Next Article in Journal
An Effective Hybrid Metaheuristic Approach Based on the Genetic Algorithm
Previous Article in Journal
Evolution and Motivation of the Value-Added Trade Pattern of Producer Services Based on a Complex Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Dynamical Behaviors of a Fractional-Order Malware Propagation Model in Information Networks

1
Department of Mathematics, Taizhou University, Taizhou 225300, China
2
School of Mathematics and Statistics, Xinyang Normal University, Xinyang 464000, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(23), 3814; https://doi.org/10.3390/math12233814
Submission received: 8 October 2024 / Revised: 8 November 2024 / Accepted: 12 November 2024 / Published: 2 December 2024
(This article belongs to the Section C2: Dynamical Systems)

Abstract

:
With the swift progress in communication and IT, information networks are increasingly integrated into our work and everyday life. This paper is dedicated to the study of the information network dynamics for a newly proposed fractional-order malware propagation model. Guided by the matrix theory of eigenvalues, the local stability criteria for the model described above are investigated. In addition, Hopf bifurcation is under examination with time delay serving as the bifurcation parameter. Numerical simulations are used to validate the accuracy of theoretical outcomes.

1. Introduction

It is well known that information networks have become more and more important and universal in our work and daily lives with the rapid progress of communication technology. Recently, information networks have been frequently utilised in communication protocols, intelligent transportation, medical and health care and so on [1]. However, due to the limitation of the application fields of wireless sensor, the large number of sensor nodes and other objective factors, it is impossible to pay attention to each sensor node manually, which leads to great obstacles or even inability to maintain the networks. Accompanying with it, information networks are frequently invaded by various kinds of malware. These have caused serious crisis for the communication confidentiality and security of information networks. How to prevent the spread of malware in information networks is an exigent problem to sustain the reliable performance of network systems. Therefore, finding out the spread law of malware and finding a reasonable control method of malware spread have gradually become a key topic to many scholars.
Mathematical model is a key tool to explain the law of malware propagation in information networks. As we know, there are many similarities between the spread of disease and the spread of malware. In fact, both of them can be distinguished by the differences in the attributes of the research objects. That is, the research objects generally can be divided into susceptible one, infected one, recovered one and so on. Therefore, the mathematical models of infectious diseases to study the malware propagation have been widely utilized by the domestic and foreign scholars. In recent years, Piqueira and Araujo [2] proposed a classical Susceptible-Infected-Removed (SIR) malware spread model. Tang [3] derived a modified SI model for analysis and design of information propagation mechanisms. Inspired by the compartmental biological epidemic model, the authors investigated an e-SEIRS-V model in [4]. Ren et al. [5] developed an SIR malware spread model with segmented recovery rate. Feng et al. [6] proposed an SIRS model for worm propagation that distinguishes sensor nodes as susceptible, infected, and restored. The work presented in [7] focused on a state feedback control model to study malware propagation in Mobile Wireless Sensor Networks (MWSNs). In [8,9,10], different types of SEIRS malware propagation models were developed. Liu et al. [11] developed an SEIRS model incorporating time delay to describe e-epidemic malware propagation.
In general, the mathematical models can be modeled and analyzed using traditional calculus [12,13,14] or fractional calculus [15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31]. Nevertheless, Petras [32] highlighted that fractional calculus offers greater flexibility in modeling dynamic systems than the traditional approach used for the aforementioned system. In recent decades, fractional calculus has gained significant attention with its broad applications in physics and engineering fields, encompassing biological systems, electromagnetic waves, thermal conduction, robotics, and so forth, see [15,16,17,18,19] for details. Lately, there’s a growing trend in the study of the dynamics of fractional-order systems, which involves stability analysis, bifurcations, chaos, and related areas [20,21,22,23,24,25,26,27,28,29,30,31,33]. Fractional derivatives can bring outstanding memory and describe the genetic characteristics of distinct materials and processes. In fact, lots of real-world processes show fractional-order dynamics and are depicted by the non-integer order differential models.
As is commonly understood, time delay is an essential element in the dynamics of malware propagation model, as it not only affects the dynamics of malware propagation and system stability, but also provides guidance for developing effective defense strategies and control measures. Prompted by the above dialogue, we have transitioned a delayed integer-order malware propagation model into a fractional-order model. The paper’s contributions are described hereafter:
(i) The Caputo fractional derivative is introduced to convert the SIRS model with time delay into a fractional-order model for the first occasion. To our knowledge, there have been few achievements for the latter model. Our new model more accurately reflects the actual situation. Therefore, for some practical applications, it will be more important.
( i i ) The local stability of the positive equilibrium in the fractional-order SIRS model is examined, and the precise bifurcation conditions of the model are explored with time delay as the bifurcation parameter.
The structure of this entire paper is highlighted as follows. Section 2 provides the definition of the Caputo derivative and the primary model. Section 3 delves into the local linear stability of the new model at the positive equilibrium point and presents the conditions for Hopf bifurcation. Section 4 displays numerical examples to validate our theoretical findings. Finally, Section 5 offers conclusions and future perspectives.

