Scholarly article on topic 'A New Model for Capturing the Spread of Computer Viruses on Complex-Networks'

A New Model for Capturing the Spread of Computer Viruses on Complex-Networks Academic research paper on "Mathematics"

CC BY
0
0
Share paper
OECD Field of science
Keywords
{""}

Academic research paper on topic "A New Model for Capturing the Spread of Computer Viruses on Complex-Networks"

Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume 2013, Article ID 956893, 9 pages http://dx.doi.org/10.1155/2013/956893

Research Article

A New Model for Capturing the Spread of Computer Viruses on Complex-Networks

Chunming Zhang, Tianliang Feng, Yun Zhao, and Guifeng Jiang

School of Information Engineering, Guangdong Medical College, Dongguan 523808, China Correspondence should be addressed to Chunming Zhang; chunfei2002@163.com Received 7 September 2013; Revised 31 October 2013; Accepted 1 November 2013 Academic Editor: Jinde Cao

Copyright © 2013 Chunming Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Based on complex network, this paper proposes a novel computer virus propagation model which is motivated by the traditional SEIRQ model. A systematic analysis of this new model shows that the virus-free equilibrium is globally asymptotically stable when its basic reproduction is less than one, and the viral equilibrium is globally attractive when the basic reproduction is greater than one. Some numerical simulations are finally given to illustrate the main results, implying that these results are applicable to depict the dynamics of virus propagation.

1. Introduction

Computer viruses, including the narrowly defined viruses and network worms, are loosely defined as malicious codes that can replicate themselves and spread among computers. Usually, computer viruses attack computer systems directly, while worms mainly attack computers by searching for system or software vulnerabilities. With the rapid popularization of the Internet and mobile wireless networks, networkviruses have posed a major threat to our work and life. To thwart the fast spread of computer viruses, it is critical to have a comprehensive understanding of the way that computer viruses propagate. Kephart and White [1] proposed the first epidemiological model of computer viruses. From then on, much effort has been done in developing virus spreading models [1-15]. On the other hand, it was found [16-18] that the Internet topology follows the "scale-free" (SF) networks; that is, the probability that a given node is connected to k other nodes follows a power-law of the form P(k) ~ k—, with the remarkable feature that t < 3 for most real-world networks. This finding has greatly stimulated the interest in understanding the impact of network topology on virus spreading [16-29].

Recently, Mishra and Jha [2] investigated a so-called SEIQRS model on a homogeneous network by making the following assumptions.

(H1) The population has a homogeneous degree distribution.

(H2) The total population of computers is divided into five groups: susceptible, exposed, infected, quarantine and recovered computers. Let S, E, I, Q, and R denote the numbers of susceptible, exposed, infected, quarantine, and recovered computers, respectively.

(H3) New computers are attached to the Internet at rate A.

(H4) Computers are disconnected from the Internet naturally at a constant rate d and removed with probability a due to the attack of malicious objects.

(H5) S computers become E with constant rate p; R computers become S with constant rate E computers become I with constant rate I computers become Q with constant rate S; I computers become R with constant rate y; Q computers become R with constant rate e.

According to the above assumptions, the following model is derived (see Figure 1):

S' (t) = A- pSI - dS + qR, E! (t) = pSI -(d + p) E,

S pSI E h > I S Q

id i d a + dj, y I £

Sk kpQ Ek h > Ik S Qk

Figure 1: Original model.

Figure 2: Our model.

i' (t) = ^E - (d + a + y + S) I, Q' (t) = SI-(a + e + d) Q, R' (t) = yl + tQ-(d + n) R.

In view of the fact that the Internet topology is scale-free rather than exponential in its degree distribution [17,18, 23], this paper addresses the dynamics of a scale-free network-based SEIQRS model.

For convenience, computers on the Internet are called as nodes in the sequel. For our purpose, the following additional assumptions are imposed on the previous SEIQRS model.

(H6) The node degrees of the network asymptotically follow a power-law distribution, P(k) ~ k-T, where P(k) stands for the probability that a node chosen randomly from the Internet is of degree k.

(H7) The total number of nodes does not change or, equivalently, A = 0, d = 0, and a = 0.

(H8) Sk(t): the relative density of fc-degree S-nodes; Ek(t): the relative density of fc-degree £-nodes; Ik(t): the relative density of fc-degree /-nodes; Qk(t): the relative density of fc-degree Q-nodes; Rk(t): the relative density of fc-degree .R-nodes; Sk(t) + Ek(t) + Ik(t) + Qk(t) + Rk(t) = 1.

(H9) The probability that a link has an /-node as one endpoint does not depend on the degree of the other endpoint of the link and, hence, is only a function of I(t) := (I1(t),I2(t),...,I„(t)). Let &(I(t)) denote the probability, &(I(t)) = (1/(k))£k kP(k)Ik,where, (k) := lk kP(k).

By applying the mean-field technique to the above assumptions, we getanewepidemic modelofcomputervirus, which is formulated as (see Figure 2)

S'k (t) = -kp&(t)Sk (t) + nRk (t),

E[ (t) = kp@(t)Sk (t)-pEk (t),

l'k (t) = f*Ek (t)-(y + S)lk (t),

Q'k (t) = SIk (t)-eQk (t),

R'k (t) = ylk (t) + eQk (t)-nRk (t),

k = 1,. ,.,n,

with initial conditions Sk(0), Ek(0), Ik(0), Qk(0), and Rk(0) > 0, 1 <k <n.

Note that, for every k, we have Sk(t)+Ek(t)+Ik(t)+Qk(t) + Rk(t) = 1; thus, the first set of equations in system (2) can be removed, yielding the following system,

E'k (t) = kp® (t) (1-Ek (t)-Ik (t) - Qk (t) - Rk (t)) - ^Ek (t),

l'k (t) = f*Ek (t)-(y + S)lk (t),

Q'k (t) = SIk (t)-eQk (t),

R'k (t) = ylk (t) + eQk (t)-vRk (t), k = 1,.. ,,n,

with initial conditions Ek(0), Ik(0), Qk(0), Rk(0) > 0 and Ek(0) + Ik(0) + Qk(0) + Rk(0) < 1.

The organization of this paper is as follows. Section 2 determines the equilibria of system (3) and the basic reproduction number R0. Sections 3 and 4 address the global stability of the virus-free equilibrium and the global attractivity ofthe viral equilibrium, respectively. Numerical examples are provided in Section 5 to support our theoretical results. In the final section, a brief conclusion is given and some future research topics are also pointed out.

2. Basic Reproduction Number and Equilibria

The basic reproduction number R0, which can be explained as the average number of secondary infections produced by a single infected node during its infection time, is calculated as

(k) y + S'

where (k2) stands for the second origin moment of the node degree, (k2) := £k k2P(k). Then, we have the following theorem.

Theorem 1. Consider system (3). The following assertions hold.

(1) There always exists a virus-free equilibrium P0 =

(0, 0 , .'. . , 0)T.

(2) There is no viral equilibrium if R0 < 1.

(3) There exists a unique viral equilibrium

P* = (E*,r,Q*,R*)

e1 + (k-1)xA

r* y + S kx k = y \ + (k-l)xA'

ifR0 < 1, where

where x is the unique positive root of the equation

y + S kx p l + (k- l)xA'

1 1 + (k-1)xA

Qn = -

k e 1 + (k - 1)xA' y + S kx

y 1 + (k - 1) xA

y + S S y + S

A = 1-+ - + 1-+ 1,

x is the uniquepositive root ofthe equation

f(x) = PÏ

k2P (k)

1 + (k - 1) xA

[1 - Ax] - y - S = 0. (7)

Proof. After imposing the stationarity condition, we have

kp@ (t)(\- Ek (t) - Ik (t) - Qk (t) - Rk (t)) - ^Ek (t) = 0, p.Ek (t)-(y + 8)lk (t) = 0, SIk (t) - eQk (t) = 0, yIk (t) + eQk (t) - nRk (t) = 0.

f(x) = pT

k P(k)

1 + (k-1)xA

[1 - Ax] - y - S = 0. (10)

If R0 < 1, we have E* = I* = Q* = R* = 0, implying that f(x) = 0 and, thus, (10) has no positive roots. Hence, assertion (3) holds. Now, assume R0 >1. The observations that (a) f(0) > 0, (b) f'(x) <0 for x > 0, and (c) f(+rn) > 0 imply that (10) has a unique positive root. Hence, assertion (8) also holds. □

Remark 2. It can be seen from Theorem 1 that E* < E* <

••• < E*, I* < V < ■■■ < rn, Q* < Q* < ■■■ < Q* and

R* < R* < ■■■ < R**. This shows that, when in the steady state P*, the infection density for a higher node degree is higher than that for a lower node degree.

3. Stability of the Virus-Free Equilbrium

It is clear that P0 = (0,0,..., 0) is the virus-free equilibrium of system (3). In this section, we will prove that virus-free equilibrium is globally asymptotically stable when R0 < 1. For convenience, let

Q = {x = (xx, x2,..., x4n ) | xt > 0V1 < i < An,

xi + xi+n + xi+2n + xi+3n <1^1<i<n\.

It is easily verified that P0 = (0,0,'..., 0)T is always a root of matrix-vector notation as this system. Solving the system, we get

Let x(t) = (E(t),I(t),Q(t),R(t))T and rewrite system (3) in

k p 1 + (k-1)xA' I* kx

k = T+Jk-'îïxA'

x(t) = Ax (t) + H (x (t)),

with initial condition x(0) e Q, where

^ 0 0 ^

A 21 A 22J(4„X4K)

(fc> (fc> (fc>

2p(1)p 4^(2)^

(fc> (fc> (fc>

r (fc> (fc> 0 -(y + 5) 0 0 0 -(y + <5)

(fc> 0 0

-(y + S)

(2KX2K)

^ 21 =

0 0 ••• 0 S 0 ••• 0

0 0 ••• 0 0 5 ••• 0

0 0 ••• 0 0 0 ••• 5

0 0 ••• 0 y 0 ••• 0

0 0 ••• 0 0 y ••• 0

0 0 ••• 0 0 0 ••• y

(2KX2K)

^ 22 =

-e 0 ••• 0 0 0 ••• 0 0 -e • • • 0 0 0 ••• 0

0 0 • • • -e 0 0 ••• 0

e 0 ••• 0 0 ••• 0

0 e • • • 0 0 ••• 0

0 0 • • • £ 0 0 ••• -w

(2KX2K)

H (x (f)) = -^0 ( £1 (i) + 7i (i) + Qi (i) + «1 (f).....«(£„ (i) + /„ (i) + Q„ (i) + (i)) ,0,...,0

Theorem 3. Consider system (12); P0 = (0, 0,..., 0) is locally asymptotically stable if .R0 < 1, whereas P0 is a saddle point if

x (A + S + y)

^o < 1-

Proof. The characteristic equation with respect to P0 is

i <fc2> ^ -A - y - 5

det (A£4„ - A) = det (

- A11 -A 21 A£2„ - A 22

(A + (A + e)"(A + (A + 5 + yf-1

<fc2>'

x ( (A + (A + y + 5) -

= det (A^ -A 11 )(A£2„ -A 22) = 0.

We obtain

det (A£4„ -A)

= (A + ^)"(A + e)"(A +

= (A + (A + e)"(A + (A + 5 + y) x ( + (y + <5 + A + ^ (y + 5) -

This equation has negative roots and -e with multiplicity n and negative roots -5, and -y with multiplicity n - 1. Now let

g (A) = A2 + (y + 8 + A + ^ (y + 5) - = 0. (16)

Suppose£0 < l.Then, (y + 5)-o((fc2)/(fc)) > 0 anditfollows from the Hurwitz criterion that all roots of the characteristic equation have negative real parts, implying that P0 is locally asymptotically stable. Now, assume R0 >1. Then, (y + 5) -f((^2)/(^)) < 0 and the characteristic equation has exactly one positive root, implying that P0 is a saddle point. □

Lemma 4 (see [16]). Consider a system dx/df = /(x) defined at least in a compact set C. Then, C is invariant if, for every pointy on dC, the vector /(y) is tangent to or pointing into C.

Lemma 5. The set Q is positively invariant for system (12). That is, x(0) e Q implies x(i) e Q for all t > 0.

Proof. 3Q consists of the following 5A sets:

= |% e Q | Xi = 0}, T; = |% e Q | xi+n = 0},

U, = |* e Q | Xi+2n = 0}, Vi = |* e Q | x,^ = 0},

Wi = e Q | Xi + Xi+n + *i+2n + *i+3n = 1} ,

which have

(Pi = (0,...,0,-1,0,...,0) ,

^ = (0, ...,0, , 0, ...,0),

/ i+2n \

£ = (0,...,0, -1,0,...,0),

( i+3n \

fi = (0,...,0, -1,0,...,0),

/ i i+n

ci = (0,...,0,1,0,..., 0, 1,0,...,

i+2n i+3n

0, 1 ,0, ...,0, 1 ,0,...,0

as their respective outer normal vectors. For 1 < i < n, we have

= (1 - Xi+n - Xi+2n - **+3n) < 0,

xe Ti-

■ £ ) = -^Xi+n < 0,

Vi) = -(7*i+n + i+2 n) < 0

■ Ci I = -^*i+3n < 0.

Thus, the claimed result follows from Lemma 4.

(19) □

Lemma 6 (see [16]). Consider an n-dimensional autonomous system

dx (f) di

= Ax(f) + H(x(f)), xeD,

where A is an irreducible «xn matrix, D is a region containing the origin, H(x) e C:(D), and lim^^0||H(%)||/||%|| = 0. Assume there exist, a positively invariant compact convex set C c D containing the origin, a positive number r, and a real eigenvector w of Ar, such that

(C1) (x,«) > r||x|| for all x e C,

(C2) (H(%),w) < 0 for all x e C,

(C3) the origin forms the largest positively invariant set included in N = jx e C | (H(x),«) = 0}.

Then, one has that

(1) s(Ar) < 0 implies that the origin is globally asymptotically stable in C, and

(2) s(Ar) > 0 implies that there exists m > 0 such that, for each x0 e C - {0}, the solution 0(f, x0) to system (12) satisfies limt inf ||0(f, 0)|| > m.

We are ready to prove.

Theorem 7. Consider system (12). Then, P0 is globally asymptotically stable in Q, if R0 < 1.

Proof. Let C = Q and look at (12). As matrix Ar is irreducible and all of its nondiagonal entries are nonnegative, it follows from [13] that A has a positive eigenvector « = ..., o>4n) corresponding to its eigenvalue s(Ar). Let o>0 = mini > 0. Then, for all x e Q,we have

4n \ 1/2 2

(H (x) , = (xi + Xi+n + *i+2n + *i+3n) < 0.

Moreover, (H(x),«) = 0 implies that x = 0. Hence, the claimed result follows from assertion (2) of Lemma 6. □

4. Global Attractivity of the Viral Equilibrium

We will ascertain the global attractivity of the viral equilib-

Theorem 8. IfR0 > 1, then the infection solution of (12) P* =

(P* ,P2*,..., P**n) is globally attractive in Q - {0}.

Proof. Theorem 3 ensures the existence of the viral equilibrium. We need to prove that if R0 > 1, there is a unique constant equilibrium P* in Q- {0}. Let x* = P*, Assume that x = x* > 0 and y = y* > 0 are two constant solutions of (12) in Q - {0}. If x* = y*, then there exists i0, i0 = 1,2,..., An, such that x*0 = y*0, where x*0 is the i0th component of the vector x*. Without loss of generality, assume x*0 > y*0, and xjo/y'0 > x*/y* for all i = 1,...,An. Since x* and y* are constant solutions of (12), we substitute them into (12). And if1 < i0 < n, we obtain,

kp& (x*)(1- x*0 - xi0+n - xi0+2n - xi0+3n) - Vx>0

= kP® (y'H1 - y?0 - y*i0+n - fi0+2n - fi0+3n) - Wi0 = 0,

where ®(x*) = (l/{k))ZkkP(k)x*.

After equivalent deformation, it follows that

Ki0+3n) « Wi0

kp@ (x*)(1- x«0 - x«0+n - Xi0+2n ■

= kP® (/)(1 - y*0 - y«0+n - y*0+2n - y*0+3n) - W*0

But x«0/y**0 > x* /y* for all i and

(1 x*0 x*0+n xi0

< (1 - yi0 - yi0+n - yi0+2n - yi0+3n) .

Thus, from the above inequality, we get

kp@ (x*)(1- x«*0 - x«0+n - x«0+2n - x«0+3n)

< kP® (y*)(1- y*«0 - y**0+n - y*«0+2n - y*«0+3n).

This is a contradiction. Similarly, we can also get contradictions when n + 1 < i0 < 2n, 2n + 1 < i0 < 3n, and 3n + 1 < i0 < 4n. Therefore, there exists a unique constant solution P* = (P«*, P«,..., P*n ) of (3) in Q - {0}. Now, we shall prove that x* is globally attractive in Q- {0}. To find the asymptotic behavior of the solutions of (12) in Q, we define the following functions, F : Q ^ R and f : Q ^ R for

P e Q, where F(x) = maxi(xi/x*), f(x) = mini(xi/x**), F(x) and f(x) are continuous and the right-hand derivative exists along solutions of (12). Let x = x(t) be a solution of (12), we may assume that F(x(t)) = xi0(t)/x*0, 1 < i0 < An, t e [t0, t0 + e] for a given t0 and a sufficiently small e > 0. Then,

F' (x (t0)) =

t e [t0, t0 + e], (26)

where F is defined as

F(x(t + h))-F(x(t))

F = lim sup---. (27)

If 1 < i0 < n, from (12) we have

. xig (t0

:°xi0 (t0

-fp-kp&(xlo+n (t0)) i0 V 0)

x{1-xi0 (t 0)-xi„ +n (h)-x0+2n (Ï0 )-xi0+3n (t0))-Hxl.

And we obtain

t0) x*

when n+ 1 < i0 < n;

t(t 0)->

t0) "xi0 (t0Ï

when 2n + 1 < i0 < 3n;

0) xi xi

when 3n + 1 < i0 < 4n.

According to the definition of F(x(t)), we have

x^ >xiM, i = 1,2,..„4n. (30)

Then if F(x(t0)) > 1,weobtain

1 < kp& (xl+n) (l-xl - x[+n - .

- ux* = 0,

, X'o (t0 ^

,0 ^o (t0 )

'0 Xo (to)

< VXio-n -(r + S) Xio = °>

< Sxi-n - £Xl = °

Xia (t0 ) 'XL (t0

< TXio-2n + £Xt-n - 1Xt =

Since x* > 0 and X: (t^) > 0, we conclude that x- (U) > 0.

J0 t^ 0 i0 V U/

Therefore, if F(x(t0)) > 1, F'(x(tU)) < 0.

Similarly, we can testify that F(x(tU)) = 1 imples F'(x(tU)) < 0, and f(x(t0)) < 1 implies f'(x(t0)) > 0. If f(x(t0)) = 1, then f'(x(tU)) > 0. Denote

U(x) = max {F(x) - 1,0}, V(x) = max {1 -f(x),0}.

Both U(x) and V(x) are continuous and non-negative for x e Q. Notice that U'(x(t)) < 0, V'(x(t)) < 0. Let

Hj = jx e Q | U' (x) = 0|, Hv = jx e Q | V' (%) = 0|,

then we have Hjj = {x \ 0 < Xj < x*},

Hv = {x\ x* <Xj < 1} U {0}.

According to the LaSalle invariant set principle, any solution of (12) starting in Q will approach Hjj n Hv. And Hjj n Hv = |x*| U {0}. But if x(t) = 0, by Lemma 6 we know that limt^TO inf ||%(t)|| > m > 0. Then we conclude that any solution x(t) of (12), such that x(0) e Q - |0}, satisfies limt^TOx(t) = x*, so x = P* is globally attractive in Q -|0}. □

Conjecture 9. Consider system (12) andsuppose R0 > 1. Then the infection equilibrium, P', is globally asymptotically stable in n- {0}.

5. Numerical Examples

In this section, some numerical simulations are given to support our results. To demonstrate the global stability of the infection-free solution of system (3), we take the following set of parameter values: p = 0.04, ^ = 0.8, y = 0.8, e = 0.5, S = 0.2, q = 0.4, which runs on a scale-free network with

E(t) - I(t)

- Q(t)

- R(t)

Figure 3: Global stability of infection-free solution.

E(t) - I(t)

— Q(t) - R(t)

Figure 4: Global attractivity of infection solution.

n = 1000 and t = 2.4. In this case, we have R0 = 0.8825 < 1. The time plots of the four relative densities are plotted in Figure 3, from which it can be seen that the virus would die out.

To demonstrate the global attractivity of the viral equilibrium of system (3), we take the following set of parameter values: p = 0.2, p = 0.8, y = 0.8, e = 0.5, 5 = 0.2, q = 0.4, which runs on a scale-free network with n = 1000 and t = 2.4. In this case, we have R0 = 4.4124 > 1. The time plots of the four relative densities are plotted in Figure 4, from which it can be seen that the virus would persist.

Consider system (12) with p = 0.2, ^ = 0.8, y = 0.8, e = 0.5, 5 = 0.2, t] = 0.4 and n = 1000. For t e {2.0,2.2,2.4,2.6},

т = 2.0 - т = 2.4

- r = 2.2 - т = 2.6

Figure 5: Evolution of 7(i) for different т values.

Figure 5 demonstrates how 7(i) evolves with time. It can be seen that smaller exponent т favors virus spreading.

6. Conclusions

To clearly understand how the Internet topology affects the spread of computer viruses, a new model capturing the epidemics of computer viruses on scale-free networks has been proposed. The basic reproduction number R0 of the model has been calculated. The global asymptotic stability of the virus-free equilibrium has been shown when R0 is below one, and the global attractivity of the viral equilibrium has been proved if R0 is above one. Our future work will focus on establishing impulsive models on complex networks and studying the effect of impulsive immunization on computer virus propagation.

Acknowledgments

The work is supported by the National Natural Science Foundation of China under Grant no. 61304117, the Natural Science Foundation of the Jiangsu Higher Education Institutions of China under Grant no. 13KJB520008, the doctorate teacher support project of JiangSu Normal University under Grant no. 12XLR021.

References

[1] J. O. Kephart and S. R. White, "Directed-graph epidemiological models of computer viruses," in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 343-359, May 1991.

[2] B. K. Mishra and N. Jha, "SEIQRS model for the transmission of malicious objects in computer network," Applied Mathematical Modelling, vol. 34, no. 3, pp. 710-715, 2010.

[3] J. R. C . Piqueira, A . A. de Vasconcelos, C . E. C . J. Gabriel, and V. O. Araujo, "Dynamic models for computer viruses," Computers and Security, vol. 27, no. 7-8, pp. 355-359, 2008.

[4] J. Ren, X. Yang, L.-X. Yang, Y. Xu, and F. Yang, "A delayed computer virus propagation model and its dynamics," Chaos, Solitons & Fractals, vol. 45, no. 1, pp. 74-79, 2012.

[5] X. Fu, M. Small, D. M. Walker, and H. Zhang, "Epidemic dynamics on scale-free networks with piecewise linear infectiv-ity and immunization," Physical Review E, vol. 77, no. 3, Article ID 036113, 8 pages, 2008.

[6] T. Zhou, J. G. Liu, W. J. Bai, G. R. Chen, and B. H. Wang, "Bahaviors of susceptible-infected epidemics on scale-free networks with identical infectivity," Physical Review E, vol. 74, no. 5, Article ID 056109, 6 pages, 2006.

[7] L.-X. Yang and X. Yang, "Propagation behavior of virus codes in the situation that infected computers are connected to the internet with positive probability," Discrete Dynamics in Nature and Society, vol. 2012, Article ID 693695, 13 pages, 2012.

[8] L.-X. Yang, X. Yang, L. Wen, and J. Liu, "A novel computer virus propagation model and its dynamics," International Journal of Computer Mathematics, vol. 89, no. 17, pp. 2307-2314, 2012.

[9] L.-X. Yang, X. Yang, Q. Zhu, and L. Wen, "A computer virus model with graded cure rates," Nonlinear Analysis: Real World Applications, vol. 14, no. 1, pp. 414-422, 2013.

[10] L.-X. Yang and X. Yang, "The spread of computer viruses under the influence of removable storage devices," Applied Mathematics and Computation, vol. 219, no. 8, pp. 3914-3922, 2012.

[11] C. Gan, X. Yang, Q. Zhu, J. Jin, and L. He, "The spread of computer virus under the effect of external computers," Nonlinear Dynamics, vol. 73, no. 3, pp. 1615-1620, 2013.

[12] C. Gan, X. Yang, W. Liu, Q. Zhu, and X. Zhang, "An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate," Applied Mathematics and Computation, vol. 222, pp. 265-274, 2013.

[13] C. Gan, X. Yang, W. Liu, and Q. Zhu, "A propagation model of computer virus with nonlinear vaccination probability," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 1, pp. 92-100, 2014.

[14] Q. Zhu, X. Yang, L. X. Yang, and X. Zhang, "A mixing propagation model of computer viruses and countermeasures," Nonlinear Dynamics, vol. 73, no. 3, pp. 1433-1441, 2013.

[15] Q. Zhu, X. Yang, L.-X. Yang, and C. Zhang, "Optimal control of computer virus under a delayed model," Applied Mathematics and Computation, vol. 218, no. 23, pp. 11613-11619, 2012.

[16] A. Lajmanovich and J. A. Yorke, "A deterministic model for gonorrhea in a nonhomogeneous population," Mathematical Biosciences, vol. 28, no. 3-4, pp. 221-236,1976.

[17] M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the internet topology," Computer Communication Review, vol. 29, no. 4, pp. 251-262,1999.

[18] H. J. Shi, Z. S. Duan, and G. R. Chen, "An SIS model with infective medium on complex networks," Physica A, vol. 387, no. 8-9, pp. 2133-2144, 2008.

[19] A. d'Onofrio, "A note on the global behaviour of the network-based SIS epidemic model," Nonlinear Analysis: Real World Applications, vol. 9, no. 4, pp. 1567-1572, 2008.

[20] M. Yang, G. Chen, and X. Fu, "A modified SIS model with an infective medium on complex networks and its global stability," Physica A, vol. 390, no. 12, pp. 2408-2413, 2011.

[21] L. Wen and J. Zhong, "Global asymptotic stability and a property of the SIS model on bipartite networks," Nonlinear Analysis: Real World Applications, vol. 13, no. 2, pp. 967-976, 2012.

[22] L.-X. Yang, X. Yang, J. Liu, Q. Zhu, and C. Gan, "Epidemics of computer viruses: s complex-network approach," Applied Mathematics and Computation, vol. 219, no. 16, pp. 8705-8717, 2013.

[23] R. Albert and A.-L. Barabási, "Statistical mechanics of complex networks," Reviews of Modern Physics, vol. 74, no. 1, pp. 47-97, 2002.

[24] R. Pastor-Satorras and A. Vespignani, "Epidemic spreading in scale-free networks," Physical Review Letters, vol. 86, no. 14, pp. 3200-3203, 2001.

[25] Z. Dezso and A. L. Barabási, "Halting viruses in scale-free networks," Physical Review E, vol. 65, no. 5, Article ID 055103, 4 pages, 2002.

[26] L. Billings, W. M. Spears, and I. B. Schwartz, "A unified prediction of computer virus spread in connected networks," Physics Letters A, vol. 297, no. 3-4, pp. 261-266, 2002.

[27] C. Castellano and R. Pastor-Satorras, "Thresholds for epidemic spreading in networks," Physical Review Letters, vol. 105, no. 21, Article ID 218701, 4 pages, 2010.

[28] M. Draief, A. Ganesh, and L. Massoulie, "Thresholds for virus spread on networks," The Annals of Applied Probability, vol. 18, no. 2, pp. 359-378, 2008.

[29] Y. Wang, Z. Jin, Z. Yang, Z.-K. Zhang, T. Zhou, and G.-Q. Sun, "Global analysis of an SIS model with an infective vector on complex networks," Nonlinear Analysis: Real World Applications, vol. 13, no. 2, pp. 543-557, 2012.

Copyright of Discrete Dynamics in Nature & Society is the property of Hindawi Publishing Corporation and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.