτ∗1ω∗1ϑ+P1e2iτ∗1ω∗1ϑ,W11(θ)=−ig11u(0)τ∗1ω∗1eiτ∗1ω∗1ϑ+iˉg11ˉu(0)τ∗1ω∗1e−iτ∗1ω∗1ϑ+P2. |
P1 and P2 can be computed by
P1=2(l∗11−m12e−iτ∗1ω∗10−n14e−iτ∗2ω∗1−m21e−iτ∗1ω∗1l∗22000−l32l∗3300−l42−l43l∗44)−1×(P(1)1P(2)100), |
P2=−(l11+m11m120n14m21l22+m22000l32l3300l42l43l44+n44)−1×(P(1)2P(2)200). |
where
l∗11=2iω∗1−l11−m11e−iτ∗1ω∗1,l∗22=2iω∗1−l22−m22e−iτ∗1ω∗1,l∗33=2iω∗1−l33,l∗44=2iω∗1−l44−n44e−iτ∗2ω∗1, |
and
P(1)1=h11u2+h12,P(2)1=h21u2+h22,P(1)2=h11(u2+ˉu2)+2h12,P(2)2=h21(u2+ˉu2)+2h22. |
Then, we can obtain
C1(0)=i2τ∗1ω∗1(g11g20−2|g11|2−|g02|23)+g212μ2=−Re{C1(0)}Re{λ′(τ∗1)},β2=2Re{C1(0)},T2=−Im{C1(0)}+μ2Im{λ′(τ∗1)}τ∗1ω∗1, | (4.8) |
Thus, we have Theorem 6 about the Hopf bifurcation at τ∗1.
Theorem 6. For system (1.2), the following results hold. If μ2>0 (μ2<0), then the Hopf bifurcation is supercritical (subcritical); If β2<0 (β2>0), then the bifurcating periodic solutions are stable (unstable); If T2>0 (T2<0), then the period of the bifurcating periodic solutions increase (decrease).
In order to identify the correctness of above results, some parameters are used to numerical simulations. The values of all parameters are shown in Table 1.
Parameter | Value | Source |
b | 1 | [13] |
p | 0.9 | [13] |
β | 0.65 | [13] |
σ | 0.4 | [13] |
d | 0.1 | assumed |
δ | 0.7 | [13] |
ε | 0.14 | assumed |
γ | 0.3 | [13] |
η | 0.1 | assumed |
α1 | 0.1 | assumed |
α2 | 0.18 | assumed |
Then, system (1.2) takes the form
{dS(t)dt=0.1−0.65S(t−τ1)I(t−τ1)1+0.4S(t−τ1)−0.1S(t)+0.7R(t−τ2),dI(t)dt=0.65S(t−τ1)I(t−τ1)1+0.4S(t−τ1)−0.64I(t),dQ(t)dt=0.14I(t)−0.48Q(t),dR(t)dt=0.9+0.1Q(t)+0.3I(t)−0.7R(t−τ2)−0.1R(t), | (5.1) |
from which we can obtain R0=1.98>1 and E∗(1.6244,2.0598,0.7739,2.0011).
To verify Theorem 1, we use Matlab software and obtain ω10=0.0786 and τ10=9.3985. Figure 1 shows that system (5.1) is locally asymptotically stable when τ1∈[0,τ10), τ2=0 and a Hopf bifurcation arises when τ1=τ10. After that, from Figure 2, system (5.1) becomes unstable when τ1>τ10.
In the same way, we apply Matlab software to verify Theorem 2. Then, we obtain ω20=0.3307 and τ20=2.2352. From Figure 3, system (5.1) is locally asymptotically stable when τ1=0, τ2∈[0,τ20), and a Hopf bifurcation arises when τ2=τ20. Otherwise, system (5.1) becomes unstable when τ2>τ20 in Figure 4.
A short calculation revealed that ω30=0.3833 and τ∗0=1.9282. Afterwards, Figure 5 shows that system (5.1) is locally asymptotically stable when τ1=τ2∈[0,τ∗0), and it can be seen a Hopf bifurcation when τ1=τ2=τ∗0. Figure 6 shows that system (5.1) becomes unstable when τ1=τ2>τ∗0.