2. Model Description

As we know, a wireless sensor network represents an innovative type of information network, composed of numerous stationary and identical wireless sensors. We call the above wireless sensors as nodes. In general, according to whether the sensor nodes have been invaded by malware, the nodes can be categorized into three groups: susceptible (S), infected (I), and recovered (R) nodes. Each node has a correspondent variable at time t. For simplicity, S ( t ) , I ( t ) and R ( t ) represent the density of S, I and R at time t, respectively. In view of the SIR epidemic model [34,35,36], Zhu and Zhao [1] constructed an SIRS model to analyze malware propagation in information networks. The aforementioned specific model is detailed below:
d S t d t = a 1 S t 1 S t a 2 a 3 S t I t a 4 S t + a 5 R t ι d I t d t = a 3 S t I t a 6 I t a 4 I t d R t d t = a 6 I t a 4 R t a 5 R t ι ,
where
S t = S 0 0 , t ι , 0 I t = I 0 0 , t ι , 0 R t = R 0 0 , t ι , 0 ,
a i with i = 1 , . . . , 6 are positive constants, and ι is a nonnegative constant. a 1 is the intrinsic growth rate of susceptible nodes. The constant a 2 indicates the maximum environmental carrying capacity of the network. a 3 is the infection rate of malware. a 4 is the node mortality rate. a 5 is the conversion rate of recovered nodes. a 6 is the self-immunity repair coefficient of infected nodes. ι describes the latency of the transition of recovered nodes. S 0 , I 0 and R 0 are the initial density of S ( t ) , I ( t ) and R ( t ) , respectively.
It is common knowledge that fractional-order calculus has more degrees of freedom when modeling dynamic systems. Next, the Model (1) is extended to the fractional-order case. There exist several shared definitions concerning fractional derivatives. We know that Caputo derivative is more widely chosen and used due to its convenience in practical applications and compatibility with integer-order derivative. Therefore, we choose Caputo derivative to generalize the Model (1) in this paper.
Definition 1. 
([32]). The Caputo derivative of g ( t ) with order ξ is delineated below:
D t 0 , t ξ C g ( t ) = 1 Γ ( n ξ ) t 0 t ( t x ) n ξ 1 g ( n ) ( x ) d x ,
where n 1 < ξ n Z + , Γ ( · ) is the Gamma function and Γ ( x ) = 0 t x 1 e t d x .
Then we have D t 0 , t ξ C g ( t ) = 1 Γ ( 1 ξ ) 0 t ( t ι ) ξ g ( ι ) d ι if 0 < ξ 1 .
For the sake of brevity, we employ the notation D ξ g ( t ) to signify the Caputo derivative operator D t 0 , t ξ C g ( t ) .
Therefore, Model (1) is transformed into the following fractional-order SIRS model.
D ξ 1 S t = a 1 S t 1 S t a 2 a 3 S t I t a 4 S t + a 5 R t ι D ξ 2 I t = a 3 S t I t a 6 I t a 4 I t D ξ 3 R t = a 6 I t a 4 R t a 5 R t ι ,
where ξ i ( 0 , 1 ] for i = 1 , 2 and 3.
As we know, the issue of stability and bifurcation in the fractional-order SIRS model remains a challenging and unresolved problem. In the following, the dynamical properties of the fractional-order SIRS model, such as local stability and Hopf bifurcation, will be analyzed with time delay ι serving as the bifurcation parameter.

