State feedback impulsive control of computer worm and virus with saturated incidence

  • Received: 22 May 2018 Accepted: 24 July 2018 Published: 01 December 2018
  • MSC : Primary: 34H15, 34K21; Secondary: 39A23

  • A state feedback impulsive model is set up to discuss the spreading and control of the computer worm and virus. Considering the transmission features, saturated infectious is adopted to describe the spreading in the model, and all the treatment measures, such as patching operating system and updating antivirus software, are assumed to take effect instantly. Then the model is analyzed with a novel method, and the existence and stability of order-1 limit cycle are discussed. Finally, the numerical simulation is listed to verify the result of the paper.

    Citation: Meng Zhang, Kaiyuan Liu, Lansun Chen, Zeyu Li. State feedback impulsive control of computer worm and virus with saturated incidence[J]. Mathematical Biosciences and Engineering, 2018, 15(6): 1465-1478. doi: 10.3934/mbe.2018067

    Related Papers:

    [1] Tahir Khan, Fathalla A. Rihan, Muhammad Ibrahim, Shuo Li, Atif M. Alamri, Salman A. AlQahtani . Modeling different infectious phases of hepatitis B with generalized saturated incidence: An analysis and control. Mathematical Biosciences and Engineering, 2024, 21(4): 5207-5226. doi: 10.3934/mbe.2024230
    [2] Xichao Duan, Sanling Yuan, Kaifa Wang . Dynamics of a diffusive age-structured HBV model with saturating incidence. Mathematical Biosciences and Engineering, 2016, 13(5): 935-968. doi: 10.3934/mbe.2016024
    [3] Kaushik Dehingia, Anusmita Das, Evren Hincal, Kamyar Hosseini, Sayed M. El Din . Within-host delay differential model for SARS-CoV-2 kinetics with saturated antiviral responses. Mathematical Biosciences and Engineering, 2023, 20(11): 20025-20049. doi: 10.3934/mbe.2023887
    [4] Balázs Csutak, Gábor Szederkényi . Robust control and data reconstruction for nonlinear epidemiological models using feedback linearization and state estimation. Mathematical Biosciences and Engineering, 2025, 22(1): 109-137. doi: 10.3934/mbe.2025006
    [5] Yoichi Enatsu, Yukihiko Nakata . Stability and bifurcation analysis of epidemic models with saturated incidence rates: An application to a nonmonotone incidence rate. Mathematical Biosciences and Engineering, 2014, 11(4): 785-805. doi: 10.3934/mbe.2014.11.785
    [6] Mengya Huang, Anji Yang, Sanling Yuan, Tonghua Zhang . Stochastic sensitivity analysis and feedback control of noise-induced transitions in a predator-prey model with anti-predator behavior. Mathematical Biosciences and Engineering, 2023, 20(2): 4219-4242. doi: 10.3934/mbe.2023197
    [7] Zhenzhen Shi, Huidong Cheng, Yu Liu, Yanhui Wang . Optimization of an integrated feedback control for a pest management predator-prey model. Mathematical Biosciences and Engineering, 2019, 16(6): 7963-7981. doi: 10.3934/mbe.2019401
    [8] Guirong Jiang, Qishao Lu, Linping Peng . Impulsive Ecological Control Of A Stage-Structured Pest Management System. Mathematical Biosciences and Engineering, 2005, 2(2): 329-344. doi: 10.3934/mbe.2005.2.329
    [9] Jiying Ma, Shasha Ma . Dynamics of a stochastic hepatitis B virus transmission model with media coverage and a case study of China. Mathematical Biosciences and Engineering, 2023, 20(2): 3070-3098. doi: 10.3934/mbe.2023145
    [10] Pan Yang, Jianwen Feng, Xinchu Fu . Cluster collective behaviors via feedback pinning control induced by epidemic spread in a patchy population with dispersal. Mathematical Biosciences and Engineering, 2020, 17(5): 4718-4746. doi: 10.3934/mbe.2020259
  • A state feedback impulsive model is set up to discuss the spreading and control of the computer worm and virus. Considering the transmission features, saturated infectious is adopted to describe the spreading in the model, and all the treatment measures, such as patching operating system and updating antivirus software, are assumed to take effect instantly. Then the model is analyzed with a novel method, and the existence and stability of order-1 limit cycle are discussed. Finally, the numerical simulation is listed to verify the result of the paper.