It is easy to obtain ω40=0.0710 and τ1∗0=10.4056. When τ1∈[0,τ1∗0), τ2∈[0,τ20), system (1.2) is locally asymptotically stable, and system (5.1) undergoes a Hopf bifurcation when τ1=τ1∗0. Once τ1>τ1∗0, system (5.1) becomes unstable. The corresponding simulations are shown in Figure 7 and Figure 8.
Through simple calculation, ω50=0.3971 and τ2∗0=1.8612 can be got. As Figure 9 shows, system (5.1) is locally asymptotically stable when τ1∈[0,τ10), τ2∈[0,τ2∗0) and a Hopf bifurcation arises when τ2=τ2∗0. And we can see that system (5.1) becomes unstable when τ2>τ2∗0 in Figure 10.
In this paper, we propose a novel Susceptible-Infected-Quarantined-Recovered (SIQRS) computer virus propagation model with quarantine strategy based on the model formulated in [13]. We consider not only incubation period delay, but also temporary immunization time delay when we observe the dynamics of the SIQRS model. The local stability of the virus-free equilibrium and the virus-existent equilibrium also has been discussed. Furthermore, we analyze the local stability and Hopf bifurcation under another five cases with different delays. If τ is less than the key value, system (1.2) is local stable; otherwise, there is a Hopf bifurcation. Then, we determine the direction of Hopf bifurcation and the stability of bifurcating periodic solutions by using the normal form and center manifold theorem. Ultimately, some numerical simulations are used to prove the validity of the theoretical results.
Compared with the model in [13], our novel model consider quarantine strategy, which is used to the prevention and cure of computer virus, so our model is closer to the actual situation. Furthermore, incubation period is one of the significant characteristics of computer virus, and it is very important to take the latency delay into account. Nowadays, antivirus software, which enable computers to gain temporary immunity, plays a very important role in the defense of computer virus. Temporary immunity delay is a common phenomena in real life. In our SIQRS model, the above cases are taken into account at the same time, and our model has more reference value over the existing ones. Global asymptotic stability is as important as local asymptotic stability, and it will be studied in the future.
This research was supported by the Natural Science Foundation of the Higher Education Institutions of Anhui Province (No.KJ2020A0002), the Project of Natural Science Foundation of Anhui Province (No.2008085QA09) and National Natural Science Research Foundation Project (No.12061033).
The authors declare that there are no conflicts of interest regarding the publication of this paper.
[1] | The 46th China Statistical Report on Internet Development, September, 2020. Available from: http://info.hebau.edu.cn/upload/files/2020/10/af9266d1e4e0cc8b.pdf. |
[2] | R. Zhang, Y. Deng, Analysis of computer virus epidemic situation in October 2019, Netinfo Security, 12 (2019), 93–93. |
[3] |
P. C. Xiao, Z. Y. Zhang, X. B. Sun, Smoking dynamics with health education effect, AIMS Mathematics, 3 (2018), 584–599. doi: 10.3934/Math.2018.4.584
![]() |
[4] |
J. L.Dimi, T. Mbaya, Dynamics analysis of stochastic tuberculosis model transmission withimmune response, AIMS Mathematics, 3 (2018), 391–408. doi: 10.3934/Math.2018.3.391
![]() |
[5] |
M. A. Khan, S. Ullah, M. Farhan, The dynamics of Zika virus with Caputo fractional derivative, AIMS Mathematics, 4 (2019), 134–146. doi: 10.3934/Math.2019.1.134
![]() |
[6] |
O. Kostylenko, H. S. Rodrigues, D. F. M. Torres, The spread of a financial virus through Europe and beyond, AIMS Mathematics, 4 (2019), 86–98. doi: 10.3934/Math.2019.1.86
![]() |
[7] | J. O. Kephart, S. R. White, Directed-graph Epidemiological Models of Computer Viruses, Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1 (1991), 343–359. |
[8] |
X. Y. Liang, Y. Z. Pei, Y. F. Lv, Modeling the state dependent impulse control for computer virus propagation under media coverage, Physica A, 491 (2018), 516–527. doi: 10.1016/j.physa.2017.09.058
![]() |
[9] | W. Pan, Z. Jin, Edge-based modeling of computer virus contagion on atripartite graph, Appl. Math. Comput., 320 (2018), 282–291. |
[10] |
R. K. Upadhyay, P. Singh, Modeling and control of computer virus attack on a targetednetwork, Physica A, 538 (2020), 122617. doi: 10.1016/j.physa.2019.122617
![]() |
[11] | J. Singh, D. Kumar, Z. Hammouch, A. Atangana, Afractional epidemiological for computer viruses pertaining to a new fractional derivative, Appl. Math. Comput., 316 (2018), 504–515. |
[12] |
J. G. Ren, X. F. Yang, L. X. Yang, Y. H. Xu, F. Z. Yang, A delayed computer virus propagation model and its dynamics, Chaos Solitons and Fractals, 45 (2012), 74–79. doi: 10.1016/j.chaos.2011.10.003
![]() |
[13] | V. MadhuSudanan, R. Greetha, Dynamics of epidemic computer virus spreading model with delays, Wireless Pers. Commun., 8 (2020), 1–14. |
[14] |
U. Fatima, M. Ali, N. Ahmed, et al., Numerical modeling of susceptible latent breaking-out quarantine computer virus epidemic dynamics, Heliyon, 4 (2018), e00631. doi: 10.1016/j.heliyon.2018.e00631
![]() |
[15] | Y. H. Zheng, J. H. Zhu, C. A. Lai, A SEIQR Model considering the Effects of Different Quarantined Rates on Worm Propagation in Mobile Internet, Math. Probl. Eng., 2020 (2020), 1–16. |
[16] | P. van den Driessche, J. Watmough, Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission, Math. Biosci., 180 (2020), 29–48. |
[17] | K. R. Meyer, Theory and applications of Hopf bifurcation, SIAM Rev., 24 (2006), 498–499. |
[18] |
Y. Z. Bai, Y. Y. Li, Stability and Hopf bifurcation for a stage-structured predator-prey model incorporating refuge for prey and additional food for predator, Adv. Differ. Equ., 2019 (2019), 1–20. doi: 10.1186/s13662-018-1939-6
![]() |
[19] |
C. Li, X. F. Liao, The impact of hybrid quarantine strategies and delay factor on viral prevalence in computer networks, Math. Model. Nat. Pheno., 11 (2016), 105–119. doi: 10.1051/mmnp/201611408
![]() |
[20] | Q. W. Gao, J. Zhuang, Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model, Appl. Math. Comput., 368 (2020), 124584. |
1. | Ge Zhang, Zhiming Li, Anwarud Din, A stochastic SIQR epidemic model with Lévy jumps and three-time delays, 2022, 431, 00963003, 127329, 10.1016/j.amc.2022.127329 | |
2. | Jiaxing Chen, Chengyi Xia, Matjaž Perc, The SIQRS Propagation Model With Quarantine on Simplicial Complexes, 2024, 11, 2329-924X, 4267, 10.1109/TCSS.2024.3351173 | |
3. | Haokuan Cheng, Min Xiao, Yunxiang Lu, Haibo Bao, Leszek Rutkowski, Jinde Cao, Complex pattern evolution of a two-dimensional space diffusion model of malware spread, 2024, 99, 0031-8949, 045237, 10.1088/1402-4896/ad30ee | |
4. | Linji Yang, Qiankun Song, Yurong Liu, Stability and Hopf bifurcation analysis for fractional-order SVEIR computer virus propagation model with nonlinear incident rate and two delays, 2023, 547, 09252312, 126397, 10.1016/j.neucom.2023.126397 | |
5. | Jie 杰 Gao 高, Jianfeng 建锋 Luo 罗, Xing 星 Li 李, Yihong 毅红 Li 李, Zunguang 尊光 Guo 郭, Xiaofeng 晓峰 Luo 罗, Triadic percolation in computer virus spreading dynamics, 2025, 34, 1674-1056, 028701, 10.1088/1674-1056/ad9ff8 | |
6. | JunLing Wang, Xinxin Chang, Lei Zhong, A SEIQRS Computer Virus Propagation Model and Impulse Control With Two Delays, 2025, 0170-4214, 10.1002/mma.10721 |