3. Theoretical Analysis

Firstly, in order to facilitate the discussion of the existence of the positive equilibrium point of system (2), the subsequent assumption is presented.
Assume that
( H 1 ) a 1 ( a 2 a 3 a 6 a 4 ) a 2 a 3 a 4 > 0
holds.
Then there is one unique positive equilibrium point E = ( S , I , R ) T in system (2), where
S = a 6 + a 4 a 3 ,
I = ( a 4 + a 5 ) ( a 4 + a 6 ) [ a 1 ( a 2 a 3 a 6 a 4 ) a 2 a 3 a 4 ] a 2 a 4 a 3 2 ( a 6 + a 4 + a 5 ) ,
R = a 6 ( a 4 + a 6 ) [ a 1 ( a 2 a 3 a 6 a 4 ) a 2 a 3 a 4 ] a 2 a 4 a 3 2 ( a 6 + a 4 + a 5 ) .
In what follows, we assign time delay ι the role of bifurcation parameter, and then we analyze the dynamic behavior of the fractional delayed malware propagation model, give the delayed dependent stability criterion and the bifurcation condition. Since ( H 1 ) holds, we let S ¯ = S S , I ¯ = I I and R ¯ = R R . For convenience, S is still substituted for S ¯ , I is still substituted for I ¯ and R is still substituted for R ¯ . Then one finds that
D ξ 1 S t = a 1 2 a 1 S a 2 a 3 I a 4 S t a 3 S I t + a 5 R t ι a 3 S t I t a 1 a 2 S t 2 D ξ 2 I t = a 3 I S t + a 3 S a 4 a 6 I t + a 3 S t I t D ξ 3 R t = a 6 I t a 4 R t a 5 R t ι .
Thus, the positive equilibrium point of system (2) E = ( S , I , R ) T is converted to the system’s zero equilibrium point E 0 = ( 0 , 0 , 0 ) T . Next, we will subsequently analyze the dynamics of system (3) at the zero equilibrium point E 0 .
Making a local linearization to system (3) at E 0 , we find that
D ξ 1 S t = a 1 2 a 1 S a 2 a 3 I a 4 S t a 3 S I t + a 5 R t ι D ξ 2 I t = a 3 I S t + a 3 S a 4 a 6 I t D ξ 3 R t = a 6 I t a 4 R t a 5 R t ι .
Then, we obtain
s ξ 1 m 11 m 12 m 13 e s ι m 21 s ξ 2 m 22 m 23 m 31 m 32 s ξ 3 m 33 m 33 e s ι = 0 ,
where
m 11 = a 1 2 a 1 S a 2 a 3 I a 4 , m 12 = a 3 S , m 13 = a 5 , m 21 = a 3 I , m 22 = a 3 S a 4 a 6 , m 23 = 0 , m 31 = 0 , m 32 = a 6 , m 33 = a 4 , m 33 = a 5 .
Then, we have
P 1 s + P 2 s e s ι = 0 ,
P 1 s = s ξ 1 + ξ 2 + ξ 3 m 33 s ξ 1 + ξ 2 m 22 s ξ 1 + ξ 3 m 11 s ξ 2 + ξ 3 + m 22 m 33 s ξ 1 + m 11 m 33 s ξ 2 + m 11 m 22 m 12 m 21 s ξ 3 m 11 m 22 m 33 + m 12 m 21 m 33 , P 2 s = m 33 s ξ 1 + ξ 2 + m 22 m 33 s ξ 1 + m 11 m 33 s ξ 2 m 11 m 22 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 .
Assume that Equation (6) has one root s = ϖ ( cos π 2 + i sin π 2 ) . Hence, we have
A 2 cos ϖ ι + B 2 sin ϖ ι = A 1 B 2 cos ϖ ι A 2 sin ϖ ι = B 1 ,
where A j represents the real part of P j ( s ) and B j represents the imaginary part of P j ( s ) with j = 1 and 2. See Appendix A for details of A j and B j with j = 1 and 2.
It follows from (7) that
cos ϖ ι = A 1 A 2 + B 1 B 2 A 2 2 + B 2 2 = G 1 ( ϖ ) sin ϖ ι = A 2 B 1 A 1 B 2 A 2 2 + B 2 2 = G 2 ( ϖ ) .
It follows that
G 1 2 ( ϖ ) + G 2 2 ( ϖ ) = 1 .
With the assumption that (8) has at least one positive real root, the bifurcation point can be characterized as
ι 0 = min ι j , j = 0 , 1 , 2 ,
We assume that there is at least one positive real root of (9), and then the bifurcation point can be defined as
τ 0 = min τ j , j = 0 , 1 , 2 ,
In order to explore the crossing conditions of Hopf bifurcation, we make the following hypothesis.
( H 2 ) M 1 N 1 + M 2 N 2 N 1 2 + N 2 2 0 ,
where Appendix B provides the descriptions of M j and N j for j = 1 and j = 2 .
Lemma 1. 
Assume that Equation (6) has one root s ( ι ) = γ ( ι ) + i ϖ ( ι ) near ι 0 where γ ( ι 0 ) = 0 and ϖ ( ι 0 ) = ϖ 0 . Then Re d s d ι | ( ι = ι 0 , ϖ = ϖ 0 ) 0 .
It follows Equation (6) that
P 1 ( s ) d s d ι + P 2 ( s ) e s ι d s d ι + P 2 ( s ) e s ι ( ι d s d ι s ) = 0 .
Therefore, we have
d s d ι = M s N s ,
where
M s = m 33 s ξ 1 + ξ 2 + m 22 m 33 s ξ 1 + m 11 m 33 s ξ 2 m 11 m 22 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 s e s ι , N s = ξ 1 + ξ 2 + ξ 3 s ξ 1 + ξ 2 + ξ 3 1 m 33 ξ 1 + ξ 2 s ξ 1 + ξ 2 1 m 22 ξ 1 + ξ 3 s ξ 1 + ξ 3 1 m 11 ξ 2 + ξ 3 s ξ 2 + ξ 3 1 + m 22 m 33 ξ 1 s ξ 1 1 + m 11 m 33 ξ 2 s ξ 2 1 + m 11 m 22 m 12 m 21 ξ 3 s ξ 3 1 + m 33 ξ 1 + ξ 2 s ξ 1 + ξ 2 1 + m 22 m 33 ξ 1 s ξ 1 1 + m 11 m 33 ξ 2 s ξ 2 1 e s ι + m 33 s ξ 1 + ξ 2 + m 22 m 33 s ξ 1 + m 11 m 33 s ξ 2 m 11 m 22 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 ι e s ι .
Proof. 
Then, we have
Re d s d ι ι = ι 0 , w = w 0 = M 1 N 1 + M 2 N 2 N 1 2 + N 2 2 ,
where the real and imaginary parts of M ( s ) are denoted by M 1 and M 2 , and the real and imaginary parts of N ( s ) are denoted by N 1 and N 2 .
According to Hypothesis ( H 2 ) , Lemma 1 holds true. □
In order to study whether the system (2) is stable with ι = 0 , the subsequent hypotheses are considered:
( H 3 ) m 11 + m 22 + m 33 + m 33 < 0 ,
( H 4 ) m 11 + m 22 + m 33 + m 33 m 11 m 22 + m 11 m 33 + m 11 m 33 m 12 m 21 + m 22 m 33 + m 22 m 33 m 11 m 22 m 33 m 11 m 22 m 33 + m 12 m 21 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 < 0 ,
( H 5 ) m 11 m 22 m 33 m 11 m 22 m 33 + m 12 m 21 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 > 0 .
Lemma 2. 
Assume that ( H 3 ) ( H 5 ) hold. Then system (2) exhibits asymptotic stability at the positive equilibrium point E = ( S , I , R ) T when ι = 0 .
Proof. 
Since ι = 0 , we have
s 3 m 11 + m 22 + m 33 + m 33 s 2 + m 11 m 22 + m 11 m 33 + m 11 m 33 m 12 m 21 + m 22 m 33 + m 22 m 33 s m 11 m 22 m 33 m 11 m 22 m 33 + m 12 m 21 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 = 0 .
According to the Hypotheses ( H 3 ) ( H 5 ) and Routh-Hurwitz criteria, we get all roots of Equation (14) having negative real parts. Then system (2) is asymptotically stable at E = ( S , I , R ) T . □
In conclusion, the following outcomes have been obtained.
Theorem 1. 
Assume that ( H 1 ) ( H 5 ) are true. The results that can be deduced for system (2) are listed hereafter.
(1) System (2) is asymptotically stable at E when ι [ 0 , ι 0 ) .
(2) System (2) undergoes a Hopf bifurcation at E when ι = ι 0 . Namely, system (2) has a branch of periodic solutions bifurcating from the equilibrium point E near ι = ι 0 .
Remark 1. 
In this study, we develop a fractional-order SIRS-based malware propagation model for information networks, distinct from the integer-order model examined in [1]. This new fractional SIRS model offers a more precise representation of the practical dynamics of malware spread in information networks.

4. Numerical Simulation

In this section, we will demonstrate the theoretical results through relevant numerical simulations and investigate the impact of time delay on the dynamics of the aforementioned Model (2). For convenience, the system parameters are set as follows. a 1 = 0.3 , a 2 = 2 , a 3 = 0.5 , a 4 = 0.1 , a 5 = 0.2 and a 6 = 0.4 , which are from the literature [1]. Then we take into account the following system:
D ξ 1 S t = 0.3 S t 1 S t 2 0.5 S t I t 0.1 S t + 0.2 R t ι D ξ 2 I t = 0.5 S t I t 0.4 I t 0.1 I t D ξ 3 R t = 0.4 I t 0.1 R t 0.2 R t ι .
Hence, it is easy to calculate the unique positive equilibrium E = ( 1 , 0.2143 , 0.2857 ) T .
When the influence of time delay in the dynamic system (15), the bifurcation point needs to be determined first. We choose ξ 1 = 0.97 , ξ 2 = 0.98 and ξ 3 = 0.99 . Then we can figure out ϖ 0 = 0.2860 and ι 0 = 10.6719 . Applying Theorem 1, system (15) exhibits asymptotic stability at E when choosing ι = 8 < ι 0 , which is illustrated in Figure 1, Figure 2 and Figure 3. It can be observed that system (15) is unstable at E , and Hopf bifurcation generates from E when selecting ι = 11 > ι 0 , as revealed in Figure 4, Figure 5 and Figure 6. On the other hand, Figure 7 and Figure 8 are phase diagrams of system (15) with different values of ι . Figure 7 shows that system (15) exhibits local asymptotic stability at E when ι = 8 < ι 0 . And we can see from Figure 8 that (15) is unstable at E and a periodic oscillation bifurcates from E when ι = 11 > ι 0 .

5. Conclusions

Fractional malware propagation models in information networks bring abundant dynamical behaviors. We have utilised fractional calculus theory to study the delayed fractional-order malware propagation model, i.e., the fractional-order SIRS model. The model’s stability and Hopf bifurcation have been examined by considering time delay as the bifurcation parameter. The simulation results have shown the effectiveness of the proposed criteria. Future work will introduce different time delays into the fractional-order SIRS model and analyze the role of multiple time delays in shaping the system’s dynamic changes.

Author Contributions

Methodology, X.S., X.C. and C.H.; Software, X.S., A.L., X.C., Y.H., C.H. and X.Y.; Validation, X.C.; Writing—original draft, X.S., A.L., X.C. and C.H.; Writing—review & editing, X.S. and Y.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was jointly supported by the Natural Science Foundation of Jiangsu Higher Education Institutions of China (Grant No. 20KJB110005) and Qing Lan Project of the Jiangsu Higher Education Institutions.

Data Availability Statement

The data used to support the findings of this study are included within the paper.

Conflicts of Interest

The authors declare no competing financial interests.

Appendix A

The calculating expressions for A 1 , A 2 , B 1 and B 2 of Equation (7).
A 1 = ϖ ξ 1 + ξ 2 + ξ 3 cos ξ 1 + ξ 2 + ξ 3 π 2 m 33 ϖ ξ 1 + ξ 2 cos ξ 1 + ξ 2 π 2 m 22 ϖ ξ 1 + ξ 3 cos ξ 1 + ξ 3 π 2 m 11 ϖ ξ 2 + ξ 3 cos ξ 2 + ξ 3 π 2 + m 22 m 33 ϖ ξ 1 cos ξ 1 π 2 + m 11 m 33 ϖ ξ 2 cos ξ 2 π 2 + m 11 m 22 m 12 m 21 ϖ ξ 3 cos ξ 3 π 2 m 11 m 22 m 33 + m 12 m 21 m 33 , B 1 = ϖ ξ 1 + ξ 2 + ξ 3 sin ξ 1 + ξ 2 + ξ 3 π 2 m 33 ϖ ξ 1 + ξ 2 sin ξ 1 + ξ 2 π 2 m 22 ϖ ξ 1 + ξ 3 sin ξ 1 + ξ 3 π 2 m 11 ϖ ξ 2 + ξ 3 sin ξ 2 + ξ 3 π 2 + m 22 m 33 ϖ ξ 1 sin ξ 1 π 2 + m 11 m 33 ϖ ξ 2 sin ξ 2 π 2 + m 11 m 22 m 12 m 21 ϖ ξ 3 sin ξ 3 π 2 , A 2 = m 33 ϖ ξ 1 + ξ 2 cos ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 cos ξ 1 π 2 + m 11 m 33 ϖ ξ 2 cos ξ 2 π 2 m 11 m 22 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 , B 2 = m 33 ϖ ξ 1 + ξ 2 sin ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 sin ξ 1 π 2 + m 11 m 33 ϖ ξ 2 sin ξ 2 π 2 .

Appendix B

The calculating expressions for M 1 , M 2 , N 1 and N 2 of Equation (13).
M 1 = ϖ 0 m 33 ϖ ξ 1 + ξ 2 cos ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 cos ξ 1 π 2 + m 11 m 33 ϖ ξ 2 cos ξ 2 π 2 m 11 m 22 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 sin ϖ 0 ι 0 + m 33 ϖ ξ 1 + ξ 2 sin ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 sin ξ 1 π 2 + m 11 m 33 ϖ ξ 2 sin ξ 2 π 2 cos ϖ 0 ι 0 , M 2 = ϖ 0 m 33 ϖ ξ 1 + ξ 2 cos ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 cos ξ 1 π 2 + m 11 m 33 ϖ ξ 2 cos ξ 2 π 2 m 11 m 22 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 cos ϖ 0 ι 0 + m 33 ϖ ξ 1 + ξ 2 sin ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 sin ξ 1 π 2 + m 11 m 33 ϖ ξ 2 sin ξ 2 π 2 sin ϖ 0 ι 0 , N 1 = ξ 1 + ξ 2 + ξ 3 ϖ ξ 1 + ξ 2 + ξ 3 1 cos ξ 1 + ξ 2 + ξ 3 1 π 2 m 33 ξ 1 + ξ 2 ϖ ξ 1 + ξ 2 1 cos ξ 1 + ξ 2 1 π 2 m 22 ξ 1 + ξ 3 ϖ ξ 1 + ξ 3 1 cos ξ 1 + ξ 3 1 π 2 m 11 ξ 2 + ξ 3 ϖ ξ 2 + ξ 3 1 cos ξ 2 + ξ 3 1 π 2 + m 22 m 33 ξ 1 ϖ ξ 1 1 cos ξ 1 1 π 2 + m 11 m 33 ξ 2 ϖ ξ 2 1 cos ξ 2 1 π 2 + m 11 m 22 m 12 m 21 ξ 3 ϖ ξ 3 1 cos ξ 3 1 π 2 + m 33 ξ 1 + ξ 2 ϖ ξ 1 + ξ 2 1 cos ξ 1 + ξ 2 1 π 2 + m 22 m 33 ξ 1 ϖ ξ 1 1 cos ξ 1 1 π 2 + m 11 m 33 ξ 2 ϖ ξ 2 1 cos ξ 2 1 π 2 + ι 0 m 33 ϖ ξ 1 + ξ 2 cos ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 cos ξ 1 π 2 + m 11 m 33 ϖ ξ 2 cos ξ 2 π 2 m 11 m 22 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 cos ϖ 0 ι 0 + m 33 ξ 1 + ξ 2 ϖ ξ 1 + ξ 2 1 sin ξ 1 + ξ 2 1 π 2 + m 22 m 33 ξ 1 ϖ ξ 1 1 sin ξ 1 1 π 2 + m 11 m 33 ξ 2 ϖ ξ 2 1 sin ξ 2 1 π 2 + ι 0 m 33 ϖ ξ 1 + ξ 2 sin ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 sin ξ 1 π 2 + m 11 m 33 ϖ ξ 2 sin ξ 2 π 2 sin ϖ 0 ι 0 ,
N 2 = ξ 1 + ξ 2 + ξ 3 ϖ ξ 1 + ξ 2 + ξ 3 1 sin ξ 1 + ξ 2 + ξ 3 1 π 2 m 33 ξ 1 + ξ 2 ϖ ξ 1 + ξ 2 1 sin ξ 1 + ξ 2 1 π 2 m 22 ξ 1 + ξ 3 ϖ ξ 1 + ξ 3 1 sin ξ 1 + ξ 3 1 π 2 m 11 ξ 2 + ξ 3 ϖ ξ 2 + ξ 3 1 sin ξ 2 + ξ 3 1 π 2 + m 22 m 33 ξ 1 ϖ ξ 1 1 sin ξ 1 1 π 2 + m 11 m 33 ξ 2 ϖ ξ 2 1 sin ξ 2 1 π 2 + m 11 m 22 m 12 m 21 ξ 3 ϖ ξ 3 1 cos ξ 3 1 π 2 m 33 ξ 1 + ξ 2 ϖ ξ 1 + ξ 2 1 cos ξ 1 + ξ 2 1 π 2 + m 22 m 33 ξ 1 ϖ ξ 1 1 cos ξ 1 1 π 2 + m 11 m 33 ξ 2 ϖ ξ 2 1 cos ξ 2 1 π 2 + ι 0 m 33 ϖ ξ 1 + ξ 2 cos ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 cos ξ 1 π 2 + m 11 m 33 ϖ ξ 2 cos ξ 2 π 2 m 11 m 22 m 33 + m 12 m 21 m 33 m 13 m 21 m 32 sin ϖ 0 ι 0 + m 33 ξ 1 + ξ 2 ϖ ξ 1 + ξ 2 1 sin ξ 1 + ξ 2 1 π 2 + m 22 m 33 ξ 1 ϖ ξ 1 1 sin ξ 1 1 π 2 + m 11 m 33 ξ 2 ϖ ξ 2 1 sin ξ 2 1 π 2 + ι 0 m 33 ϖ ξ 1 + ξ 2 sin ξ 1 + ξ 2 π 2 + m 22 m 33 ϖ ξ 1 sin ξ 1 π 2 + m 11 m 33 ϖ ξ 2 sin ξ 2 π 2 sin ϖ 0 ι 0 .

References

  1. Zhu, L.H.; Zhao, H.Y. Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 2015, 149, 1370–1386. [Google Scholar] [CrossRef]
  2. Piqueira, J.R.C.; Araujo, V.O. A modified epidemiological model for computer viruses. Appl. Math. Comput. 2009, 213, 355–360. [Google Scholar] [CrossRef]
  3. Tang, S. A modified SI epidemic model for combating virus spread in wireless sensor networks. Int. J. Wirel. Inf. Netw. 2011, 18, 319–326. [Google Scholar] [CrossRef]
  4. Mishra, B.; Keshri, N. Mathematical model on the transmission of worms in wireless sensor network. Appl. Math. Model 2013, 37, 4103–4111. [Google Scholar] [CrossRef]
  5. Ren, J.G.; Yang, X.F.; Zhu, Q.Y.; Yang, L.X.; Zhang, C.M. A novel computer virus model and its dynamics. Nonlinear Anal. Real 2012, 13, 376–384. [Google Scholar] [CrossRef]
  6. Feng, L.P.; Song, L.P.; Zhao, Q.S.; Wang, H.B. Modeling and stability analysis of worm propagation in wireless sensor network. Math. Probl. Eng. 2015, 2015, 129598. [Google Scholar] [CrossRef]
  7. Zhu, L.H.; Zhao, H.Y.; Wang, X.M. Bifurcation analysis of a delay reaction-diffusion malwarepropagation model with feedback control. Commun. Nonlinear Sci. 2015, 22, 747–768. [Google Scholar] [CrossRef]
  8. Hosseini, S.; Azgomi, M.A.; Rahmani, A.T. Malware propagation modeling considering software diversity and immunization. J. Comput. Sci. 2016, 13, 49–67. [Google Scholar] [CrossRef]
  9. Geetha, R.; Madhusudanan, V.; Srinivas, M.N. Influence of clamor on the transmission of worms in remote sensor network. Wirel. Pers. Commun. 2021, 118, 461–473. [Google Scholar] [CrossRef]
  10. Yu, Z.H.; Gao, H.X.; Wang, D.; Alnuaim, A.A.; Firdausi, M.; Mostafa, A.M. SEI2RS malware propagation model considering two infection rates in cyber-physical systems. Phys. A 2022, 597, 127207. [Google Scholar] [CrossRef]
  11. Liu, J.; Saeed, T.; Zeb, A. Delay effect of an e-epidemic SEIRS malware propagation model with a generalized non-monotone incidence rate. Results Phys. 2022, 39, 105672. [Google Scholar] [CrossRef]
  12. Ke, Y.; Zhu, L.H.; Wu, P.; Shi, L. Dynamics of a reaction-diffusion rumor propagation model with non-smooth control. Appl. Math. Comput. 2022, 435, 127478. [Google Scholar] [CrossRef]
  13. Yuan, T.R.; Guan, G.; Shen, S.; Zhu, L.H. Stability analysis and optimal control of Epidemic-like transmission model with nonlinear inhibition mechanism and time delay in both homogeneous and heterogeneous networks. J. Math. Anal. Appl. 2023, 526, 127273. [Google Scholar] [CrossRef]
  14. Yavuz, M.; Rahman, M.; Yildiz, M.; Joshi, H. Mathematical modeling of middle east respiratory syndrome coronavirus with bifurcation analysis. Contemp. Math. 2024, 5, 3997–4012. [Google Scholar] [CrossRef]
  15. Picozzi, S.; West, B. Fractional Langevin model of memory in financial markets. Phys. Rev. E 2002, 66, 46–118. [Google Scholar] [CrossRef] [PubMed]
  16. Reyes-Melo, E.; Martinez-Vega, J.; Guerrero-Salazar, C.; Ortiz-Mendez, U. Application of fractional calculus to the modeling of dielectric relaxation phenomena in poly meric materials. J. Appl. Polym. Sci. 2005, 98, 923–935. [Google Scholar] [CrossRef]
  17. Ahmed, E.; Elgazzar, A. On fractional order differential equations model for nonlocal epidemics. Phys. A 2007, 379, 607–614. [Google Scholar] [CrossRef]
  18. Özalp, N.; Demirci, E. A fractional order SEIR model with vertical transmission. Math. Comput. Model 2011, 54, 1–6. [Google Scholar] [CrossRef]
  19. Song, L.; Xu, S.; Yang, J. Dynamical models of happiness with fractional order. Commun. Nonlinear Sci. 2010, 15, 616–628. [Google Scholar] [CrossRef]
  20. Deng, W.H.; Li, C.P.; Lu, J. Stability analysis of linear fractional differential system with multiple time delays. Nonlinear Dyn. 2007, 48, 409–416. [Google Scholar] [CrossRef]
  21. Tavazoei, M.S.; Haeri, M.; Siami, M.; Bolouki, S. Maximum number of frequencies in oscillations generated by fractional order LTI systems. IEEE Trans. Signal Process. 2010, 58, 4003–4012. [Google Scholar] [CrossRef]
  22. El-Saka, H.A.; Ahmed, E.; Shehata, M.I.; ElSayed, A.M.A. On stability, persistence, and Hopf bifurcation in fractional order dynamical systems. Nonlinear Dyn. 2009, 56, 121–126. [Google Scholar] [CrossRef]
  23. Leung, A.Y.T.; Yang, H.; Zhu, P. Periodic bifurcation of Duffing-van der Pol oscillators having fractional derivatives and time delay. Commun. Nonlinear Sci. 2014, 19, 1142–1155. [Google Scholar] [CrossRef]
  24. Wang, J.; Xiong, X. A general fractional-order dynamical network: Synchronization behavior and state tuning. Chaos 2012, 22, 023102. [Google Scholar] [CrossRef] [PubMed]
  25. Huang, C.D.; Wang, J.; Chen, X.P.; Cao, J.D. Bifurcations in a fractional-order BAM neural network with four different delays. Neural Netw. 2021, 141, 344–354. [Google Scholar] [CrossRef]
  26. Huang, C.D.; Liu, H.; Shi, X.Y.; Chen, X.P.; Xiao, M.; Wang, Z.X.; Cao, J.D. Bifurcations in a fractional-order neural network with multiple leakage delays. Neural Netw. 2020, 131, 115–126. [Google Scholar] [CrossRef]
  27. Huang, C.D.; Cao, J.D. Bifurcations induced by self-connection delay in high-order fractional neural networks. Neural Process. Lett. 2021, 53, 637–651. [Google Scholar] [CrossRef]
  28. Xu, C.J.; Zhang, W.; Aouiti, C.; Liu, Z.X.; Yao, L.Y. Bifurcation insight for a fractional-order stage-structured predator-prey system incorporating mixed time delays. Math. Method Appl. Sci. 2023, 46, 9103–9118. [Google Scholar] [CrossRef]
  29. Xu, C.J.; Liu, Z.X.; Li, P.L.; Yan, J.L.; Yao, L.Y. Bifurcation mechanism for fractional-order three-triangle multi-delayed neural networks. Neural Process. Lett. 2022, 55, 6125–6151. [Google Scholar] [CrossRef]
  30. Huang, C.D.; Liu, H.; Chen, X.P.; Zhang, M.S.; Ding, L.; Cao, J.D.; Alsaedi, A. Dynamic optimal control of enhancing feedback treatment for a delayed fractional order predator-prey model. Phys. A 2020, 554, 124136. [Google Scholar] [CrossRef]
  31. Mo, S.S.; Huang, C.D.; Cao, J.D.; Alsaedi, A. Dynamical bifurcations in a fractional-order neural network with nonidentical communication delays. Cogn. Comput. 2023, 15, 466–485. [Google Scholar] [CrossRef]
  32. Petras, I. Fractional-Order Nonlinear Systems: Modeling, Analysis and Simulation; Springer: New York, NY, USA, 2011. [Google Scholar]
  33. Chen, X.P.; Huang, C.D.; Cao, J.D.; Shi, X.Y.; Luo, A. Hopf bifurcation in the delayed fractional Leslie-Gower model with Holling type II functional response. J. Appl. Anal. Comput. 2023, 13, 2555–2571. [Google Scholar] [CrossRef] [PubMed]
  34. Feng, L.; Liao, X.; Han, Q.; Li, H. Dynamical analysis and control strategies on malware propagation model. Appl. Math. Model 2013, 37, 8225–8236. [Google Scholar] [CrossRef]
  35. Zhang, T.; Liu, J.; Teng, Z. Dynamic behavior for a nonautonomous SIR Sepidemic model with distributed delays. Appl. Math. Comput. 2009, 214, 624–631. [Google Scholar]
  36. Lu, Y.; Jiang, G. Backward bifurcation and local dynamics of epidemic model on adaptive networks with treatment. Neurocomputing 2014, 145, 113–121. [Google Scholar] [CrossRef]
Figure 1. Waveform plot of system (15) at E when ι = 8 < ι 0 = 10.6719 .
Figure 1. Waveform plot of system (15) at E when ι = 8 < ι 0 = 10.6719 .
Mathematics 12 03814 g001
Figure 2. Waveform plot of system (15) at E when ι = 8 < ι 0 = 10.6719 .
Figure 2. Waveform plot of system (15) at E when ι = 8 < ι 0 = 10.6719 .
Mathematics 12 03814 g002
Figure 3. Waveform plot of system (15) at E when ι = 8 < ι 0 = 10.6719 .
Figure 3. Waveform plot of system (15) at E when ι = 8 < ι 0 = 10.6719 .
Mathematics 12 03814 g003
Figure 4. Waveform plot of system (15) at E when ι = 11 > ι 0 = 10.6719 .
Figure 4. Waveform plot of system (15) at E when ι = 11 > ι 0 = 10.6719 .
Mathematics 12 03814 g004
Figure 5. Waveform plot of system (15) at E when ι = 11 > ι 0 = 10.6719 .
Figure 5. Waveform plot of system (15) at E when ι = 11 > ι 0 = 10.6719 .
Mathematics 12 03814 g005
Figure 6. Waveform plot of system (15) at E when ι = 11 > ι 0 = 10.6719 .
Figure 6. Waveform plot of system (15) at E when ι = 11 > ι 0 = 10.6719 .
Mathematics 12 03814 g006
Figure 7. Phase diagram of system (15) at E when ι = 8 < ι 0 = 10.6719 .
Figure 7. Phase diagram of system (15) at E when ι = 8 < ι 0 = 10.6719 .
Mathematics 12 03814 g007
Figure 8. Phase diagram of system (15) at E when ι = 11 > ι 0 = 10.6719 .
Figure 8. Phase diagram of system (15) at E when ι = 11 > ι 0 = 10.6719 .
Mathematics 12 03814 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shi, X.; Luo, A.; Chen, X.; Huang, Y.; Huang, C.; Yin, X. The Dynamical Behaviors of a Fractional-Order Malware Propagation Model in Information Networks. Mathematics 2024, 12, 3814. https://doi.org/10.3390/math12233814

AMA Style

Shi X, Luo A, Chen X, Huang Y, Huang C, Yin X. The Dynamical Behaviors of a Fractional-Order Malware Propagation Model in Information Networks. Mathematics. 2024; 12(23):3814. https://doi.org/10.3390/math12233814

Chicago/Turabian Style

Shi, Xueying, An Luo, Xiaoping Chen, Ying Huang, Chengdai Huang, and Xin Yin. 2024. "The Dynamical Behaviors of a Fractional-Order Malware Propagation Model in Information Networks" Mathematics 12, no. 23: 3814. https://doi.org/10.3390/math12233814

APA Style

Shi, X., Luo, A., Chen, X., Huang, Y., Huang, C., & Yin, X. (2024). The Dynamical Behaviors of a Fractional-Order Malware Propagation Model in Information Networks. Mathematics, 12(23), 3814. https://doi.org/10.3390/math12233814

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop