1. Introduction
It is well known that information networks have become more and more important and universal in our work and daily lives with the rapid progress of communication technology. Recently, information networks have been frequently utilised in communication protocols, intelligent transportation, medical and health care and so on [
1]. However, due to the limitation of the application fields of wireless sensor, the large number of sensor nodes and other objective factors, it is impossible to pay attention to each sensor node manually, which leads to great obstacles or even inability to maintain the networks. Accompanying with it, information networks are frequently invaded by various kinds of malware. These have caused serious crisis for the communication confidentiality and security of information networks. How to prevent the spread of malware in information networks is an exigent problem to sustain the reliable performance of network systems. Therefore, finding out the spread law of malware and finding a reasonable control method of malware spread have gradually become a key topic to many scholars.
Mathematical model is a key tool to explain the law of malware propagation in information networks. As we know, there are many similarities between the spread of disease and the spread of malware. In fact, both of them can be distinguished by the differences in the attributes of the research objects. That is, the research objects generally can be divided into susceptible one, infected one, recovered one and so on. Therefore, the mathematical models of infectious diseases to study the malware propagation have been widely utilized by the domestic and foreign scholars. In recent years, Piqueira and Araujo [
2] proposed a classical Susceptible-Infected-Removed (SIR) malware spread model. Tang [
3] derived a modified SI model for analysis and design of information propagation mechanisms. Inspired by the compartmental biological epidemic model, the authors investigated an e-SEIRS-V model in [
4]. Ren et al. [
5] developed an SIR malware spread model with segmented recovery rate. Feng et al. [
6] proposed an SIRS model for worm propagation that distinguishes sensor nodes as susceptible, infected, and restored. The work presented in [
7] focused on a state feedback control model to study malware propagation in Mobile Wireless Sensor Networks (MWSNs). In [
8,
9,
10], different types of SEIRS malware propagation models were developed. Liu et al. [
11] developed an SEIRS model incorporating time delay to describe e-epidemic malware propagation.
In general, the mathematical models can be modeled and analyzed using traditional calculus [
12,
13,
14] or fractional calculus [
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31]. Nevertheless, Petras [
32] highlighted that fractional calculus offers greater flexibility in modeling dynamic systems than the traditional approach used for the aforementioned system. In recent decades, fractional calculus has gained significant attention with its broad applications in physics and engineering fields, encompassing biological systems, electromagnetic waves, thermal conduction, robotics, and so forth, see [
15,
16,
17,
18,
19] for details. Lately, there’s a growing trend in the study of the dynamics of fractional-order systems, which involves stability analysis, bifurcations, chaos, and related areas [
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31,
33]. Fractional derivatives can bring outstanding memory and describe the genetic characteristics of distinct materials and processes. In fact, lots of real-world processes show fractional-order dynamics and are depicted by the non-integer order differential models.
As is commonly understood, time delay is an essential element in the dynamics of malware propagation model, as it not only affects the dynamics of malware propagation and system stability, but also provides guidance for developing effective defense strategies and control measures. Prompted by the above dialogue, we have transitioned a delayed integer-order malware propagation model into a fractional-order model. The paper’s contributions are described hereafter:
(i) The Caputo fractional derivative is introduced to convert the SIRS model with time delay into a fractional-order model for the first occasion. To our knowledge, there have been few achievements for the latter model. Our new model more accurately reflects the actual situation. Therefore, for some practical applications, it will be more important.
() The local stability of the positive equilibrium in the fractional-order SIRS model is examined, and the precise bifurcation conditions of the model are explored with time delay as the bifurcation parameter.
The structure of this entire paper is highlighted as follows.
Section 2 provides the definition of the Caputo derivative and the primary model.
Section 3 delves into the local linear stability of the new model at the positive equilibrium point and presents the conditions for Hopf bifurcation.
Section 4 displays numerical examples to validate our theoretical findings. Finally,
Section 5 offers conclusions and future perspectives.
2. Model Description
As we know, a wireless sensor network represents an innovative type of information network, composed of numerous stationary and identical wireless sensors. We call the above wireless sensors as nodes. In general, according to whether the sensor nodes have been invaded by malware, the nodes can be categorized into three groups: susceptible (S), infected (I), and recovered (R) nodes. Each node has a correspondent variable at time
t. For simplicity,
,
and
represent the density of
S,
I and
R at time
t, respectively. In view of the SIR epidemic model [
34,
35,
36], Zhu and Zhao [
1] constructed an SIRS model to analyze malware propagation in information networks. The aforementioned specific model is detailed below:
where
with
are positive constants, and
is a nonnegative constant.
is the intrinsic growth rate of susceptible nodes. The constant
indicates the maximum environmental carrying capacity of the network.
is the infection rate of malware.
is the node mortality rate.
is the conversion rate of recovered nodes.
is the self-immunity repair coefficient of infected nodes.
describes the latency of the transition of recovered nodes.
,
and
are the initial density of
,
and
, respectively.
It is common knowledge that fractional-order calculus has more degrees of freedom when modeling dynamic systems. Next, the Model (1) is extended to the fractional-order case. There exist several shared definitions concerning fractional derivatives. We know that Caputo derivative is more widely chosen and used due to its convenience in practical applications and compatibility with integer-order derivative. Therefore, we choose Caputo derivative to generalize the Model (1) in this paper.
Definition 1. ([
32])
. The Caputo derivative of with order ξ is delineated below:
where
,
is the Gamma function and
.
Then we have if .
For the sake of brevity, we employ the notation to signify the Caputo derivative operator .
Therefore, Model (1) is transformed into the following fractional-order SIRS model.
where
for
, 2 and 3.
As we know, the issue of stability and bifurcation in the fractional-order SIRS model remains a challenging and unresolved problem. In the following, the dynamical properties of the fractional-order SIRS model, such as local stability and Hopf bifurcation, will be analyzed with time delay serving as the bifurcation parameter.
3. Theoretical Analysis
Firstly, in order to facilitate the discussion of the existence of the positive equilibrium point of system (2), the subsequent assumption is presented.
Assume that
holds.
Then there is one unique positive equilibrium point
in system (2), where
In what follows, we assign time delay
the role of bifurcation parameter, and then we analyze the dynamic behavior of the fractional delayed malware propagation model, give the delayed dependent stability criterion and the bifurcation condition. Since
holds, we let
,
and
. For convenience,
S is still substituted for
,
I is still substituted for
and
R is still substituted for
. Then one finds that
Thus, the positive equilibrium point of system (2) is converted to the system’s zero equilibrium point . Next, we will subsequently analyze the dynamics of system (3) at the zero equilibrium point .
Making a local linearization to system (3) at
, we find that
Assume that Equation (
6) has one root
. Hence, we have
where
represents the real part of
and
represents the imaginary part of
with
and 2. See
Appendix A for details of
and
with
and 2.
With the assumption that (8) has at least one positive real root, the bifurcation point can be characterized as
We assume that there is at least one positive real root of (9), and then the bifurcation point can be defined as
In order to explore the crossing conditions of Hopf bifurcation, we make the following hypothesis.
where
Appendix B provides the descriptions of
and
for
and
.
Lemma 1. Assume that Equation (6) has one root near where and . Then . It follows Equation (
6) that
Proof. Then, we have
where the real and imaginary parts of
are denoted by
and
, and the real and imaginary parts of
are denoted by
and
.
According to Hypothesis , Lemma 1 holds true. □
In order to study whether the system (2) is stable with , the subsequent hypotheses are considered:
,
.
Lemma 2. Assume that – hold. Then system (2) exhibits asymptotic stability at the positive equilibrium point when .
Proof. Since
, we have
According to the Hypotheses
–
and Routh-Hurwitz criteria, we get all roots of Equation (
14) having negative real parts. Then system (2) is asymptotically stable at
. □
In conclusion, the following outcomes have been obtained.
Theorem 1. Assume that – are true. The results that can be deduced for system (2) are listed hereafter.
(1) System (2) is asymptotically stable at when .
(2) System (2) undergoes a Hopf bifurcation at when . Namely, system (2) has a branch of periodic solutions bifurcating from the equilibrium point near .
Remark 1. In this study, we develop a fractional-order SIRS-based malware propagation model for information networks, distinct from the integer-order model examined in [1]. This new fractional SIRS model offers a more precise representation of the practical dynamics of malware spread in information networks. 4. Numerical Simulation
In this section, we will demonstrate the theoretical results through relevant numerical simulations and investigate the impact of time delay on the dynamics of the aforementioned Model (2). For convenience, the system parameters are set as follows.
and
, which are from the literature [
1]. Then we take into account the following system:
Hence, it is easy to calculate the unique positive equilibrium
.
When the influence of time delay in the dynamic system (15), the bifurcation point needs to be determined first. We choose
and
. Then we can figure out
and
. Applying Theorem 1, system (15) exhibits asymptotic stability at
when choosing
, which is illustrated in
Figure 1,
Figure 2 and
Figure 3. It can be observed that system (15) is unstable at
, and Hopf bifurcation generates from
when selecting
, as revealed in
Figure 4,
Figure 5 and
Figure 6. On the other hand,
Figure 7 and
Figure 8 are phase diagrams of system (15) with different values of
.
Figure 7 shows that system (15) exhibits local asymptotic stability at
when
. And we can see from
Figure 8 that (15) is unstable at
and a periodic oscillation bifurcates from
when
.
5. Conclusions
Fractional malware propagation models in information networks bring abundant dynamical behaviors. We have utilised fractional calculus theory to study the delayed fractional-order malware propagation model, i.e., the fractional-order SIRS model. The model’s stability and Hopf bifurcation have been examined by considering time delay as the bifurcation parameter. The simulation results have shown the effectiveness of the proposed criteria. Future work will introduce different time delays into the fractional-order SIRS model and analyze the role of multiple time delays in shaping the system’s dynamic changes.
Author Contributions
Methodology, X.S., X.C. and C.H.; Software, X.S., A.L., X.C., Y.H., C.H. and X.Y.; Validation, X.C.; Writing—original draft, X.S., A.L., X.C. and C.H.; Writing—review & editing, X.S. and Y.H. All authors have read and agreed to the published version of the manuscript.
Funding
This work was jointly supported by the Natural Science Foundation of Jiangsu Higher Education Institutions of China (Grant No. 20KJB110005) and Qing Lan Project of the Jiangsu Higher Education Institutions.
Data Availability Statement
The data used to support the findings of this study are included within the paper.
Conflicts of Interest
The authors declare no competing financial interests.
Appendix A
The calculating expressions for
,
,
and
of Equation (
7).
Appendix B
The calculating expressions for
,
,
and
of Equation (
13).
References
- Zhu, L.H.; Zhao, H.Y. Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 2015, 149, 1370–1386. [Google Scholar] [CrossRef]
- Piqueira, J.R.C.; Araujo, V.O. A modified epidemiological model for computer viruses. Appl. Math. Comput. 2009, 213, 355–360. [Google Scholar] [CrossRef]
- Tang, S. A modified SI epidemic model for combating virus spread in wireless sensor networks. Int. J. Wirel. Inf. Netw. 2011, 18, 319–326. [Google Scholar] [CrossRef]
- Mishra, B.; Keshri, N. Mathematical model on the transmission of worms in wireless sensor network. Appl. Math. Model 2013, 37, 4103–4111. [Google Scholar] [CrossRef]
- Ren, J.G.; Yang, X.F.; Zhu, Q.Y.; Yang, L.X.; Zhang, C.M. A novel computer virus model and its dynamics. Nonlinear Anal. Real 2012, 13, 376–384. [Google Scholar] [CrossRef]
- Feng, L.P.; Song, L.P.; Zhao, Q.S.; Wang, H.B. Modeling and stability analysis of worm propagation in wireless sensor network. Math. Probl. Eng. 2015, 2015, 129598. [Google Scholar] [CrossRef]
- Zhu, L.H.; Zhao, H.Y.; Wang, X.M. Bifurcation analysis of a delay reaction-diffusion malwarepropagation model with feedback control. Commun. Nonlinear Sci. 2015, 22, 747–768. [Google Scholar] [CrossRef]
- Hosseini, S.; Azgomi, M.A.; Rahmani, A.T. Malware propagation modeling considering software diversity and immunization. J. Comput. Sci. 2016, 13, 49–67. [Google Scholar] [CrossRef]
- Geetha, R.; Madhusudanan, V.; Srinivas, M.N. Influence of clamor on the transmission of worms in remote sensor network. Wirel. Pers. Commun. 2021, 118, 461–473. [Google Scholar] [CrossRef]
- Yu, Z.H.; Gao, H.X.; Wang, D.; Alnuaim, A.A.; Firdausi, M.; Mostafa, A.M. SEI2RS malware propagation model considering two infection rates in cyber-physical systems. Phys. A 2022, 597, 127207. [Google Scholar] [CrossRef]
- Liu, J.; Saeed, T.; Zeb, A. Delay effect of an e-epidemic SEIRS malware propagation model with a generalized non-monotone incidence rate. Results Phys. 2022, 39, 105672. [Google Scholar] [CrossRef]
- Ke, Y.; Zhu, L.H.; Wu, P.; Shi, L. Dynamics of a reaction-diffusion rumor propagation model with non-smooth control. Appl. Math. Comput. 2022, 435, 127478. [Google Scholar] [CrossRef]
- Yuan, T.R.; Guan, G.; Shen, S.; Zhu, L.H. Stability analysis and optimal control of Epidemic-like transmission model with nonlinear inhibition mechanism and time delay in both homogeneous and heterogeneous networks. J. Math. Anal. Appl. 2023, 526, 127273. [Google Scholar] [CrossRef]
- Yavuz, M.; Rahman, M.; Yildiz, M.; Joshi, H. Mathematical modeling of middle east respiratory syndrome coronavirus with bifurcation analysis. Contemp. Math. 2024, 5, 3997–4012. [Google Scholar] [CrossRef]
- Picozzi, S.; West, B. Fractional Langevin model of memory in financial markets. Phys. Rev. E 2002, 66, 46–118. [Google Scholar] [CrossRef] [PubMed]
- Reyes-Melo, E.; Martinez-Vega, J.; Guerrero-Salazar, C.; Ortiz-Mendez, U. Application of fractional calculus to the modeling of dielectric relaxation phenomena in poly meric materials. J. Appl. Polym. Sci. 2005, 98, 923–935. [Google Scholar] [CrossRef]
- Ahmed, E.; Elgazzar, A. On fractional order differential equations model for nonlocal epidemics. Phys. A 2007, 379, 607–614. [Google Scholar] [CrossRef]
- Özalp, N.; Demirci, E. A fractional order SEIR model with vertical transmission. Math. Comput. Model 2011, 54, 1–6. [Google Scholar] [CrossRef]
- Song, L.; Xu, S.; Yang, J. Dynamical models of happiness with fractional order. Commun. Nonlinear Sci. 2010, 15, 616–628. [Google Scholar] [CrossRef]
- Deng, W.H.; Li, C.P.; Lu, J. Stability analysis of linear fractional differential system with multiple time delays. Nonlinear Dyn. 2007, 48, 409–416. [Google Scholar] [CrossRef]
- Tavazoei, M.S.; Haeri, M.; Siami, M.; Bolouki, S. Maximum number of frequencies in oscillations generated by fractional order LTI systems. IEEE Trans. Signal Process. 2010, 58, 4003–4012. [Google Scholar] [CrossRef]
- El-Saka, H.A.; Ahmed, E.; Shehata, M.I.; ElSayed, A.M.A. On stability, persistence, and Hopf bifurcation in fractional order dynamical systems. Nonlinear Dyn. 2009, 56, 121–126. [Google Scholar] [CrossRef]
- Leung, A.Y.T.; Yang, H.; Zhu, P. Periodic bifurcation of Duffing-van der Pol oscillators having fractional derivatives and time delay. Commun. Nonlinear Sci. 2014, 19, 1142–1155. [Google Scholar] [CrossRef]
- Wang, J.; Xiong, X. A general fractional-order dynamical network: Synchronization behavior and state tuning. Chaos 2012, 22, 023102. [Google Scholar] [CrossRef] [PubMed]
- Huang, C.D.; Wang, J.; Chen, X.P.; Cao, J.D. Bifurcations in a fractional-order BAM neural network with four different delays. Neural Netw. 2021, 141, 344–354. [Google Scholar] [CrossRef]
- Huang, C.D.; Liu, H.; Shi, X.Y.; Chen, X.P.; Xiao, M.; Wang, Z.X.; Cao, J.D. Bifurcations in a fractional-order neural network with multiple leakage delays. Neural Netw. 2020, 131, 115–126. [Google Scholar] [CrossRef]
- Huang, C.D.; Cao, J.D. Bifurcations induced by self-connection delay in high-order fractional neural networks. Neural Process. Lett. 2021, 53, 637–651. [Google Scholar] [CrossRef]
- Xu, C.J.; Zhang, W.; Aouiti, C.; Liu, Z.X.; Yao, L.Y. Bifurcation insight for a fractional-order stage-structured predator-prey system incorporating mixed time delays. Math. Method Appl. Sci. 2023, 46, 9103–9118. [Google Scholar] [CrossRef]
- Xu, C.J.; Liu, Z.X.; Li, P.L.; Yan, J.L.; Yao, L.Y. Bifurcation mechanism for fractional-order three-triangle multi-delayed neural networks. Neural Process. Lett. 2022, 55, 6125–6151. [Google Scholar] [CrossRef]
- Huang, C.D.; Liu, H.; Chen, X.P.; Zhang, M.S.; Ding, L.; Cao, J.D.; Alsaedi, A. Dynamic optimal control of enhancing feedback treatment for a delayed fractional order predator-prey model. Phys. A 2020, 554, 124136. [Google Scholar] [CrossRef]
- Mo, S.S.; Huang, C.D.; Cao, J.D.; Alsaedi, A. Dynamical bifurcations in a fractional-order neural network with nonidentical communication delays. Cogn. Comput. 2023, 15, 466–485. [Google Scholar] [CrossRef]
- Petras, I. Fractional-Order Nonlinear Systems: Modeling, Analysis and Simulation; Springer: New York, NY, USA, 2011. [Google Scholar]
- Chen, X.P.; Huang, C.D.; Cao, J.D.; Shi, X.Y.; Luo, A. Hopf bifurcation in the delayed fractional Leslie-Gower model with Holling type II functional response. J. Appl. Anal. Comput. 2023, 13, 2555–2571. [Google Scholar] [CrossRef] [PubMed]
- Feng, L.; Liao, X.; Han, Q.; Li, H. Dynamical analysis and control strategies on malware propagation model. Appl. Math. Model 2013, 37, 8225–8236. [Google Scholar] [CrossRef]
- Zhang, T.; Liu, J.; Teng, Z. Dynamic behavior for a nonautonomous SIR Sepidemic model with distributed delays. Appl. Math. Comput. 2009, 214, 624–631. [Google Scholar]
- Lu, Y.; Jiang, G. Backward bifurcation and local dynamics of epidemic model on adaptive networks with treatment. Neurocomputing 2014, 145, 113–121. [Google Scholar] [CrossRef]
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).