    1. Introduction

    In the past decade, information technology has gotten a rapid development, and is playing an important role in industry, commerce and humans' daily life. Computers, the most primary carriers of the advanced technique, are the requisite hardware of the modern science. However, computers have to face the threaten of worm and virus which are the biggest menace to the normal operation[16,14]. Generally, the operators do not know the existence of the computer worm, least of all how and when their computers have been infected. Worm and virus are always attached to a junk mail, masqueraded as innocent files for downloading, even ensconced in a code spreading through the Internet[5]. The dissemination of the worm and virus only needs someone to open the host file, then the worm and virus can transmit automatically without any additional operation[30]. Up to now, computer worm and virus can averagely cause billions of economic damage every year. To the operators, the direct results caused by infectious, such as causing system collapse, occupying computer RAM and demolishing existence data etc, always make them pay a heavy price. In response, updating antivirus software and patching operating system are two primary protections.

    Recently, some researchers described the transmission and prevention of computer worm and virus with the state feedback compulsive model, and they have got some interesting results[7,12,27]. In their models, when the number of infected computers reaches a certain level the impulsive control will be triggered. Then new antivirus software will be published and installed, operating system will be patched to the latest version. All those activities happened instantaneously, and they are depicted as an impulse in the model.

    However, the published researches all assume the diffusion of worm and virus is linear with the number of infected and susceptible computers which goes against the truth. In fact, at the initial period of a certain transmission, among the huge number of healthy computers connected with the Internet, only few of them have the opportunity to touch the virus[9,22,31]. And following the development, the infectious rate can not keep being linear with the infected and susceptible ones if the infected computers are numerically superior. So it is proper to describe the infectious with saturated transmission, and we will study the impulsive control of computer virus under this spreading fashion.

    The remaining of this paper is arranged as follows: we set up the model and introduce some preliminaries in section 2; the existence, uniqueness and stability of order-1 limit cycle are analyzed in section 3; finally, some numerical simulation are showed to confirm the result and some deeper discussion is carried out in section 4.


    2. Modeling and preliminaries

    Enlightened by the development in the field of impulsive control and the progress of infectious disease study [19,29,25,26], all the computers connected with the Internet are divided into two disjoint groups: S(t) and I(t), which also present the number of individuals in each group at time t. The computers in group S are healthy ones and can be infected by the computer worm and virus, and group I is made up of individuals that are infected and they can transform worm and virus to members of S. In the present research[12,27], the incidence form are assumed as the simple item βSI which is contravened with the truth. In fact, the incidence is not remarkably effected by the number of susceptible ones when S occupies a considerable large proportion of the population, especially during the first spreading stage of a certain computer worm or virus. According to these truth, saturated incidence coincides with the real situation more closely.

    Considering objectively, we make the following assumptions:

    (1) all the new emerging computers are susceptible ones, and the rate is K;

    (2) rejection rate is not affected by the computer worm and virus, and both suceptibles and infectives are sifted out from the Internet at rate μ;

    (3) the transmission incidence is βSI1+αS which means the incidence is approximately βαI when the number of susceptibles S is relatively large;

    (4) ˉI is assumed as the threshold that the computer virus can be discovered.

    When infectives is less than ˉI, the computer virus spreads freely, and in case the number of infectives reaches ˉI, the computer worm and virus can be detected. Then the super-version antivirus software and operating system patch program will be published and a percentage of computers (both suceptibles and infectives) will upgrade their antivirus softwares and patch their operating systems. After these operations, those computers are immune to the certain computer worm or virus and get away from the virus spreading system. We define the upgrading rate of suceptibles and infectives are σ1 and σ2 separately. Following these assumptions, the spreading and control process can be explicated with the state feedback impulsive model

    {dSdt=KβSI1+αSμS,dIdt=βSI1+αSμI,I<ˉI, ΔS=σ1S, ΔI=σ2I,I=ˉI. (1)

    Considering the practical significance, all the parameters in this paper are positive, σ1(0,1), σ2(0,1) and system (1) is only considered in space R+2={(S,I)|S0,I0}.

    In the reminder part of this section, we introduce some definitions and lemmas to support the proof of the existence and stability of the order-1 limit cycle of system (1).

    Definition 2.1 (19-25) A typical state feedback impulsive differential model can be defined as

    {dxdt=P(x,y),  dydt=Q(x,y),    (x,y)M{x,y},Δx=α(x,y),  Δy=β(x,y),    (x,y)M{x,y}, (2)

    and can be denoted by (Ω,f,φ,M). The solution sources from any point P in the plane R2M{x,y}, i.e. PΩ=R2M{x,y}. φ(x,y)=(α(x,y),β(x,y)) is defined as an impulsive mapping, φ is continuous. After the impulsive mapping, x+=x+α(x,y) and y+=y+β(x,y), (x,y)M, all the points (x+,y+) form a set N. Here, we call M and N impulse set and phase set respectively, and they can be lines or curves in the plane R2.

    Definitions of successor function and order-1 periodic solution of state feedback impulsive dynamic system are also vitally important in the research.

    Definition 2.2. [2,21,15] Simply suppose the impulse set M and the phase set N of system (2) are two straight lines respectively(see Fig. 1), and the intersection of phase set N and y axis is Q. To any point AN, the coordinate of A, denoted by a, can be defined as the distance between A and Q. The solution trajectory originating from A intersects impulse set M at point B, then the impulsive function φ maps B to point C in phase set N, then C is called the subsequent point of A, and its coordinate is c. The successor function of A is defined as a continuous function F(A)=ca. If C locates in the same point of A, then the trajectory segment ^AB is an order-1 periodic solution, and the orbit ^AB¯BA is said to be an order-1 limit cycle.

    Figure 1. Successor function F(A)=ca.

    Remark 1. The necessary and sufficient condition that the solution passing point A forms an order-1 periodic solution is F(A)=0.

    Lemma 2.3. [2,21,15] To a state feedback impulsive dynamic system (Ω,f,φ,M), there exist two points B and C in phase set N, if F(B)F(C)<0, then there must exist a point A between B and C satisfying F(A)=0, and the solution f(A,t) forms an order-1 periodic solution.


    3. Qualitative analysis of the uncontrolled system

    Without counting the impulsive control measure, system (1) can be simplified as

    {dSdt=KβSI1+αSμS,dIdt=βSI1+αSμI, (3)

    system (3) is called uncontrolled system of (1). Change the variables with linear transform t=(1+αS)τ and still use t as the independent variable, then system (3) changes into

    {dSdt=βSI+(KμS)(1+αS),dIdt=βSIμI(1+αS). (4)

    3.1. Equilibria

    It is obvious that system (4) has two equilibria E1(Kμ,0) and E2(S,I), where

    S=μβμα  and  I=(KμS)(1+αS)βS=Kμμβμα.

    E1 is a marginal equilibrium, while E2 is the only positive equilibrium in case of

    β>μ2K+μα. (5)

    In the following discussions, we assume condition (5) is satisfied consistently. The Jacobian matrix of E1 is

    JE1=(μαKβKμ0βKμμαK),

    D<0, so E1 is a saddle. To positive equilibrium E2(S,I), its Jacobian matrix is

    JE2=(Kμ(βμα)αμ2βμαβμβμαKμ(βμα)μ0).

    Assume λ1 and λ2 are two roots of the characteristic equation, then

    λ1+λ2=Kμ(βμα)αμ2βμα<0  and  λ1λ2=βμβμα(Kμ(βμα)μ)>0,

    so E2 is a locally stable node or focus (see Fig. 2).

    Figure 2. Trajectory of uncontrolled system. The parameter values: K=0.06,β=0.09,α=8.2,μ=0.01.

    3.2. Uniform boundedness

    In this part, we will consider the uniform boundedness in the first quadrant. From system (4), we can find that

    I=μαβS+Kβ1S+Kαμβ

    is vertical isoclinic line, and

    S=μβμα and I=0

    are horizontal isoclinic lines.

    Following the succeeded statement, we select a piece of bounded region (see Fig. 3). Designate a line l:I=aS+b, where a<0,b>0. Line l intersects S=μβμα at point Q, and then make a horizontal straight line l1 passing point Q. Denote the region bounded by l,l1,S=0,I=0 and S=Kμ as G. Then we discuss the existence of proper a and b satisfying that G is attracted.

    Figure 3. region G.

    Assume φ=IaSb, then

    dφdt=dIdtadSdt=(1+a)aβx2+[bβ(1+a)α(aK+bμ)]x(aK+bμ). (6)

    Set a=1 and b=Kμ+1>0, then dφdt<0,S(μβμα,Kμ). Considering the character of system (4), bounded region G is attracted.


    3.3. Inexistence of limit cycle

    Assume Dulac function u(S,I)=1SI, and let

    {dSdt=βSI+(KμS)(1+αS)Δ=P(S,I),dIdt=βSIμI(1+αS)Δ=Q(S,I), (7)

    then

    {dSdt=u(S,I)P(S,I)=βSI+(KμS)(1+αS)Δ=P1(S,I),dIdt=u(S,I)Q(S,I)=βSIμI(1+αS)Δ=Q1(S,I). (8)

    It is obvious that P1S+Q1I=μαIKS2I<0, then following Dulac Theorem system (4) has no limited cycle.

    Basing on the above discussion, if condition (5) is satisfied, then there exists only one positive equilibrium E2(S,I) and E2(S,I) is globally asymptotically stable.


    4. Order-1 limit cycle of System(1)

    In this section, we will certificate the existence and uniqueness of order-1 limit cycle of system (1). In reality, it is unreasonable that a single kind of computer virus lasts for long time without being detected. So we assume ˉI<I without loss of generality, i.e. the impulsive set M:I=ˉI is a horizontal line beneath the positive equilibrium E2. The existence, uniqueness and stability of the order-1 limit cycle will be proved progressively in this section.


    4.1. Existence of order-1 limit cycle

    The existence of order-1 limit cycle is studied in this subsection.

    Theorem 4.1. If condition (5) holds, for any σ1(0,1) and σ2(0,1), system (1) has an order-1 limit cycle.

    Proof. In system (1), to any σ2(0,1), imagine set N:I=(1σ2)ˉI appears as another horizontal line under the impulsive set M:I=ˉI. In the following part, we prove that to any σ2(0,1) there exists a corresponding σ1 forming an order-1 periodic solution.

    Assume the intersection of imagine set N:I=(1σ2)ˉI and the horizontal isoclinic line dIdt=0 is A, and the coordinate is A(S,(1σ2)ˉI). According to the fundamental theorem of ODE, there must exist a trajectory passing point A, denote it as L. After a period movement, trajectory L can reach the impulsive set M, and we assume the intersection is MA and its coordinate is MA(xMA,ˉI). Then the impulsive function φ maps MA to a point NA(xNA,(1σ2)ˉI) in imagine set N. If xNA=S, i.e. point A and point NA are the same point, then the trajectory L and the impulsive mapping φ form an order-1 periodic solution (see Fig. 4). Let σ1=xMAS, then we prove there exists order-1 periodic solution while 0<σ1<σ1 and σ1<σ1<1.

    Figure 4. Case of NA coinciding with A.

    Case of 0<σ1<σ1. When 0<σ1<σ1, it means imagine point NA locates on the right side of A (see Fig 5). Then the successor function of A is F(A)=xNAS>0. Consider another point B which is the intersection of imagine set N and the vertical isoclinic line dSdt=0. For point B(xB,(1σ2)ˉI) locates on the vertical isoclinic line, the trajectory L1 initiating from point B moves upside left until it reaches the impulsive set M at MB. So xMB<xB. Then the impulsive function φ maps MB to the imagine point NB which is on left side of MB horizontally. Subsequently the successor function of point B is F(B)=xNBxB<0. Following the continuous of successor function, there must exist a point C between A and B satisfying F(C)=0, and the trajectory initiating from C and the corresponding impulsive mapping form the order-1 periodic solution.

    Figure 5. Case of 0<σ1<σ1.

    Case of σ1<σ1<1. When σ1<σ1<1, it means that the impulsive function φ controls the imagine point NA to fall on left side of A(see Fig 6), and the coordinate is NA((1σ1)xMA,ˉI). So the successor function of A is F(A)=xNAS<0. Then consider the trajectory L2 initiating from NA, it moves adhering the uncontrolled system (3) until intersects the impulsive set M at point MD. According to the non-intersecting feather of ODE trajectories, MD must locate on the right side of MA, i.e. xMD>xMA. Denote the imagine point of MD is ND, and its coordinate is ND((1σ1)xMD,(1σ2)ˉI). Then the successor function of NA is F(NA)=xNDxNA=(1σ1)xMD(1σ1)xMA=(1σ1)(xMDxMA)>0. Still following the continuous of successor function, there must exist a point C between A and NA satisfying F(C)=0, that is to say the trajectory initiating from C and the corresponding impulsive mapping form the order-1 periodic solution.

    Figure 6. Case of σ1<σ1<1.

    Basing on the above discussion, to any σ1(0,1) and σ2(0,1), there exist an order-1 periodic solution of system (1).

    Since the order-1 periodic solution is isolated, its trajectory and the proper impulsive line can form order-1 limit cycle of system(1).


    4.2. Uniqueness of order-1 limit cycle

    In this part we prove the uniqueness of the order-1 limit cycle with the homogeneous of successor function.

    Theorem 4.2. The order-1 limit cycle of system (1) is unique.

    Proof. Select two points I and J in phase set N arbitrarily, and assume xI<xJ (see Fig. 7). There must exist trajectories initiating from I and J, and we denote them as LI and LJ respectively. These two trajectories can reach the impulse set M, and we denote the intersections as MI and MJ respectively. It is obvious that MI must locate on the right side of MJ, i.e. xMI>xMJ. Then the impulse function φ maps them to NI and NJ respectively. xNI=(1σ1)xMI and xNJ=(1σ1)xMJ, it is easy to obtain xNI>xNJ. I and J have NI and NJ as their subsequent points respectively, F(I) and F(J) are their successor functions. Then F(I)F(J)=(xNIxI)(xNJxJ)=(xNIxNJ)+(xJxI)>0. Basing on the previous discussion, we can draw the conclusion that the successor function F() of system (1) is monotonically decreasing. Thus to any σ1(0,1) and σ2(0,1), there exists only one point C in imagine set satisfying F(C)=0. Therefore the order-1 limit cycle of system (1) is unique.

    Figure 7. The successor function is monotonically decreasing.

    4.3. Stability of order-1 limit cycle

    The above content has proved the existence and uniqueness of order-1 limit cycle. In this subsection, we discuss the stability of the order-1 limit cycle of system (1). Unlike the case of continuous dynamic system, the stability proof of impulsive dynamic system is quite complex. Some definition and lemma which are significant in the proof will be illustrated first.

    Definition 4.3. [24] The order-1 limit cycle Γ is stable, if it is the ω limit set for those trajectories initiating from any point of its small enough neighborhood U(Γ). Otherwise, Γ is unstable.

    Basing on the theorem of subsection 4.1 and 4.2, to any σ1(0,1) and σ2(0,1), system (1) has a unique order-1 limit cycle, here we denote it as Γ. We also assume that Γ intersects the imagine set N at point A (see Fig. 8). Then to any point S0 that locates in the small neighborhood of A, define a point series

    S0,S1,,Sk,Sk+1,,
    Figure 8. S1,S2,,Sk+1,Sk+2, are the subsequent points of S0,S1,,Sk,Sk+1, respectively.

    where Si+1 is the subsequent point of Si, i=0,1,,k,, and their coordinates s0,s1,,sk,sk+1, are defined as

    sk={dk,Sk is on left side of A,dk,Sk is on right side of A,

    where dk is the distance between Sk and A. Under this rule, it is obvious that the coordinate of A is 0.

    Lemma 4.4. [24] Denote the mapping of the general impulsive dynamic system (2) as f, and suppose function ˉs=f(s) is derivative at s=0. Then s=0 is stable (unstable), if

    |dˉsds|s=0<1(>1).

    It is not easy to prove the stability of order-1 limit cycle of system (2) only with the previous lemma, so we set up an orthogonal coordinate (s,n) in the nearby area of Γ as an auxiliary tool.

    Without loss of generality, we assume that functions P(x,y) and Q(x,y) of system (2) have arbitrary order partial derivatives. Since the impulse mapping is quick enough, the period of order-1 limit cycle is the same with the time interval between A and C on a certain trajectory of corresponding uncontrolled system, and we denote it as T.

    To any point in that region, there exists a certain point in the closed orbit Γ and its normal line passes the certain point. The first coordinate s of the new coordinate is defined as the length of the trajectory from A to the certain point on Γ, while the second coordinate n is defined as the number of the normal vector(upside is the positive direction)(See Fig. 9). Rewrite the rectangular equation of curve ^ABC into the parametric equation

    x=ϕ(s),y=ψ(s), (9)
    Figure 9. Establish coordinate system (s,n) on point A.

    where s is the parameter.

    Then the rectangular coordinate (x,y) can be expressed with the orthogonal coordinate (s,n) as

    x=ϕ(s)nψ(s),y=ψ(s)+nϕ(s), (10)

    Following (2) and (10), we have

    dnds=QϕPψn(Pϕ+Qψ)Pϕ+QψΔ=F(s,n). (11)

    It is apparent that n=0 is a solution of (11). We also assume that F(s,n) is biased derivative, and the first-order partial derivative of F(s,n) is continuous with respect to n, then (11) can be expressed briefly as

    dnds=Fn(s,n)|n=0n+o(n). (12)

    Following (11), we can calculate

    Fn(s,n)|n=0=P20Qy0P0Q0(Py0+Qx0)+Q20Px0(P20+Q20)32Δ=H(s),

    where P0 and Q0 are the values of P and Q at point A, Px0, Py0, Qx0 and Qy0 represent the partial derivatives of P and Q at n=0 with respect to x,y respectively. It is obvious that P0ϕ+Q0ψ=0. Then the order-1 linear approximate equation of (12) is

    dnds=H(s)n, (13)

    and its solution is

    n=n0eT0H(s)ds,n0=n(0). (14)

    Theorem 4.5. Assume h is the length of curve ^ABC which is a segment of the order-1 periodic solution Γ to system (2), then Γ is stable (unstable) if integration of H(s) along ^ABC is negative (positive), i.e.

    h0H(s)ds<0(>0).

    Theorem 4.6. Suppose the region closed by order-1 periodic solution Γ is convex. If T0(Px0+Qy0)dt<0 is satisfied, then Γ is stable.

    The proofs of Theorem 4.5 and Theorem 4.6 are similar with that in [27], and omitted here.

    Then we can draw the corollary naturally.

    Corollary 1. Suppose the area closed by order-1 limit cycle Γ is convex. If Px0+Qy0<0(>0) holds, then Γ is stable(unstable).


    5. Simulation and discussion

    In this section, we present and discuss a special example to check the theoretical results in section 3 and section 4.

    The uncontrolled part of system (1) is numerically calculated with fourth-order Runge-Kutta of Matlab software package. In the following, we discuss the solution of system (1), considering the parameters K=0.06, β=0.09, α=8.2 and μ=0.01. After a simple calculation, the corresponding uncontrolled system has a steady state (x,y)=(1.25,4.75). We also assume the threshold value that triggers patching operating system and updating the antivirus software is 3.8. Then the instantaneous impulse comes into force on 40% of susceptible ones and 60% of infected ones respectively. The trajectory of system (1) and time series of S and I are listed in Fig. (10).

    Figure 10. Subplot (a) is the trajectory of system (1) and (b) and (c) are time series of S and I respectively.

    From Fig. (10), it is obvious that system (1) has an order-1 limit cycle with the parameters mentioned above. We can also find that the limit cycle forms soon after the trajectory initiate from the original point which means that the impulsive patching and updating of antivirus software is quite effective. During the first period of the transmission, the worm or the virus spreads freely, the number represents susceptible computers decreases rapidly and the number stands for the infectious ones increased sharply. The developing trend of S and I(subplots (b) and (c) of Fig. (10)) indicates that the worm or virus erodes the computers ferociously, and most of the healthy computers will be infected without any intervention. After patching the system or updating the antivirus software, the infected computers will drop down instantly. Then it rises again according to the uncontrolled propagation. However, impulsive treatment triggered by the state of infected computers can prevent the deluge of worms and the collapse of the Internet. Enhancing the Internet monitor, publishing new version operating system patch, and developing efficient antivirus software can make the Internet operating normally.


    Acknowledgments

    We would like to sincerely thank the reviewers for their careful reading and constructive opinions of the original manuscript. This work is supported by NSFC(No.11671346, No.61751317, No.11701026), the Twin Tower Excellent Teacher supporting program (BUCEA2016) and the Fundamental Research Funds for Beijing University of Civil Engineering and Architecture (X18225, X18080) for M. Zhang. M. Zhang would like to thank the China Scholarship Council for financial support of her overseas study(No.201808110071).


    [1] [ Y. Cai, Y. Kang and W. Wang, Global stability of the steady states of an epidemic model incorporating intervention strategies, Mathematical Biosciences and Engineering, 14 (2017), 1071-1089.
    [2] [ L. Chen, X. Liang and Y. Pei, The periodic solutions of the impulsive state feedbck dynamical system, Commun. Math. Biol. Neurosci, 14 (2018).
    [3] [ A. M. Elaiw, Global properties of a class of virus infection models with multitarget cells, Nonlinear Dynamics, 69 (2012), 423-435.
    [4] [ A. M. Elaiw, R. M. Abukwaik and E. O. Alzahrani, Global properties of a cell mediated immunity in HIV infection model with two classes of target cells and distributed delays, International Journal of Biomathematics, 7 (2014), 1450055, 25 pp.
    [5] [ T. Fukunaga and W. Iwasaki, Inactivity periods and postural change speed can explain atypical postural change patterns of Caenorhabditis elegans mutants, BMC Bioinformatics, 18 (2017), p46.
    [6] [ H. Guo, L. Chen and X. Song, Qualitative analysis of impulsive state feedback control to an algae-fish system with bistable property, Appl. Math. Comput., 271 (2015), 905-922.
    [7] [ J. D. Hernández Guillén, A. Martín del Rey and L. Hernández Encinas, Study of the stability of a SEIRS model for computer worm propagation, Physica A: Statistical Mechanics and its Applications, 479 (2017), 411-421.
    [8] [ J. Jia, Z. Jin and L. Chang, Structural calculations and propagation modeling of growing networks based on continuous degree, Mathematical Biosciences and Engineering, 14 (2017), 1215-1232.
    [9] [ E. Kirmani and C. S. Hood, Analysis of a scanning model of worm propagation, Journal in Computer Virology, 6 (2010), 31-42.
    [10] [ S. Lefschetz, Contribution to the Theory of Nonlinear Oscillations, Vol. I, Princeton University Press, Princeton, 1950.
    [11] [ Z. Li, L. Chen and Z. Liu, Periodic solution of a chemostat model with variable yield and impulsive state feedback control, Appl. Math. Model., 36 (2012), 1255-1266.
    [12] [ X. Liang, Y. Pei and Y. Lv, Modeling the state dependent impulse control for computer virus propagation under media coverage, Physica A: Statistical Mechanics and its Applications, 491 (2018), 516-527.
    [13] [ B. Liu, Y. Tian and B. Kang, Dynamics on a Holling II predator-prey model with statedependent impulsive control, Int. J. Biomath., 5 (2012), 93-110.
    [14] [ S. Max, A matter of time: On the transitory nature of cyberweapons, Journal of Strategic Studies, 41 (2018), 6-32.
    [15] [ G. Pang and L. Chen, Periodic solution of the system with impulsive state feedback control, Nonlinear Dynam., 78 (2014), 743-753.
    [16] [ D. A. Ray, C. B. Ward and B. Munteanu, etc, Investigating the impact of real-world factors on internet worm propagation, Lecture Notes in Computer Science, 4812 (2007), 10-24.
    [17] [ M. Sun, Y. Liu and S. Liu, etc, A novel method for analyzing the stability of periodic solution of impulsive state feedback model, Appl. Math. Comput., 273 (2016), 425-434.
    [18] [ Y. Tian, K. Sun and L. Chen, Modelling and qualitative analysis of a predator-prey system with state-dependent impulsive effects, Math. Comput. Simulat., 82 (2011), 318-331.
    [19] [ A. Wang, Y. Xiao and H. Zhu, Dynamics of a filippov epidemic model with limited hospital beds, Mathematical Biosciences and Engineering, 15 (2018), 739-764.
    [20] [ C. Wei and L. Chen, Periodic Solution of Prey-Predator Model with Beddington-DeAngelis Functional Response and Impulsive State Feedback Control, Journal of Applied Mathematics, 2012 (2012), Art. ID 607105, 17 pp.
    [21] [ C. Wei and L. Chen, Homoclinic bifurcation of prey-predator model with impulsive state feedback control, Appl. Math. Comput., 237 (2014), 282-292.
    [22] [ X. Xiao, P. Fu and G. Hu, etc, SAIDR: A new dynamic model for SMS-based worm propagation in mobile networks, IEEE Access, 5 (2017), 9935-9943.
    [23] [ W. Xu, L. Chen and S. Chen, etc, An impulsive state feedback control model for releasing white-headed langurs in captive to the wild, Commun. Nonlinear Sci., 34 (2016), 199-209.
    [24] [ Y. Ye, Limit Cycle Theory, Shanghai Science and Technology Press, Shanghai, 1984. (in Chinese)
    [25] [ S. Yuan, X. Ji and H. Zhu, Asymptotic behavior of a delayed stochastic logistic model with impulsive perturbations, Mathematical Biosciences and Engineering, 14 (2017), 1477-1498.
    [26] [ Y. Zhang, Y. Li, Q. Zhang and A. Li, Behavior of a stochastic SIR epidemic model with saturated incidence and vaccination rules, Physica A, 501 (2018), 178-187.
    [27] [ M. Zhang, G. Song and L. Chen, A state feedback impulse model for computer worm control, Nonlinear Dynam., 85 (2016), 1561-1569.
    [28] [ Y. Zhang, Y. Zheng, F. Zhao and X. Liu, Dynamical analysis in a stochastic bioeconomic model with stage-structuring, Nonlinear Dynamics, 84 (2016), 1113-1121.
    [29] [ M. Zhu, X. Guo and Z. Lin, The risk index for an SIR epidemic model and spatial spreading of the infectious disease, Mathematical Biosciences and Engineering, 14 (2017), 1565-1583.
    [30] [ C. C. Zou, D. Towsley and W. Gong, On the performance of Internet worm scanning strategies, Performance Evaluation, 63 (2006), 700-723.
    [31] [ C. C. Zou, D. Towsley and W. Gong, On the performance of Internet worm scanning strategies, Performance Evaluation, 63 (2006), 700-723.
  • This article has been cited by:

    1. Qingyi Zhu, Pingfan Xiang, Xuhang Luo, Chenquan Gan, Mamoun Alazab, Dynamical Behavior of Hybrid Propagation of Computer Viruses, 2022, 2022, 1939-0122, 1, 10.1155/2022/2576685
    2. 秀秀 王, Impulsive State Feedback Control Model of Predator Population with Constant Release Rate in Polluted Water, 2022, 11, 2324-7991, 7302, 10.12677/AAM.2022.1110775
    3. Tieying Wang, Microbial insecticide model and homoclinic bifurcation of impulsive control system, 2021, 14, 1793-5245, 2150043, 10.1142/S1793524521500431
    4. Wenjie Li, Jinchen Ji, Lihong Huang, Global dynamics analysis of a water hyacinth fish ecological system under impulsive control, 2022, 359, 00160032, 10628, 10.1016/j.jfranklin.2022.09.030
    5. 烁烁 王, Study on the Second Model of State Feedback Impulsive Model of Red Squirrel Protection, 2021, 10, 2324-7991, 3640, 10.12677/AAM.2021.1011385
    6. Qingyi Zhu, Pingfan Xiang, Kefei Cheng, Chenquan Gan, Lu-Xing Yang, Hybrid Propagation and Control of Network Viruses on Scale-Free Networks, 2022, 1556-5068, 10.2139/ssrn.4012957
    7. Qingyi Zhu, Pingfan Xiang, Kefei Cheng, Chenquan Gan, Lu-Xing Yang, Hybrid Propagation and Control of Network Viruses on Scale-Free Networks, 2023, 49, 1017-060X, 10.1007/s41980-023-00834-z
  • Reader Comments
  • © 2018 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(3525) PDF downloads(596) Cited by(7)

Article outline

Figures and Tables

Figures(10)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog