Loading [MathJax]/jax/output/SVG/jax.js
Research article

Dynamics of a nonlinear SIQRS computer virus spreading model with two delays

  • Received: 06 November 2020 Accepted: 29 January 2021 Published: 04 February 2021
  • MSC : 34C23

  • In this paper, a Susceptible-Infected-Quarantined-Susceptible (SIQRS) computer virus propagation model with nonlinear infection rate and two-delay is formulated. The local stability of virus-free equilibrium without delay is examined. Furthermore, we also expound and prove that time-delay plays a crucial role in sufficient conditions for the local stability of the virus-existence equilibrium and the occurrence of Hopf bifurcation at the critical value. Especially, direction and stability of the Hopf bifurcation are demonstrated. Finally, some numerical simulations are presented in order to verify the theoretical results.

    Citation: Fangfang Yang, Zizhen Zhang. Dynamics of a nonlinear SIQRS computer virus spreading model with two delays[J]. AIMS Mathematics, 2021, 6(4): 4083-4104. doi: 10.3934/math.2021242

    Related Papers:

    [1] Jagdev Singh, Jitendra Kumar, Devendra kumar, Dumitru Baleanu . A reliable numerical algorithm based on an operational matrix method for treatment of a fractional order computer virus model. AIMS Mathematics, 2024, 9(2): 3195-3210. doi: 10.3934/math.2024155
    [2] Khalaf M. Alanazi . The asymptotic spreading speeds of COVID-19 with the effect of delay and quarantine. AIMS Mathematics, 2024, 9(7): 19397-19413. doi: 10.3934/math.2024945
    [3] Wajaree Weera, Thongchai Botmart, Teerapong La-inchua, Zulqurnain Sabir, Rafaél Artidoro Sandoval Núñez, Marwan Abukhaled, Juan Luis García Guirao . A stochastic computational scheme for the computer epidemic virus with delay effects. AIMS Mathematics, 2023, 8(1): 148-163. doi: 10.3934/math.2023007
    [4] Xin Jiang . Threshold dynamics of a general delayed HIV model with double transmission modes and latent viral infection. AIMS Mathematics, 2022, 7(2): 2456-2478. doi: 10.3934/math.2022138
    [5] Kalpana Umapathy, Balaganesan Palanivelu, Renuka Jayaraj, Dumitru Baleanu, Prasantha Bharathi Dhandapani . On the decomposition and analysis of novel simultaneous SEIQR epidemic model. AIMS Mathematics, 2023, 8(3): 5918-5933. doi: 10.3934/math.2023298
    [6] Liang Hong, Jie Li, Libin Rong, Xia Wang . Global dynamics of a delayed model with cytokine-enhanced viral infection and cell-to-cell transmission. AIMS Mathematics, 2024, 9(6): 16280-16296. doi: 10.3934/math.2024788
    [7] Ahmed M. Elaiw, Ghadeer S. Alsaadi, Aatef D. Hobiny . Global co-dynamics of viral infections with saturated incidence. AIMS Mathematics, 2024, 9(6): 13770-13818. doi: 10.3934/math.2024671
    [8] Jinting Lin, Changjin Xu, Yiya Xu, Yingyan Zhao, Yicheng Pang, Zixin Liu, Jianwei Shen . Bifurcation and controller design in a 3D delayed predator-prey model. AIMS Mathematics, 2024, 9(12): 33891-33929. doi: 10.3934/math.20241617
    [9] Heping Jiang . Complex dynamics induced by harvesting rate and delay in a diffusive Leslie-Gower predator-prey model. AIMS Mathematics, 2023, 8(9): 20718-20730. doi: 10.3934/math.20231056
    [10] Sahabuddin Sarwardi, Hasanur Mollah, Aeshah A. Raezah, Fahad Al Basir . Direction and stability of Hopf bifurcation in an eco-epidemic model with disease in prey and predator gestation delay using Crowley-Martin functional response. AIMS Mathematics, 2024, 9(10): 27930-27954. doi: 10.3934/math.20241356
  • In this paper, a Susceptible-Infected-Quarantined-Susceptible (SIQRS) computer virus propagation model with nonlinear infection rate and two-delay is formulated. The local stability of virus-free equilibrium without delay is examined. Furthermore, we also expound and prove that time-delay plays a crucial role in sufficient conditions for the local stability of the virus-existence equilibrium and the occurrence of Hopf bifurcation at the critical value. Especially, direction and stability of the Hopf bifurcation are demonstrated. Finally, some numerical simulations are presented in order to verify the theoretical results.



    Since the first personal computer came out in 1980, computers gradually appeared in our daily life. In 1995, the emergence of the Internet further promoted the computers into all fields of production and living. By June 2020, China's Internet users had reached 940 million, an increase of 36.25 million compared with March 2020, and the Internet penetration rate reached 67.0%, an increase of 2.5 percentage points compared with March 2020 [1]. Computer network is a sharp double-edged sword, bringing conveniences as well as disasters. In October 2019, a total of 44.23 million new viruses was found in the National Computer Virus Emergency Response Center and 218.04 million computers were infected, which was 1.78% higher than that in September, and the main transmission channels were "phishing", "webpage pegging" and loopholes [2]. The propagation of computer virus has become more rapid and harmful, posing serious changes. In the early October 2019, Demant, the world's largest hearing aid manufacturer, was invaded by blackmail virus, resulting in a direct economic loss of more than 95 million dollars. Fractional derivative equations are often used to study the dynamic behavior of systems, which can help us understand the evolution law of the system [3,4,5,6]. Consequently, it is of great practical significance to analyze the propagation of computer virus to protect computers against viruses by use fractional derivative equations.

    Some mathematical models, which characterized the spread of computer viruses over the internet, were proposed to help us study the problem quantitatively. There are many similarities between computer virus and biological virus, such as infectivity, destructiveness, variability and so on. Based on these similarities, J. O. Kephart and S. R. White applied the mathematical models of epidemics to the computer virus propagation model creatively [7]. On this foundation, many computer virus models have been established [8,9,10]. Singh et al. [11] considered a fractional epidemiological SIR model with an arbitrary order derivative having nonsingular kernel, and discussed the existence of the solution. Considering that the recovered nodes may become susceptible again once some new viruses appear or the known computer viruses mutate, Chen et al. [12] presented a new SIRS model. But they all assumed the infection rate in models is bilinear. But in fact, this situation is not the case. In most realistic situations, the bilinear infection rate is always impossible to achieve due to the increase of the susceptible computers and infectious computers. In view of the nonlinear infection rate, both of the inhibition effect owing to the uncertain behavior of susceptible computers and the crowding effect of infectious computers are considered at the same time.

    Considering that the network topology in the proliferation of virus may lead to nonlinear infection rate, MadhuSudanan et al. [13] formulated a computer viruses model with nonlinear infection rate and incubation period delay:

    {dS(t)dt=(1p)bβS(tτ)I(tτ)1+σS(tτ)dS(t)+δR(t),dI(t)dt=βS(tτ)I(tτ)1+σS(tτ)(d+α+γ)I(t),dR(t)dt=pb+γI(t)(d+δ)R(t), (1.1)

    where S(t), I(t), R(t) represent the number of susceptible computers, infected computers and recovered computers at time t, respectively. The meanings of all the parameters in system (1.1) can be referred to [13].

    Quarantine strategy generally refers to the control of individuals with abnormal performance, so as to prevent others from being infected by viruses. Quarantine strategy is an important measure for the treatment of infectious diseases. It can not only conduct centralized management and treatment for infected individuals, but also effectively control the source of infection and greatly reduce the number of contacts. Later, inspired by the biological infectious disease model, many scholars applied the quarantine strategy to the research of computer virus model, and put forward a series of models accordingly [14,15]. Hence, quarantine strategy should be introduced into the computer virus model. The effect of Anti-virus can protect recovered computers from the known viruses, however, as time goes on, Anti-virus may lose function as a result of the emergence of new viruses and the variation of known viruses, and the update speed of anti-virus software is always slower than that of new virus. So it needs a short time before entering susceptible state, called the temporary immune time delay. Considering the effect of quarantine strategy and the existence of temporary immune time delay, we investigate a new SIQRS computer virus model with two delays:

    {dS(t)dt=(1p)bβS(tτ1)I(tτ1)1+σS(tτ1)dS(t)+δR(tτ2),dI(t)dt=βS(tτ1)I(tτ1)1+σS(tτ1)(d+α1+γ+ε)I(t),dQ(t)dt=εI(t)(η+d+α2)Q(t),dR(t)dt=pb+γI(t)+ηQ(t)dR(t)δR(tτ2), (1.2)

    where Q(t) is the number of quarantine computers at time t; α1 is the death rate of infected computers due to virus; α2 is the death rate of quarantine computers due to virus; ε is the quarantine rate of infected computers; η is the recovered rate of the quarantine computers; τ1 is the incubation period delay; τ2 is the temporary immune time delay before the recovered computers come into the susceptible status.

    When the system (1.2) reaches the virus-free equilibrium, there is no virus, namely I0=0. Let us equate system (1.2) to be zero, we can obtain:

    {δR0+(1p)bβS0I01+σS0dS0=0,βS0I01+σS0(d+α1+γ+ε)I0=0,εI0(η+d+α2)Q0=0,γI0+ηQ0+pb(d+δ)R0=0, (2.1)

    Then, then system (1.2) has a virus-free equilibrium E0(S0,I0,Q0,R0). Here,

    S0=δb+bd(1p)d(d+δ),I0=0,Q0=0,R0=pbd+δ.

    The basic regeneration number is the critical threshold to determine whether there is a virus in system (1.2). According to the way in [16], it is easy to obtain the basic regeneration number of system (1.2). Let X=(I,S,Q,R)T, then system (1.2) can be equivalent to dX(t)dt=FV, where

    F=(βSI1+σS000),V=((d+α1+η+γ)I(1p)b+βSI1+σS+dS+δR(η+d+α2)QεIdR+δRηQγIpb).

    The infected compartment is I, giving m=1, then the Jacobian matrixes of F and V at E0(S0,I0,Q0,R0) are

    F=(βS01+σS0),V=(d+α1+η+γ).

    Then

    R0=βS0(1+σS0)(d+α1+γ+ε). (2.2)

    If R0<1, then system (1.2) has a virus-free equilibrium E0(S0,I0,Q0,R0). The Jacobian matrix of system (1.2) at E0(S0,I0,Q0,R0) is

    J(E0)=(dβS01+σS00δ0βS01+σS0(d+α1+γ+ε)000ε(η+d+α2)00γη(d+δ)),

    The corresponding characteristic equation becomes

    (λ+d)(λβS01+σS0+d+α1+γ+ε)(λ+d+η+α2)(λ+d+δ)=0. (2.3)

    Then the eigenvalues of Eq.(2.3) are

    λ1=d<0,λ2=βS01+σS0(d+α1+γ+ε)<0,λ3=(d+η+α2)<0,λ4=(d+δ)<0,

    So, when all the eigenvalues are less than zero, the virus-free equilibrium of system (1.2) is locally stable according to Routh-Hurwitz criteria.

    If R0=βS0(1+σS0)(d+α1+γ+ε)>1, then system (1.2) has a unique virus-existence equilibrium E(S,I,Q,R). Here,

    S=d+α1+γ+εβσ(d+α1+γ+ε),I=(d+δ)dS(d+δ)(1p)bδpbk1+δγk2,Q=εη+d+α2I,R=pb+γI+ηQd+δ,

    where

    k1=δηεη+d+α2,k2=(δ+d)βS1+σS.

    The linearized part of system (1.2) is

    {dS(t)dt=l11S(t)+m11S(tτ1)+m12I(tτ1)+n14R(tτ2),dI(t)dt=m21S(tτ1)+l22I(t)+m22I(tτ1),dQ(t)dt=l32I(t)+l33Q(t),dR(t)dt=l42I(t)+l43Q(t)+l44R(t)+n44R(tτ2), (3.1)

    where

    l11=d,m11=βI(1+σS)2,m12=βS1+σS,n14=δ,m21=βI(1+σS)2,m22=βS1+σS,l22=(d+α1+γ+ε),l32=ε,l33=(η+d+α2),l42=γ,l43=η,l44=d,n44=δ,

    From the system (3.1), we can obtain that

    X0(λ)+X1(λ)eλτ1+X2(λ)eλτ2+X3(λ)eλ(τ1+τ2)+X4(λ)e2λτ2+X5(λ)eλ(2τ1+τ2)=0, (3.2)

    where

    X0(λ)=λ4+λ3(l11l22l33l44)+λ2(l11l22+l11l33+l11l44+l22l33+l22l44+l33l44)+λ(l11l22l33l11l22l44l11l33l44l22l33l44)+l11l22l33l44,X1(λ)=λ3(m11m22)+λ2(l11m22+l22m11+l33m11+l33m22+l44m11+l44m22)+λ(l33l44m22l11l44m22l11l33m22l33l44m11l22l44m11l22l33m11)+l22l33l44m22+l22l33l44m11,X2(λ)=n44λ3+λ2(l11n44+l22n44+l33n44)+λ(l11l22n44l11l33n44l22l33n44)+l11l22l33n44,X3(λ)=λ2(m11n44+m22n44)+λ(l11m22n44l22m22n44l33m11n44l33m22n44+l42m21n44)+(l11l33m22n44+l22l33m11n44+l32l43m21n14l33l42m21n14),X4(λ)=λ2(m11m22+m12m21)+λ(l33m11m22l44m11m22l33m12m21l44m12m21)+l33l44m11m22+l33l44m12m21,X5(λ)=λ(m11m22n44m12m21n44)+l33m11m22n44+l33m12m21n44.

    Case 1. τ1=τ2=0, Eq (3.2) becomes

    λ4+X30λ3+X20λ2+X10λ+X00=0, (3.3)

    where Xji(i=0,1,2,3,4,5;j=0,1,2,3,4) represents the coefficient of λj in Xi(λ).

    Lemma 1 [13]. According to Routh-Hurwitz criteria, when R0>1, the virus-existence equilibrium E(S,I,Q,R) is locally asymptotically stable.

    Case 2. τ1>0, τ2=0. Then, Eq (3.2) becomes

    [X0(λ)+X2(λ)]+[X1(λ)+X3(λ)]eλτ1+[X4(λ)+X5(λ)]e2λτ1=0. (3.4)

    Taking λ=iω1 into Eq (3.4) and separating the real and imaginary parts, we obtain

    {A11cosτ1ω1+A21sinτ1ω1+B11=A31sin2τ1ω1+A41cos2τ1ω1,A21cosτ1ω1A11sinτ1ω1+B21=A31cos2τ1ω1A41sin2τ1ω1, (3.5)

    with

    A11=X01X21ω21+X03X23ω21,A21=X11ω1X31ω31+X13ω1,A31=X14ω1+X15ω1,A41=X24ω21X04X05,B11=ω41X20ω21+X00X22ω21+X02,B21=X10ω11X30ω31X32ω31X12ω1,

    Because cos2τ1ω1+sin2τ1ω1=1, sinτ1ω1=±1cos2τ1ω1.

    (1) If sinτ1ω1=1cos2τ1ω1, after calculation, we have

    A211+A221+B211+B221A231A241+2(A11B11+A21B21)cosτ1ω1+2(B11A21A11B21)1cos2τ1ω1=0. (3.6)

    Let f1(ω1)=cosτ1ω1, and we suppose that (G1): f1(ω1)=cosτ1ω1 has at least a positive root ω11, which makes Eq (3.6) true. Thus,

    τ(i)11=1ω11×[arccos(f1(ω11))+2iπ],i=0,1,2,. (3.7)

    (2) If sinτ1ω1=1cos2τ1ω1, after calculation, we have

    A211+A221+B211+B221A231A241+2(A11B11+A21B21)cosτ1ω1+2(A11B21A21B11)1cos2τ1ω1=0. (3.8)

    Let g1(ω1)=cosτ1ω1, and we suppose that (G2): g1(ω1)=cosτ1ω1 has at least a positive root ω12, which makes Eq (3.8) true. Thus,

    τ(i)12=1ω12×[arccos(g1(ω12))+2iπ],i=0,1,2,. (3.9)

    Define

    τ10=min{τ(i)11,τ(i)12},i=0,1,2,, (3.10)

    where τ(i)11 and τ(i)12 are defined by Eq (3.7) and Eq (3.9), respectively.

    Multiplying eλτ1 on both sides of Eq (3.4), and then after deriving from τ to λ, we can get

    [dλdτ1]1=[X0(λ)+X2(λ)]eλτ1+[X1(λ)+X3(λ)]+[X4(λ)+X5(λ)]eλτ1λ[X0(λ)+X2(λ)]eλτ1+λ[X4(λ)+X5(λ)]eλτ1τ1λ. (3.11)

    According to the Hopf bifurcation theorem [17], if the surmise (G3): Re[dλ/dτ1]1τ1=τ100 is true, the virus-existence equilibrium E(S,I,Q,R) is locally asymptotically stable. So, we have Theorem 1.

    Theorem 1. For system (1.2), when R0>1 and the conditions (G1)-(G3) hold, then E(S,I, Q,R) is locally asymptotically stable when τ1[0,τ10); there is a Hopf bifurcation at E(S,I, Q,R) when τ1=τ10.

    Case 3. τ1=0, τ2>0. Then Eq (3.2) becomes

    [X0(λ)+X1(λ)+X4(λ)]+[X2(λ)+X3(λ)+X5(λ)]eλτ2=0, (3.12)

    Substituting λ=iω2 into Eq (3.12), we obtain

    {C11cosτ2ω2+C21sinτ2ω2=D11,C21cosτ2ω2C11sinτ2ω2=D21, (3.13)

    with

    C11=X22ω22+X02+X03+X05X23ω22,C21=X32ω32+X12ω2+X13ω2+X15ω2,D11=X20ω22+X21ω22+X24ω22ω42X00X01X04,D21=X30ω32+X31ω32X10ω2X11ω2X14ω2,

    Squaring both sides of two equations in Eq (3.13), and adding them up, we obtain

    C211+C221=D211+D221. (3.14)

    We suppose that (G4): Eq (3.14) has at least one positive real root ω20. Then, from Eq (3.13), we derive

    τ(i)2=1ω20×[arccosC11D11+C21D21C211+C221+2iπ], (3.15)

    where i=0,1,2,.

    Define

    τ20=min{τ(i)2,i=0,1,2,}, (3.16)

    and τ(i)2 is defined by Eq (3.15).

    Taking the derivative of λ with respect to τ, we obtain

    [dλdτ2]1=X0+X1+X4λ[X0+X1+X4]+X2+X3+X5λ[X2+X3+X5]τ2λ, (3.17)

    Thus, it is easy to obtain the expression of Re[dλ/dτ2]1τ2=τ20. According to the Hopf bifurcation theorem [17], if the hypothesis (G5): Re[dλ/dτ2]1τ2=τ200 is true, the virus-existence equilibrium E(S,I,Q,R) is locally asymptotically stable. In conclusion, Theorem 2 can be obtained.

    Theorem 2. For system (1.2), when R0>1 and the conditions (G4)-(G5) hold, then E(S,I, Q,R) is locally asymptotically stable when τ2[0,τ20); there is a Hopf bifurcation at E(S,I, Q,R) when τ2=τ20.

    Case 4. τ1=τ2=τ. Then Eq (3.2) becomes

    X0(λ)+[X1(λ)+X2(λ)]eλτ+[X3(λ)+X4(λ)]e2λτ+X5(λ)e3λτ=0, (3.18)

    Multiplying eλτ on both sides of Eq (3.18), then we obtain

    X0(λ)eλτ+[X1(λ)+X2(λ)]+[X3(λ)+X4(λ)]eλτ+X5(λ)e2λτ=0, (3.19)

    Substituting λ=iω3 into Eq (3.19), we obtain

    {A12cosτω3+A22sinτω3=A32sin2τω3+A42cos2τω3,A22cosτω3A12sinτω3=A32cos2τω3A42sin2τω3, (3.20)

    with

    A12=X30ω33X10ω3X13ω3X14ω3,A22=ω43X20ω23X23ω23+X24ω23+X00X03X04,A22=ω43X20ω23X23ω23X24ω23+X00+X03+X04,A32=X15ω3,A42=X05,B12=X21ω23+X01X22ω23+X02,B22=X31ω33X32ω33+X11ω3+X12ω3,

    Squaring both sides of two equations in Eq (3.20), and adding them up, we obtain

    (A12cosτω3+A22sinτω3+B12)2+(A22cosτω3A12sinτω3+B22)2=A232+A242. (3.21)

    Because cos2τω3+sin2τω3=1, sinτω3=±1cos2τω3.

    (1) If sinτω3=1cos2τω3, after calculation, we have

    A212+A222+B212+B222A232A242+2(A12A22+A12B12+A22B12)cosτω3+2(A22B22A22A12A12B22)1cos2τω3=0. (3.22)

    Let f2(ω3)=cosτω3, and we suppose that (G6): f2(ω3)=cosτω3 has at least a positive root ω31, which makes Eq (3.22) true. Thus,

    τ(i)1=1ω31×[arccos(f2(ω31))+2iπ],i=0,1,2,. (3.23)

    (2) If sinτω3=1cos2τω3, after calculation, we have

    A212+A222+B212+B222A232A242+2(A12A22+A12B12+A22B12)cosτω32(A22B22A22A12A12B22)1cos2τω3=0. (3.24)

    Let g2(ω3)=cosτω3, and we suppose that (G7): g2(ω3)=cosτω3 has at least a positive root ω32, which makes Eq (3.24) true. Thus,

    τ(i)2=1ω32×[arccos(g2(ω32))+2iπ],i=0,1,2,. (3.25)

    Define

    τ0=min{τ(i)1,τ(i)2},i=0,1,2,, (3.26)

    where τ(i)1 and τ(i)2 are defined by Eq (3.23) and Eq (3.25), respectively.

    Then after deriving from τ to λ, we can get

    [dλdτ]1=X0(λ)eλτ+[X1(λ)+X2(λ)]+[X3(λ)+X4(λ)]eλτ+X5(λ)e2λτλX0(λ)eλτ+λ[X3(λ)+X4(λ)]eλτ+2λX5(λ)e2λττλ. (3.27)

    Based on the Hopf bifurcation theorem [17], if the surmise (G8): Re[dλ/dτ]1τ=τ00 is true, the virus-existence equilibrium E(S,I,Q,R) is locally asymptotically stable. Therefore, Theorem 3 can be obtained.

    Theorem 3. For system (1.2), when R0>1 and the conditions (G6)-(G8) hold, then E(S,I, Q,R) is locally asymptotically stable when τ[0,τ0); there is a Hopf bifurcation at E(S,I, Q,R) when τ=τ0.

    Case 5. τ1>0, τ2(0,τ20). For convenience, let ω4 be equal to ω1. Then, this case is similar as in Case 2.

    [X0(λ)+X1(λ)+X4(λ)]+[X1(λ)+X3(λ)]eλτ1+[X4(λ)+X5(λ)]e2λτ1=0. (3.28)
    {A13cosτ1ω4+A23sinτ1ω4+B13=A33sin2τ1ω4+A43cos2τ1ω4,A23cosτ1ω4A13sinτ1ω4+B23=A33cos2τ1ω4A43sin2τ1ω4, (3.29)

    with

    A13=X01X21ω24+X03X23ω24,A23=X11ω4X31ω34+X13ω4,A33=X14ω4+X15ω4,A43=X24ω24X04X05,B13=ω44X20ω24+X00X22ω24+X02,B23=X10ω14X30ω34X32ω34X12ω4,

    Because cos2τ1ω4+sin2τ1ω4=1, sinτ1ω4=±1cos2τ1ω4.

    (1) If sinτ1ω4=1cos2τ1ω4, after calculation, we have

    A213+A223+B213+B223A233A243+2(A13B13+A23B23)cosτ1ω4+2(B13A23A13B23)1cos2τ1ω4=0. (3.30)

    Let f3(ω4)=cosτ1ω4, and we suppose that (G9): f3(ω4)=cosτ1ω4 has at least a positive root ω41, which makes Eq (3.30) true. Thus,

    τ(i)11=1ω41×[arccos(f3(ω41))+2iπ],i=0,1,2,. (3.31)

    (2) If sinτ1ω4=1cos2τ1ω4, after calculation, we have

    A213+A223+B213+B223A233A243+2(A13B13+A23B23)cosτ1ω4+2(A13B23A23B13)1cos2τ1ω4=0. (3.32)

    Let g3(ω4)=cosτ1ω4, and we suppose that (G10): g3(ω4)=cosτ1ω4 has at least a positive root ω42, which makes Eq (3.32) true. Thus,

    τ(i)12=1ω42×[arccos(g3(ω42))+2iπ],i=0,1,2,. (3.33)

    Define

    τ10=min{τ(i)11,τ(i)12},i=0,1,2,, (3.34)

    where τ(i)11 and τ(i)12 are defined by Eq (3.31) and Eq (3.33), respectively. Multiplying eλτ1 on both sides of Eq (3.28), and then after deriving from τ to λ, we can get

    [dλdτ1]1=[X0(λ)+X2(λ)]eλτ1+[X1(λ)+X3(λ)]+[X4(λ)+X5(λ)]eλτ1λ[X0(λ)+X2(λ)]eλτ1+λ[X4(λ)+X5(λ)]eλτ1τ1λ. (3.35)

    According to the Hopf bifurcation theorem [17], if the surmise (G11): Re[dλ/dτ1]1τ1=τ100 is true, the virus-existence equilibrium E(S,I,Q,R) is locally asymptotically stable. Thus, we have Theorem 4.

    Theorem 4. For system (1.2), when R0>1 and the conditions (G9)-(G11) hold, then E(S,I, Q,R) is locally asymptotically stable when τ1[0,τ10); there is a Hopf bifurcation at E(S,I,Q,R) when τ1=τ10.

    Case 6. τ1[0,τ10), τ2>0. Assume that λ=iω5 is the root of Eq (3.2). For convenience, let ω5 be equal to ω2. Then, this case is similar as in Case 3. Then we can get

    [X0(λ)+X1(λ)+X4(λ)]+[X2(λ)+X3(λ)+X5(λ)]eλτ2=0, (3.36)

    Substituting λ=iω5 into Eq.(3.36), we obtain

    {C12cosτ2ω5+C22sinτ2ω5=D12,C22cosτ2ω5C12sinτ2ω5=D22, (3.37)

    with

    C12=X22ω25+X02+X03+X05X23ω25,C22=X32ω35+X12ω5+X13ω5+X15ω5,D12=X20ω25+X21ω25+X24ω25ω45X00X01X04,D22=X30ω35+X31ω35X10ω5X11ω5X14ω5,

    Squaring both sides of two equations in Eq.(3.37), and adding them up, we obtain

    C212+C222=D212+D222. (3.38)

    We suppose that (G12): Eq (3.38) has at least one positive real root ω50. Then, from Eq (3.36), we derive

    τ(i)2=1ω50×[arccosC13D13+C13D13C213+C223+2iπ], (3.39)

    where i=0,1,2,.

    Define

    τ20=min{τ(i)2,1=0,1,2,}, (3.40)

    and τ(i)2 is defined by Eq (3.39).

    Taking the derivative of λ with respect to τ, we obtain

    [dλdτ2]1=X0+X1+X4λ[X0+X1+X4]+X2+X3+X5λ[X2+X3+X5]τ2λ, (3.41)

    Thus, it is easy to obtain the expression of Re[dλ/dτ2]1τ2=τ20. Based on the Hopf bifurcation theorem [17], when the hypothesis (G13): Re[dλ/dτ2]1τ2=τ200 is true. In conclusion, Theorem 5 can be gotten.

    Theorem 5. For system (1.2), when R0>1 and the conditions (G12)-(G13) hold, then E(S,I, Q,R) is locally asymptotically stable when τ2[0,τ20); there is a Hopf bifurcation at E(S,I,Q,R) when τ2=τ20.

    Center manifold theory is one of the important theories for studying Hopf bifurcation. Considering this idea, in this section, we use the method in [18,19] to study direction and stability of Hopf bifurcation of system (1.2). We assume that τ2<τ1, where τ2(0,τ20). Let τ1=τ1+ϖ(ϖR), χ1=S(τ1t), χ2=I(τ1t), χ3=Q(τ1t), χ4=R(τ1t). System (1.2) becomes

    ˙χ(t)=Lϖ(χt)+F(ϖ,χt), (4.1)

    where χ(t)=(χ1,χ2,χ3,χ4)TC=C([1,0],R4) and Lϖ: CR4 and F: R×CR4 are defined as

    Lϖφ=(τ1+ϖ)(Lφ(0)+Mφ(τ2τ1)+Nφ(1)), (4.2)

    and

    F(ϖ,φ)=(τ1+ϖ)[F1,F2,0,0]T, (4.3)

    with

    L=(l110000l22000l32l3300l42l43l44),M=(0m1200m21m220000000000),N=(000n1400000000000n44),

    and

    F1=h11φ1(0)φ2(0)+h12φ21(0)+h13φ21(0)φ2(0)+h14φ31(0)+,F2=h21φ1(0)φ2(0)+h22φ21(0)+h23φ21(0)φ2(0)+h24φ31(0)+,
    h11=β(1+σS)2,h12=2σβI(1+σS)3,h13=2σβ(1+σS)3,h14=6σ2βI(1+σS)4,h21=β(1+σS)2,h22=2σβI(1+σS)3,h23=2σβI(1+σS)3,h24=6σ2βI(1+σS)4.

    According to Riesz representation theorem, there exists η(ϑ,ϖ) and ϑ[1,0) such that

    Lϖφ=01dη(ϑ,ϖ)φ(ϑ). (4.4)

    In fact, we choose

    η(ϑ,ϖ)={(τ1+ϖ)(L+M+N),ϑ=0,(τ1+ϖ)(M+N),ϑ[τ2τ1,0),(τ1+ϖ)(N),ϑ(1,τ2τ1),0,ϑ=1. (4.5)

    with ϕ(ϑ) is the Dirac delta function.

    For φC([1,0],R4), define

    A(ϖ)φ={dφ(ϑ)dϑ,1ϑ<0,01dη(ϑ,ϖ)φ(ϑ),ϑ=0,

    and

    R(ϖ)φ={0,1ϑ<0,F(ϖ,φ),ϑ=0.

    Then system (1.2) is equivalent to

    ˙χ(t)=A(ϖ)χt+R(ϖ)χt. (4.6)

    For ψC1([0,1],(R4)), define

    A(ψ)={dψ(s)ds,0<s1,01dηT(s,0)ψ(s),s=0,

    and the bilinear inner form for A(0) and A

    ψ(s),φ(ϑ)=ˉψ(0)φ(0)0ϑ=1ϑζ=0ˉψ(ζϑ)dη(ϑ)φ(ζ)dζ, (4.7)

    where η(ϑ)=η(ϑ,0).

    Let u(ϑ)=(1,u2,u3,u4)Teiτ1ω1ϑ and u(s)=D(1,u2,u3,u4)Teiτ1ω1s. Based on definitions of A(0) and A(0), one can obtain

    u2=m21eiτ1ω1iω1l22m22eiτ1ω1,u3=l32u2iω1l33,u4=l42u2+l43u3iω1l44n44eiτ2ω1,u2=iω1+l11m21eiτ1ω1,u3=l43u2iτ1ω1+l33,u4=n14eiτ2ω1l44+n14eiτ2ω1+iω1.

    Then, we have

    ˉD=[1+u2ˉu2+u3ˉu3+u4ˉu4+τ1eiτ1ω1u2(m12+m22ˉu2)+τ1eiτ1ω1m21ˉu2+τ2eiτ2ω1u4(n14+n44ˉu4)]1.

    Next, g20, g11, g02 and g21 can be obtained with aid of the method in [20]:

    g20=2τ1ˉD[h11u2+h12+ˉu2(h21u2+h22)],g11=τ1ˉD[h11(u2+ˉu2)+2h12+ˉu2h21(u2+ˉu2)+2h22ˉu2)],g20=2τ1ˉD[h11ˉu2+h12+ˉu2h21ˉu2+h22ˉu2)],g21=2τ1ˉD[h11(u2W(1)11(0)+12W(1)20(0)ˉu2+W(2)11(0)+12W(2)20(0))+h12(W(2)11(0)+W(1)20(0))+h13(2u2+ˉu2)+3h14+ˉu2h21(W(1)11(0)u2+12W(1)20(0)ˉu2+W(2)11(0)+12W(2)20(0))+h22ˉu2(W(2)11(0)+W(1)20(0))+h22(2u2+ˉu2)+3h24],

    with

    W20(ϑ)=ig20u(0)τ1ω1eiτ1ω1ϑ+iˉg02ˉu(0)3τ1ω1eiτ1ω1ϑ+P1e2iτ1ω1ϑ,W11(θ)=ig11u(0)τ1ω1eiτ1ω1ϑ+iˉg11ˉu(0)τ1ω1eiτ1ω1ϑ+P2.

    P1 and P2 can be computed by

    P1=2(l11m12eiτ1ω10n14eiτ2ω1m21eiτ1ω1l22000l32l3300l42l43l44)1×(P(1)1P(2)100),
    P2=(l11+m11m120n14m21l22+m22000l32l3300l42l43l44+n44)1×(P(1)2P(2)200).

    where

    l11=2iω1l11m11eiτ1ω1,l22=2iω1l22m22eiτ1ω1,l33=2iω1l33,l44=2iω1l44n44eiτ2ω1,

    and

    P(1)1=h11u2+h12,P(2)1=h21u2+h22,P(1)2=h11(u2+ˉu2)+2h12,P(2)2=h21(u2+ˉu2)+2h22.

    Then, we can obtain

    C1(0)=i2τ1ω1(g11g202|g11|2|g02|23)+g212μ2=Re{C1(0)}Re{λ(τ1)},β2=2Re{C1(0)},T2=Im{C1(0)}+μ2Im{λ(τ1)}τ1ω1, (4.8)

    Thus, we have Theorem 6 about the Hopf bifurcation at τ1.

    Theorem 6. For system (1.2), the following results hold. If μ2>0 (μ2<0), then the Hopf bifurcation is supercritical (subcritical); If β2<0 (β2>0), then the bifurcating periodic solutions are stable (unstable); If T2>0 (T2<0), then the period of the bifurcating periodic solutions increase (decrease).

    In order to identify the correctness of above results, some parameters are used to numerical simulations. The values of all parameters are shown in Table 1.

    Table 1.  Estimation for values of the parameters.
    Parameter Value Source
    b 1 [13]
    p 0.9 [13]
    β 0.65 [13]
    σ 0.4 [13]
    d 0.1 assumed
    δ 0.7 [13]
    ε 0.14 assumed
    γ 0.3 [13]
    η 0.1 assumed
    α1 0.1 assumed
    α2 0.18 assumed

     | Show Table
    DownLoad: CSV

    Then, system (1.2) takes the form

    {dS(t)dt=0.10.65S(tτ1)I(tτ1)1+0.4S(tτ1)0.1S(t)+0.7R(tτ2),dI(t)dt=0.65S(tτ1)I(tτ1)1+0.4S(tτ1)0.64I(t),dQ(t)dt=0.14I(t)0.48Q(t),dR(t)dt=0.9+0.1Q(t)+0.3I(t)0.7R(tτ2)0.1R(t), (5.1)

    from which we can obtain R0=1.98>1 and E(1.6244,2.0598,0.7739,2.0011).

    To verify Theorem 1, we use Matlab software and obtain ω10=0.0786 and τ10=9.3985. Figure 1 shows that system (5.1) is locally asymptotically stable when τ1[0,τ10), τ2=0 and a Hopf bifurcation arises when τ1=τ10. After that, from Figure 2, system (5.1) becomes unstable when τ1>τ10.

    Figure 1.  Evolutions of S, I, Q, R for τ1=7.2010<τ10 of system (5.1) versus time t.
    Figure 2.  Evolutions of S, I, Q, R for τ1=11.9806>τ10 of system (5.1) versus time t.

    In the same way, we apply Matlab software to verify Theorem 2. Then, we obtain ω20=0.3307 and τ20=2.2352. From Figure 3, system (5.1) is locally asymptotically stable when τ1=0, τ2[0,τ20), and a Hopf bifurcation arises when τ2=τ20. Otherwise, system (5.1) becomes unstable when τ2>τ20 in Figure 4.

    Figure 3.  Evolutions of S, I, Q, R for τ2=2.0803<τ20 of system (5.1) versus time t.
    Figure 4.  Evolutions of S, I, Q, R for τ2=2.4012>τ20 of system (5.1) versus time t.

    A short calculation revealed that ω30=0.3833 and τ0=1.9282. Afterwards, Figure 5 shows that system (5.1) is locally asymptotically stable when τ1=τ2[0,τ0), and it can be seen a Hopf bifurcation when τ1=τ2=τ0. Figure 6 shows that system (5.1) becomes unstable when τ1=τ2>τ0.

    Figure 5.  Evolutions of S, I, Q, R for τ1=τ2=1.8457<τ0 of system (5.1) versus time t.
    Figure 6.  Evolutions of S, I, Q, R for τ1=τ2=1.9796>τ0 of system (5.1) versus time t.

    It is easy to obtain ω40=0.0710 and τ10=10.4056. When τ1[0,τ10), τ2[0,τ20), system (1.2) is locally asymptotically stable, and system (5.1) undergoes a Hopf bifurcation when τ1=τ10. Once τ1>τ10, system (5.1) becomes unstable. The corresponding simulations are shown in Figure 7 and Figure 8.

    Figure 7.  Evolutions of S, I, Q, R for τ1=8.8464<τ10, τ2=1.5764[0,τ20) of system (5.1) versus time t.
    Figure 8.  Evolutions of S, I, Q, R for τ1=12.7054>τ10, τ2=1.5764[0,τ20) of system (5.1) versus time t.

    Through simple calculation, ω50=0.3971 and τ20=1.8612 can be got. As Figure 9 shows, system (5.1) is locally asymptotically stable when τ1[0,τ10), τ2[0,τ20) and a Hopf bifurcation arises when τ2=τ20. And we can see that system (5.1) becomes unstable when τ2>τ20 in Figure 10.

    Figure 9.  Evolutions of S, I, Q, R for τ1=8.7421[0,τ10), τ2=1.3413<τ20 of system (5.1) versus time t.
    Figure 10.  Evolutions of S, I, Q, R for τ1=8.7421[0,τ10), τ2=1.9735>τ20 of system (5.1) versus time t.

    In this paper, we propose a novel Susceptible-Infected-Quarantined-Recovered (SIQRS) computer virus propagation model with quarantine strategy based on the model formulated in [13]. We consider not only incubation period delay, but also temporary immunization time delay when we observe the dynamics of the SIQRS model. The local stability of the virus-free equilibrium and the virus-existent equilibrium also has been discussed. Furthermore, we analyze the local stability and Hopf bifurcation under another five cases with different delays. If τ is less than the key value, system (1.2) is local stable; otherwise, there is a Hopf bifurcation. Then, we determine the direction of Hopf bifurcation and the stability of bifurcating periodic solutions by using the normal form and center manifold theorem. Ultimately, some numerical simulations are used to prove the validity of the theoretical results.

    Compared with the model in [13], our novel model consider quarantine strategy, which is used to the prevention and cure of computer virus, so our model is closer to the actual situation. Furthermore, incubation period is one of the significant characteristics of computer virus, and it is very important to take the latency delay into account. Nowadays, antivirus software, which enable computers to gain temporary immunity, plays a very important role in the defense of computer virus. Temporary immunity delay is a common phenomena in real life. In our SIQRS model, the above cases are taken into account at the same time, and our model has more reference value over the existing ones. Global asymptotic stability is as important as local asymptotic stability, and it will be studied in the future.

    This research was supported by the Natural Science Foundation of the Higher Education Institutions of Anhui Province (No.KJ2020A0002), the Project of Natural Science Foundation of Anhui Province (No.2008085QA09) and National Natural Science Research Foundation Project (No.12061033).

    The authors declare that there are no conflicts of interest regarding the publication of this paper.



    [1] The 46th China Statistical Report on Internet Development, September, 2020. Available from: http://info.hebau.edu.cn/upload/files/2020/10/af9266d1e4e0cc8b.pdf.
    [2] R. Zhang, Y. Deng, Analysis of computer virus epidemic situation in October 2019, Netinfo Security, 12 (2019), 93–93.
    [3] P. C. Xiao, Z. Y. Zhang, X. B. Sun, Smoking dynamics with health education effect, AIMS Mathematics, 3 (2018), 584–599. doi: 10.3934/Math.2018.4.584
    [4] J. L.Dimi, T. Mbaya, Dynamics analysis of stochastic tuberculosis model transmission withimmune response, AIMS Mathematics, 3 (2018), 391–408. doi: 10.3934/Math.2018.3.391
    [5] M. A. Khan, S. Ullah, M. Farhan, The dynamics of Zika virus with Caputo fractional derivative, AIMS Mathematics, 4 (2019), 134–146. doi: 10.3934/Math.2019.1.134
    [6] O. Kostylenko, H. S. Rodrigues, D. F. M. Torres, The spread of a financial virus through Europe and beyond, AIMS Mathematics, 4 (2019), 86–98. doi: 10.3934/Math.2019.1.86
    [7] J. O. Kephart, S. R. White, Directed-graph Epidemiological Models of Computer Viruses, Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1 (1991), 343–359.
    [8] X. Y. Liang, Y. Z. Pei, Y. F. Lv, Modeling the state dependent impulse control for computer virus propagation under media coverage, Physica A, 491 (2018), 516–527. doi: 10.1016/j.physa.2017.09.058
    [9] W. Pan, Z. Jin, Edge-based modeling of computer virus contagion on atripartite graph, Appl. Math. Comput., 320 (2018), 282–291.
    [10] R. K. Upadhyay, P. Singh, Modeling and control of computer virus attack on a targetednetwork, Physica A, 538 (2020), 122617. doi: 10.1016/j.physa.2019.122617
    [11] J. Singh, D. Kumar, Z. Hammouch, A. Atangana, Afractional epidemiological for computer viruses pertaining to a new fractional derivative, Appl. Math. Comput., 316 (2018), 504–515.
    [12] J. G. Ren, X. F. Yang, L. X. Yang, Y. H. Xu, F. Z. Yang, A delayed computer virus propagation model and its dynamics, Chaos Solitons and Fractals, 45 (2012), 74–79. doi: 10.1016/j.chaos.2011.10.003
    [13] V. MadhuSudanan, R. Greetha, Dynamics of epidemic computer virus spreading model with delays, Wireless Pers. Commun., 8 (2020), 1–14.
    [14] U. Fatima, M. Ali, N. Ahmed, et al., Numerical modeling of susceptible latent breaking-out quarantine computer virus epidemic dynamics, Heliyon, 4 (2018), e00631. doi: 10.1016/j.heliyon.2018.e00631
    [15] Y. H. Zheng, J. H. Zhu, C. A. Lai, A SEIQR Model considering the Effects of Different Quarantined Rates on Worm Propagation in Mobile Internet, Math. Probl. Eng., 2020 (2020), 1–16.
    [16] P. van den Driessche, J. Watmough, Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission, Math. Biosci., 180 (2020), 29–48.
    [17] K. R. Meyer, Theory and applications of Hopf bifurcation, SIAM Rev., 24 (2006), 498–499.
    [18] Y. Z. Bai, Y. Y. Li, Stability and Hopf bifurcation for a stage-structured predator-prey model incorporating refuge for prey and additional food for predator, Adv. Differ. Equ., 2019 (2019), 1–20. doi: 10.1186/s13662-018-1939-6
    [19] C. Li, X. F. Liao, The impact of hybrid quarantine strategies and delay factor on viral prevalence in computer networks, Math. Model. Nat. Pheno., 11 (2016), 105–119. doi: 10.1051/mmnp/201611408
    [20] Q. W. Gao, J. Zhuang, Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model, Appl. Math. Comput., 368 (2020), 124584.
  • This article has been cited by:

    1. Ge Zhang, Zhiming Li, Anwarud Din, A stochastic SIQR epidemic model with Lévy jumps and three-time delays, 2022, 431, 00963003, 127329, 10.1016/j.amc.2022.127329
    2. Jiaxing Chen, Chengyi Xia, Matjaž Perc, The SIQRS Propagation Model With Quarantine on Simplicial Complexes, 2024, 11, 2329-924X, 4267, 10.1109/TCSS.2024.3351173
    3. Haokuan Cheng, Min Xiao, Yunxiang Lu, Haibo Bao, Leszek Rutkowski, Jinde Cao, Complex pattern evolution of a two-dimensional space diffusion model of malware spread, 2024, 99, 0031-8949, 045237, 10.1088/1402-4896/ad30ee
    4. Linji Yang, Qiankun Song, Yurong Liu, Stability and Hopf bifurcation analysis for fractional-order SVEIR computer virus propagation model with nonlinear incident rate and two delays, 2023, 547, 09252312, 126397, 10.1016/j.neucom.2023.126397
    5. Jie 杰 Gao 高, Jianfeng 建锋 Luo 罗, Xing 星 Li 李, Yihong 毅红 Li 李, Zunguang 尊光 Guo 郭, Xiaofeng 晓峰 Luo 罗, Triadic percolation in computer virus spreading dynamics, 2025, 34, 1674-1056, 028701, 10.1088/1674-1056/ad9ff8
    6. JunLing Wang, Xinxin Chang, Lei Zhong, A SEIQRS Computer Virus Propagation Model and Impulse Control With Two Delays, 2025, 0170-4214, 10.1002/mma.10721
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2620) PDF downloads(192) Cited by(6)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog