Research Article Modeling and Bifurcation Research of a Worm Propagation Dynamical System with Time Delay
|
|
- Bernadette Hunter
- 5 years ago
- Views:
Transcription
1 Mathematical Problems in Engineering Volume, Article ID, pages Research Article Modeling and Bifurcation Research of a Worm Propagation Dynamical System with Time Delay Yu Yao,, Zhao Zhang, Wenlong Xiang, Wei Yang, and Fuxiang Gao College of Information Science and Engineering, Northeastern University, Shenyang 9, China Key Laboratory of Medical Image Computing, Northeastern University, Ministry of Education, Shenyang 9, China Correspondence should be addressed to Yu Yao; yaoyu@mail.neu.edu.cn Received March ; Revised June ; Accepted June ; Published July Academic Editor: Yuxin Zhao Copyright Yu Yao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Both vaccination and quarantine strategy are adopted to control the Internet worm propagation. By considering the interaction infection between computers and external removable devices, a worm propagation dynamical system with time delay under quarantine strategy is constructed based on anomaly intrusion detection system (IDS). By regarding the time delay caused by time window of anomaly IDS as the bifurcation parameter, local asymptotic stability at the positive equilibrium and local Hopf bifurcation are discussed. Through theoretical analysis, a threshold τ is derived. When time delay is less than τ,the worm propagation is stable and easy to predict; otherwise, Hopf bifurcation occurs so that the system is out of control and the containment strategy does not work effectively. Numerical analysis and discrete-time simulation experiments are given to illustrate the correctness of theoretical analysis.. Introduction Internet worms, a great threat to the network security, can spread quickly among hosts via wired or wireless networks. In real network environment, many intelligent worms, such as Conficker, Stuxnet, and Flamer, can also spread themselves via external removable devices (USB drives, CD/DVD drives, external hard drives, etc.), which have become one of the main means of infection transmission as well as networks. Conficker can copy itself as the autorun.inf to removable media drives in the system, thereby forcing the executable to be launched every time a removable drive is inserted into asystem[, ]. Discovered in the summer of, Stuxnet is a threat targeting a specific industrial control system (ICS) likely in Iran, such as a gas pipeline or power plant. Removable device is one of the main pathways for Stuxnet to migrate from the outside world to supposedly isolated and secure ICS [ ]. Discovered in May, Flamer can spread via removable drives using a special folder that hides thefilesandcanresultinautomaticexecutiononviewing the removable drive when combined with the Microsoft Windows Shortcut LNK/PIF File Automatic File Execution Vulnerability (CVE--) [, 7]. Therefore, it is time to analyze the dynamic behavior and containment strategy of such worms. Worm propagation dynamical system plays an important role in predicting the spread of worms. It aids in identifying the weakness in the worm spreading chain and provides accurate prediction for the purpose of damage assessment for a new worm threat. Over decades of years, many researches on worms dynamical behavior have been done. Kermack and Mckendrick [] proposed the classical SIR model to explain the rapid rise and fall in the number of infected patients observed in epidemics, which also suits the worm spread. Based on the classical SIR model, Zou et al. derived an Internet worm model called the two-factor model [9]. Quarantine strategy, which borrows from the method of epidemic disease control, has been widely used in worm containment and produced a tremendous effect on controlling worm propagation [ ]. Zou et al. proposed a worm propagation model under dynamic quarantine defense based on the principle assume [sic] guilty before proven
2 Mathematical Problems in Engineering innocent []. Wang et al. proposed a novel epidemic model named SEIQV model which combines both vaccinations and dynamic quarantine methods []. However, there is time delay in actual network environment, which may lead to bifurcation phenomenon. Much research has been done on time delay and bifurcation [ ].Han and Tan studied the dynamic spread behavior of worms by incorporating the delay factor [9]. Dong et al. proposed a computer virus model with time delay based on SEIR model and regarded time delay as bifurcating parameter to study the dynamical behaviors including local asymptotical stability and local Hopf bifurcation []. Yao et al. constructed a model with time delay under quarantine strategy []. Wu et al. investigated the problem of sliding mode control of Markovian jump singular time-delay systems []. Li and Zhang established a delay-dependent bounded real lemma for singular linear parameter-varying systems with timevariant delay []. The problems of D-stability and nonfragile control for a class of discrete-time descriptor Takagi-Sugeno fuzzy systems with multiple state delays are discussed in []. However, the above works consider less of the effect of removable devices on worm propagation. As mentioned above, removable devices have become a main pathway for some worms to intrude those hosts not connected to the Internet. Song et al. presented a worm model incorporating specific features to worms spreading via both web-based scanning and removable devices []. Zhu et al. studied the dynamics of interaction infection between computers and removable devices in [7]. However, time delay and bifurcation research are not considered in their work. In this paper, by considering the interaction infection between hosts and removable devices, we model a delayed worm propagation dynamical system which combines both vaccination and quarantine strategy. Local asymptotic stability of the positive equilibrium and local Hopf bifurcation are discussed to analyze the influence of time delay on worm propagation dynamical system. The main contributions of this paper can be summarized as follows. () Considering the influence of removable devices on Internet worm propagation and the time delay caused by anomaly IDS, we propose a novel worm propagation dynamical system with time delay. () We analyze the system stability at positive equilibrium and derive the time delay threshold at which Hopf bifurcation occurs. () By numerical analysis, we illustrate the correctness of theoretical analysis. () The discrete-time simulation is adopted to simulate the worm propagation in real network environment. The results demonstrate the reasonableness of the worm propagation model. The rest of the paper is organized as follows. In Section, considering the influence of removable devices, a worm propagation dynamical system with time delay under quarantine strategy is constructed. In Section, local stability of the positive equilibrium and local Hopf bifurcation are investigated. In Section,severalnumericalanalysessupportingthe theoretical analysis are given. Section makes a comparison between simulation experiments and numerical ones. Finally, we give our conclusions in Section.. Model Formulation The system contains both hosts and removable devices. In thismodel,allhostsareinoneoffollowingfivestates: susceptible (S), infectious (I), delayed (D), quarantined (Q), and removed (R). All removable devices are divided into two groups: susceptible (R S ) and infectious (R I ). N and R N denote the total number of hosts and removable devices, respectively. That is, S+I+D+Q+R = N; R S +R I = R N. Susceptible (S) hosts,whicharevulnerabletotheattack from worms, will be infected by infectious hosts or removable devices; then they will infect other hosts connected to them or removabledevicespluggedintothem.infectious(i)hostswill be immunized by antivirus software at the rate of γ.removed (R) hosts, which have been immunized by antivirus software, will become susceptible at reassembly rate ω. Hosts whose behavior looks anomaly will be quarantined by IDS and then they will become in a quarantined (Q) state.asusceptible removabledevice(r S )willbeinfectedwheninsertedintoan infectious host. Worm in an infectious removable device (R I ) will be eliminated when connected to removed hosts; then it will become in a susceptible state. The quarantine strategy is an effective measure to defend against worms attack and make up the deficiency of vaccination strategy. In this paper, anomaly intrusion detection system is chosen for applying quarantine strategy. Comparing with misuse IDS, anomaly IDS has great advantage in detecting unknown intrusion or the variants of known intrusion. However, anomaly IDS judges whether a detected behavior is an attack or not via comparing detected behavior with the normal or expected behavior of system and user. If a deviation occurs, the detected behavior is treated as an intrusion immediately. Because of the difficulty in collecting and building the normal behavior database, high false-alarm rate is considered the main drawback of anomaly IDS. In order to reduce the false alarm of anomaly IDS, the mechanism of time window is adopted. A suspicious behavior will not trigger an alarm immediately. On the contrary, anomaly IDS has a period of time to analyze the accumulated behavior. Therefore, an intermediate state, delayed (D) state, is added into the propagationmodel.thelargerthevalueoftimewindow, thelessthefalsealarmarousedbyanomalyids,because there is enough time for anomaly IDS to recognize whether a behavior is an intrusion or not. However, the overlarge time window may lead to worm propagation dynamical system beingunstableandoutofcontrol.themainnotationsand definitions are listed in Table. The state transition diagram is given by Figure. On the basis of current research, we present a delayed worm propagation model which combines both vaccination and quarantine strategy. Several appropriate assumptions are given as follows.
3 Mathematical Problems in Engineering Notations N R N S(t) I(t) D(t) Q(t) R(t) R S (t) R I (t) β β γ γ ω θ θ δ τ Table : Notations and definitions of the model. Definitions Total number of hosts in the network Total number of removable devices in the network Number of susceptible hosts at time t at time t Number of delayed hosts at time t Number of quarantined hosts at time t τ Number of removed hosts at time t Number of susceptible removable devices at time t Number of infectious removable devices at time t Infection ratio of infectious hosts Contact infection rate between computers and removable devices Recovery rate of infectious hosts Recovery rate of infectious removable devices Reassembly rate of immunized hosts Quarantine rate of susceptible hosts Quarantine rate of infectious hosts Immunization rate of quarantined hosts Time delay of detection by anomaly intrusion detection system () β denotes the infection ratio of infectious hosts. Therefore, at time t, the infection force of infectious computers to susceptible computers is given by β S(t)I(t). () Infectious removable devices have the same infectious ability as the infectious hosts. β is the contact infection rate between computers and removable devices, that is, the interactive infection rate when a removable device links to a host. The probability of connecting removable devices for every host is R N /N, anhe probability of removable device exactly being in the infectious state is R I (t)/r N. Therefore, the infection force of infectious removable devices to susceptible hosts is β (R N /N)(R I (t)/r N )S(t). () Susceptible removable devices will be infected when connecting to an infectious host, and then they will infect any other hosts to which they are connected. Meanwhile, worms of infectious removable devices will be eliminated when connecting to one immunized host. That is, the infection force of infectious hosts to susceptible removable devices is β (I(t)/N)R S (t), anherecoveryforce of removed hosts to infectious removable devices is γ (R(t)/N)R I (t). () Owingtotheinfluenceoftimedelayτ, the increment of the number of quarantined hosts is the ones quarantined at time t τ. Therefore, the increment is θ S(t τ) + θ I(t τ). () The time window mechanism leads to an intermediate state, delayed state (D).Theincrementofthenumber of delayed hosts at time t is given by θ S(t) + θ I(t); the decrement of delayed hosts is the number of those being quarantined, that is, θ S(t τ) + θ I(t τ). Based on the analyses and assumptions above, the delayed differential equations of the model are formulated as (). The differential on the left of equations means the change rate of related states at time t. Consider ds (t) di (t) = β S (t) I (t) β R I (t) N S (t) +ωr(t) θ S (t), R =β S (t) I (t) +β I (t) N S (t) γ I (t) θ I (t), dr (t) =γ I (t) ωr(t) +δq(t), dd (t) =θ S (t) θ S (t τ) +θ I (t) θ I (t τ), dq (t) =θ S (t τ) +θ I (t τ) δq(t), dr S (t) dr I (t) = β I (t) N R S (t) +γ R (t) N R I (t), =β I (t) N R S (t) γ R (t) N R I (t).. Stability at the Positive Equilibrium and Bifurcation Analysis Theorem. The system () has a unique positive equilibrium E =(S,I,D,Q,R,R S,R I ),where I = b S +b S b b S, D =θ S τ+θ I τ, Q = θ S +θ I δ, R = γ I +θ S +θ I, ω R I = β R N I β I +γ R. Proof. For system (), according to [], if all the derivatives on the left of equal sign of the system are set to, which implies that the system becomes stable, we can derive I= b S +b S b b S, Q= θ S +θ I, δ R= γ I +θ S +θ I, ω R I = β R N I β I +γ R, () () ()
4 Mathematical Problems in Engineering ω S β SI β (R /N)S I γ I R θ S θ I D δ β (/N)R S θ S(t τ)+ θ I(t τ) R S R I Q γ (R/N)R Figure : The state transition diagram. where b =ωβ β +γ γ β +β γ θ, Since S+I+D+Q+R=N, R S +R I =R N, Q=N S I D R, R S =R N R I.System() can be simplified to b =β γ θ, b = β ωr N N θ γ (γ +θ ), () b =(γ +θ ) (ωβ +γ γ +γ θ ). Assume that system ()becomes stable at timet. By integrating the fourth equation of system () withtimet from to T+τ,wecanget Since S+I+D+Q+R=N, S + b S +b S b b S + θ S +θ I δ D=θ S τ+θ I τ. () +θ S τ+θ I τ + γ I +θ S +θ I ω =N. Obviously, ()hasoneuniquepositiverooti.sothereisone unique positive equilibrium E =(S,I,D,Q,R,R S,R I ) of system (). The proof is completed. () ds (t) di (t) = β S (t) I (t) β R I (t) N S (t) +ωr(t) θ S (t), =β S (t) I (t) +β R I (t) N S (t) γ I (t) θ I (t), dr (t) dd (t) dr I (t) =γ I (t) ωr(t) +δ(n S(t) I(t) D(t) R(t)), =θ S (t) θ S (t τ) +θ I (t) θ I (t τ), =β I (t) N (R N R I (t)) γ R (t) N R I (t). The Jacobian matrix of (7)aboutE =(S,I,D,R,R I ) is given by (7) β I R I β N θ β S ω β S N β J(E I R I +β β )= N S β γ θ S N ( δ γ δ ω δ δ. () ) θ θ e λτ θ θ e λτ β ( (R N R I ) γ R I N N β I +γ R N ) Let c =β I +β R I N, c =β S, c = β S N, c = β (R N R I ), N
5 Mathematical Problems in Engineering c = γ R I N, c = β I +γ R, N p =c c +γ +θ +ω+δ+c +θ, p =c ( c +γ +θ )+(ω+δ+c +θ )(c c +r +θ ) +(c +θ ) (ω+δ) c c +c c +δω, p =c (ω + δ + c +θ )( c +γ +θ ) +((c +θ ) (ω+δ) + δω) (c c +γ +θ ) According to Routh-Hurwitz criterion, all roots of () have negative real parts. Therefore, it can be concluded that the positive equilibrium E = (S,I,D,R,R I ) is locally asymptotically stable without time delay. The proof is completed. If λ = iω (ω > ) is the root of (), separating the real and imaginary parts, the following two equations can be obtained: c c (θ +ω+δ)+c c (c +ω+δ) +(c ω c c )(δ γ )+δ(c +ωθ ), p =(c (c +θ ) (ω+δ) +c δω + δc )( c +γ +θ ) +(c c c θ c c ) (ω+δ) +(c c ω θ c c )(δ γ ) δω(c c +θ +θ (c c +γ +θ )) +δc (c c +c θ θ θ ), p =δω(θ c θ c c +θ c ( c +γ +θ )) +δc (θ c c +θ c c +c θ ( c +γ +θ ) c θ (c +θ )), q = δθ ω, p ω p ω +p +q ω sin (ωτ) q ω cos (ωτ) +q cos (ωτ) =, ω p ω +p ω+q ω cos (ωτ) +q ω sin (ωτ) q sin (ωτ) =. From (), the followingequationcan be obtained: q ω +(q q ω ) =(p ω p ω +p ) +(ω p ω +p ω). That is, () () q = δω(θ +θ (c c +γ +θ )) δc (c θ c θ ), q =δω(θ c θ c c +c θ ( c +γ +θ )) +δc (θ c c +θ c c +θ c ( c +γ +θ ) c θ (c +θ )). (9) The characteristic equation of system ()canbeobtainedby P (λ) +Q(λ) e λτ =, () where P (λ) =λ +p λ +p λ +p λ +p λ+p, () Q (λ) =q λ +q λ+q. Theorem. The positive equilibrium E is locally asymptotically stable without time delay, if condition (H )issatisfied: H :p >, d >, d >, () (p +q )d p d >, where d =p p (p +q ), d =p +q. () Proof. When τ=,()reducesto λ +p λ +p λ +(p +q )λ +(p +q )λ+(p +q )=. () where ω +D ω +D ω +D ω +D =, (7) D =p p, D =p +p p p, D =p q +p p p p, D =p q +q q p p. Letting z=ω,(7)canbewrittenas () h (z) =z +D z +D z +D z+d. (9) Zhang et al. [] obtained the following results on the distribution of roots of (9). Denote m= D D, n = D D D +D, Δ=( n ) +( m ), σ = + i, y = n + Δ+ n Δ, y = n + Δσ + n Δσ,
6 Mathematical Problems in Engineering y = n + Δσ + n Δσ, z i =y i D, (i =,, ). () Lemma. For the polynomial equation (9), () if D <,then(9) has at least one positive root; () if D and Δ,then(9) haspositiverootifand only if z >and h(z )<; () if D and Δ<,then(9) haspositiverootifand only if there exists at least one z (z,z,z ),such that z >and h(z ). Lemma. Suppose that condition H :p >, d >, d >, (p +q )d p d >is satisfied. () If one of the followings holds, (a) D < ;(b)d, Δ, z >,and h(z ) < ;(c)d,and Δ<, and there exits at least a z (z,z,z ) such that z >and h(z ),thenallrootsof () have negative real parts when τ [,τ ); here, τ is a certain positive constant. () If conditions (a) (c) of () are not satisfied, then all roots of () have negative real parts for all τ. Proof. When τ=,()can be reduced to λ +p λ +p λ +(p +q )λ+(p +q )=. () According to the Routh-Hurwitz criterion, all roots of () have negative real parts if and only if p >, d >, d >,and(p +q )d p d >. From Lemma, it can be known that if (a) (c) are not satisfied, then ()hasnorootswithzerorealpartforallτ ; if one of (a) (c) holds, when τ =τ (j) k, k =,,,, j>, () hasnorootswithzerorealpartandτ is the minimum value of τ, so() has purely imaginary roots. According to [], one obtains the conclusion of the lemma. Let λ(τ) = V(τ) + iω(τ) be the root of (), V(τ )=and ω(τ )=ω. From Lemmas and, the following are obtained. When conditions (a) (c) of Lemma () are not satisfied, h(z) always has no positive root. Therefore, under these conditions, () has no purely imaginary roots for any τ >, which implies that the positive equilibrium E = (S,I,D,R,R I ) of system (7) isabsolutelystable. Therefore, the following theorem on the stability of positive equilibrium E = (S,I,D,R,R I ) can be easily obtained. Hosts in each state 7 S(t) I(t) D(t) Q(t) R(t) Figure : Propagation trend of the five kinds of hosts when τ<τ. Removable devices in each state R S R Figure : Propagation trend of the two kinds of removable devices when τ<τ. Theorem. Supposing that condition (H )issatisfied,(a) D, Δ, z <,andh(z )>;(b)d and Δ<, and there is no z (z,z,z ) such that z >and h(z ), then the positive equilibrium E = (S,I,D,R,R I ) of system (7) is absolutely stable. In what follows, it is assumed that the coefficients in h(z) satisfy the condition (H ) (a) D, Δ, z <,andh(z )>;(b)d, Δ <,anhereisnoz (z,z,z ) such that z >and h(z ). According to [9], it is known that (9) has at least a positive root ω, which implies that characteristic equation () has a pair of purely imaginary roots ±iω.
7 Mathematical Problems in Engineering 7 Hosts in each state 7... S(t) I(t) Q(t) R(t) Figure : Propagation trend of the four kinds of hosts when τ>τ. τ= τ= τ= τ=9 Figure : The number of infectious hosts when τ is changed in one coordinate. Number of removable devices Let λ(τ) = V(τ) + iω(τ) be the root of (). V(τ k )=and ω(τ k )=ω are satisfied when τ=τ k. Lemma. Suppose that h (z ) =.Ifτ = τ,then±iω is apairofpurelyimaginaryrootsof (). Inaddition,ifthe conditions of Lemma () are satisfied, then d Re λ(τ )/dτ >. It is claimed that d Re λ sgn [ dτ ] = sgn {h (ω )}. () τ=τ k R S R Figure : Propagation trend of the two kinds of removable devices when τ>τ. This signifies that there is at least one eigenvalue with positive real part for τ>τ k. Differentiating two sides of () with respect to τ,it can be written as Since () has a pair of purely imaginary roots ±iω,the corresponding τ k >is given by ().Consider ( dλ dτ ) =((λ +p λ +p λ +p λ+p ) +(q λ+q )e λτ (q λ +q λ+q )τe λτ ) τ k = ω arccos [((q q ω )(p ω p ω p ) +q ω (p ω ω p ω )) ((q q ω ) +q ω ) ]+ kπ ω, (k =,,,,...). () ((q λ +q λ+q )λe λτ ) = (λ +p λ +p λ +p λ+p )e λτ (q λ +q λ+q )λ q + λ+q (q λ +q λ+q )λ τ λ. ()
8 Mathematical Problems in Engineering τ= τ= (a) (b) τ= τ= (c) (d) Figure 7: The number of infectious hosts when τ is changed in four coordinates. τ= τ= 7 7 S(t) S(t)... I(t)... I(t) (a) (b) Figure : The phase portrait of susceptible hosts S(t) and infectious hostsi(t).
9 Mathematical Problems in Engineering 9 τ= τ= S(t) S(t) R(t) I(t) R(t) I(t) (a) (b) Figure 9: The projection of the phase portrait of system () in(s, I, R)-space. Therefore sgn [ d Re λ dτ ] τ=τ k = sgn [Re ( dλ dτ ) ] λ=iω = sgn [Re ( (λ +p λ +p λ +p λ+p )e λτ (q λ +q λ+q )λ q + λ+q (q λ +q λ+q )λ τ λ )] λ=iω Hopf bifurcation 7 9 τ(s) = sgnre {((ω p ω i p ω +p ω i+p ) Figure : Bifurcation diagram of system ()withτ ranging from to 9. [cos (ω τ k )+isin (ω τ k )] ) ((q ω i+q q ω )ω i) q + ω i+q (q ω i+q q ω )ω i } = sgn ω K [ω + (p p )ω +(p +p p p )ω +(p +p p p p )] = sgn ω Γ = sgn ω Γ {h (ω )} = sgn {h (ω )}, () where K=q ω +(q ω q ω ). It follows from the hypothesis (H ) that h (ω ) =and therefore the transversality condition holds. It can be obtained that d(re λ) >. () dτ τ=τ k The root of characteristic equation () crosses from the left to the right on the imaginary axis as τ continuously varies from a value less than τ k to one greater than τ k according to Rouche s theorem []. Therefore, according to the Hopf bifurcation theorem [] for functional differential equations, the transversality condition holds and the conditions for Hopf bifurcation are satisfied at τ=τ k.thenthefollowingresultcan be obtained. Theorem 7. Supposing that condition (H ) is satisfied, () if τ [,τ ), then the positive equilibrium E = (S,I,D,R,R I ) of system (7) is asymptotically stable and unstable when τ>τ ; () if condition (H ) is satisfied, system (7) will undergo a Hopf bifurcation at the positive equilibrium E = (S,I,D,R,R I ) when τ = τ k (k =,,,...), where τ k is defined by (). This implies that when the time delay τ<τ,thesystem will stabilize at its infection equilibrium point, which is beneficial for us to implement a containment strategy; when time delay τ > τ, the system will be unstable and worms cannot be effectively controlled.
10 Mathematical Problems in Engineering Number of susceptible hosts... (a) (b) Number of quarantined hosts Number of removed hosts.. (c) (d) Figure : Comparisons between numerical curves and simulation curves when τ<τ.. Numerical Analysis In this section, several numerical results are presented to prove the correctness of theoretical analysis above. 7, hosts and, removable devices are selected as the populationsize;theworm saveragescanrateisη = per second. The worm infection rate can be calculated as α= ηn/ =.9, which means that average.9 hosts of all the hosts can be scanned by one infectious host. The infection ratio is β =η/ =.9. The contact infection rate between hosts and removable devices is β =.. The recovery rates of infectious hosts and removable devices are γ =. and γ =., respectively.theimmunization rate of quarantined hosts is δ =. and the reassembly rate of immunization hosts is ω =.. At the beginning, there are infectious hosts and infectious removable devices, while the rest of hosts and removable devices are susceptible. In anomaly intrusion detection system, the rate at which infected hosts are detected and quarantined is θ =. per second. It means that an infected host can be detected and quarantinedinabouts.therateatwhichsusceptiblehosts are detected and quarantined is θ =. per second; that is, about two false alarms are generated by the anomaly intrusion detection system per day. When τ = < τ, Figure presents the changes ofthenumberoffivekindsofhostsandfigure shows the curves of two kinds of removable devices. According to Theorem, the positive equilibrium E =(S,I,D,R,R I ) is asymptotically stable when τ [,τ ),whichisillustrated by the numerical simulations in Figures and. Finally,the
11 Mathematical Problems in Engineering Number of susceptible hosts... (a) (b) Number of quarantined hosts Number of removed hosts.. (c) (d) Figure : Comparisons between numerical curves and simulation curves when τ>τ. number of every kind of host and removable device keeps stable. When τ gets increased and passes through the threshold τ,thepositiveequilibriume = (S,I,D,R,R I ) will lose its stability and a Hopf bifurcation will occur. A family of periodic solution bifurcates from the positive equilibrium E.Whenτ = > τ, Figure shows the curves of susceptible, infectious, quarantined, and removed hosts and thenumericalsimulationresultsoftwokindsofremovable devices are depicted by Figure.FromFiguresand,wecan clearlyseethateverystateofhostsandremovabledevicesis unstable. Figure shows that the number of infectious hosts will outburst after a short period of peace and repeat again and again. In order to state the influence of time delay, the delay τ is set to a different value each time with other parameters remaining unchanged. Figure shows four curves of the number of infectious hosts in the same coordinate with four delays:τ =, τ=, τ=, andτ=9, respectively. Figures 7(a) 7(c) show four curves of the number of infectious hosts in four coordinates. Initially, the four curves are overlapped which means that the time delay has little effect on the initial stateofwormspread.withtheincreaseofthetimet, the time delay affects the number of infectious hosts. With the increase of time delay, the curve begins to oscillate. The system becomes unstable as time delay passes through the critical value τ. At the same time, it can be discovered that theamplitudeandperiodofthenumberofinfectioushosts gradually increase. Figures (a) and (b) show the phase portraits of susceptible hosts S(t) and infectious hosts I(t) with τ = < τ and τ = > τ, respectively. Figures 9(a) and 9(b) show
12 Mathematical Problems in Engineering theprojectionofthephaseportraitofsystem() in(s, I, R)- space when τ=<τ and τ=>τ,respectively.itis clear that the curve converges to a fixed point when τ<τ, which means that the system is stable. When τ>τ,thecurve converges to a limit circle, which implies that the system is unstable and the worm propagation is out of control. Figure shows the bifurcation diagram with τ from to 9. It is clear that Hopf bifurcation will occur when τ=τ =.. Simulation Experiments In our simulation experiments, the discrete-time simulation is adopted because of its accuracy and is less time-consuming. The discrete-time simulation is an expanded version of Zou s program simulating Code Red worm propagation. All of the parameters are consistent with the numerical experiments. Figures (a) (d) show the comparisons between numerical and simulation curves of susceptible, infectious, quarantined, and removed hosts when τ = < τ, respectively. It is clearly seen that the simulation curves match the numerical ones very well. Figures (a) (d) show the comparisons between numerical and simulation resultsoffourkindsofhostswhenτ = 9 > τ.inthis figure, two curves are still matched well. It fully illustrates the correctness of our theoretical analysis.. Conclusions In this paper, considering the influence of removable devices, a delayed worm propagation dynamical system based on anomaly IDS has been constructed. By regarding the time delay caused by time window of anomaly IDS as the bifurcation parameter, the local asymptotic stability at the positive equilibrium and local Hopf bifurcation were discussed. Through theoretical analysis and related experiments, the main conclusions can be summarized as follows. (a) The critical time delay τ where Hopf bifurcation appearsisderived: τ = ω arccos [((q q ω )(p ω p ω p ) +q ω (p ω ω p ω )) ((q q ω ) +q ω ) ]. (7) (b) When the time delay τ<τ, worm propagation system is stable and worms behavior is easy to predict, which is beneficial for us to implement containment strategy to control and eliminate the worm. (c) When time delay τ τ,hopfbifurcationoccurs, which implies that the system will be unstable and containment strategy does not work effectively. Thus, in order to control and even eliminate the worm, the size of time window of anomaly IDS must be less than τ. In real network environment, various factors can affect worm propagation. This paper concentrates on analyzing the influence of time delay caused by anomaly IDS; other factors having an impact on worm propagation will be the center of our future study. Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. Acknowledgments This paper is supported by the Program for New Century Excellent Talents in University (NCET--); Natural Science Foundation of Liaoning Province of China under Grant no. 9; Program for Liaoning Excellent Talents in University under LR; Fundamental Research Funds of the Central Universities under Grant nos. N and N7; and MOE-Intel Special Fund of Information Technology (MOE-INTEL--). References [] P. Porras, H. Saidi, and V. Yegneswaran, An Analysis of Conficker s Logic and Rendezvous Point, SRI International, 9. [] Unruly USB, Devices Expose Networks to Malware, Unruly-USB-Devices-Expose-Networks-to-Malware.pdf. []E.Byres,A.Ginter,andJ.Langill, Howstuxnetspreads a study of infection paths in best practice systems, White Paper,. [] N. Falliere, L. O. Murchu, and E. Chien, W.Stuxnet Dossier, Symantec Security Response,. [] Win.Stuxnet, response/ writeup.jsp?docid= [] Flamer: Highly Sophisticated and Discreet Threat Targets the Middle East, [7] W.Flamer, response/ writeup.jsp?docid= [] W.O.KermackandA.G.Mckendrick, Acontributiontothe mathematical theory of epidemics, Proceedings of the Royal Society A,vol.,no.77,pp.7 7,97. [9]C.C.Zou,W.Gong,andD.Towsley, Coderedwormpropagation modeling and analysis, in Proceedings of the 9th ACM Conference on Computer and Communications Security,pp. 7, Washington, DC, USA, November. [] C. C. Zou, W. B. Gong, and D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, in Proceedings of the ACM Workshop on Rapid Malcode (WORM ), pp., Washington, DC, USA, October. [] F. Wang, Y. Zhang, C. Wang, J. Ma, and S. Moon, Stability analysis of a SEIQV epidemic model for rapid spreading worms, Computers and Security, vol. 9, no., pp.,. [] Y.Yao,W.Xiang,A.Qu,G.Yu,andF.Gao, Hopfbifurcation in an SEIDQV worm propagation model with quarantine strategy, Discrete Dynamics in Nature and Society, vol., Article ID, pages,.
13 Mathematical Problems in Engineering []Y.Yao,L.Guo,H.Guo,G.Yu,F.Gao,andX.Tong, Pulse quarantine strategy of internet worm propagation: modeling and analysis, Computers and Electrical Engineering, vol., no., pp. 7,. [] B. K. Mishra and N. Jha, SEIQRS model for the transmission of malicious objects in computer network, Applied Mathematical Modelling,vol.,no.,pp.7 7,. []B.D.Hassard,N.D.Kazarinoff,andY.H.Wan,Theory and Applications of Hopf Bifurcation,vol.ofLondon Mathematical Society Lecture Note Series, Cambridge University Press, Cambridge, UK, 9. [] Y. Yao, N. Zhang, W. Xiang, G. Yu, and F. Gao, Modeling and analysis of bifurcation in a delayed worm propagation model, Applied Mathematics,vol.,ArticleID979, pages,. [7] W. Yu and J. Cao, Hopf bifurcation and stability of periodic solutions for van der Pol equation with time delay, Nonlinear Analysis:Theory,MethodsandApplications,vol.,no.,pp.,. [] J. Zhang, W. Li, and X. Yan, Hopf bifurcation and stability of periodic solutions in a delayed eco-epidemiological system, Applied Mathematics and Computation,vol.9,no.,pp. 7,. [9] X. Han and Q. Tan, Dynamical behavior of computer virus on Internet, Applied Mathematics and Computation, vol. 7, no., pp.,. [] T. Dong, X. Liao, and H. Li, Stability and Hopf bifurcation in a computer virus model with multistate antivirus, Abstract and Applied Analysis, vol., Article ID 97, pages,. []Y.Yao,X.Xie,H.Guo,G.Yu,F.Gao,andX.Tong, Hopf bifurcation in an Internet worm propagation model with time delay in quarantine, Mathematical and Computer Modelling, vol. 7, no. -, pp.,. []J.Ren,X.Yang,Q.Zhu,L.Yang,andC.Zhang, Anovel computer virus model and its dynamics, Nonlinear Analysis: Real World Applications,vol.,no.,pp.7,. [] L. Wu, X. Su, and P. Shi, Sliding mode control with bounded l gain performance of Markovian jump singular time-delay systems, Automatica, vol., no., pp. 99 9,. [] F. Li and X. Zhang, A delay-dependent bounded real lemma forsingularlpvsystemswithtime-variantdelay, International Robust and Nonlinear Control,vol.,no.,pp.9 7,. []F.Li,P.Shi,L.Wu,andX.Zhang, Fuzzy-model-basedDstability and non-fragile control for discrete-time descriptor systems with multiple delays, IEEE Transaction on Fuzzy System,vol.99,page,. [] L. Song, J. Zhen, G. Sun, J. Zhang, and X. Han, Influence of removable devices on computer worms: dynamic analysis and control strategies, Computers and Mathematics with Applications,vol.,no.7,pp. 9,. [7] Q. Zhu, X. Yang, and J. Ren, Modeling and analysis of the spread of computer virus, Communications in Nonlinear Science and Numerical Simulation,vol.7,no.,pp.7,. [] S. Wang, Q. Liu, X. Yu, and Y. Ma, Bifurcation analysis of a model for network worm propagation with time delay, Mathematical and Computer Modelling,vol.,no.-,pp. 7,. [9] L. Wang, Y. Fan, and W. Li, Multiple bifurcations in a predatorprey system with monotonic functional response, Applied Mathematics and Computation, vol.7,no.,pp.,. [] J. K. Hale and S. M. Verduyn Lunel, Introduction to Functional Differential Equations, vol.99,springer,newyork,ny,usa, 99.
14 Advances in Operations Research Volume Advances in Decision Sciences Volume Applied Mathematics Algebra Volume Probability and Statistics Volume The Scientific World Journal Volume International Differential Equations Volume Volume Submit your manuscripts at International Advances in Combinatorics Mathematical Physics Volume Complex Analysis Volume International Mathematics and Mathematical Sciences Mathematical Problems in Engineering Mathematics Volume Volume Volume Volume Discrete Mathematics Volume Discrete Dynamics in Nature and Society Function Spaces Abstract and Applied Analysis Volume Volume Volume International Stochastic Analysis Optimization Volume Volume
Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume 1, Article ID 3868, 18 pages doi:1.11/1/3868 Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine
More informationResearch Article Propagation of Computer Virus under Human Intervention: A Dynamical Model
Discrete Dynamics in Nature and ociety Volume 2012, Article ID 106950, 8 pages doi:10.1155/2012/106950 Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Chenquan
More informationResearch Article Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus
Abstract and Applied Analysis Volume, Article ID 84987, 6 pages doi:.55//84987 Research Article Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus Tao Dong,, Xiaofeng Liao,
More informationGlobal Stability of a Computer Virus Model with Cure and Vertical Transmission
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 3, Issue 1, January 016, PP 16-4 ISSN 349-4840 (Print) & ISSN 349-4859 (Online) www.arcjournals.org Global
More informationResearch Article Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
e Scientific World Journal Volume 4, Article ID 944, 4 pages http://dx.doi.org/.55/4/944 Research Article Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network Zizhen
More informationResearch Article Stability Switches and Hopf Bifurcations in a Second-Order Complex Delay Equation
Hindawi Mathematical Problems in Engineering Volume 017, Article ID 679879, 4 pages https://doi.org/10.1155/017/679879 Research Article Stability Switches and Hopf Bifurcations in a Second-Order Complex
More informationResearch Article Modeling Computer Virus and Its Dynamics
Mathematical Problems in Engineering Volume 213, Article ID 842614, 5 pages http://dx.doi.org/1.1155/213/842614 Research Article Modeling Computer Virus and Its Dynamics Mei Peng, 1 Xing He, 2 Junjian
More informationSpread of Malicious Objects in Computer Network: A Fuzzy Approach
Available at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 8, Issue 2 (December 213), pp. 684 7 Applications and Applied Mathematics: An International Journal (AAM) Spread of Malicious Objects
More informationResearch Article An Impulse Model for Computer Viruses
Discrete Dynamics in Nature and Society Volume 2012, Article ID 260962, 13 pages doi:10.1155/2012/260962 Research Article An Impulse Model for Computer Viruses Chunming Zhang, Yun Zhao, and Yingjiang Wu
More informationStability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet
Vol.8 No.7 5 pp.-8 http://dx.doi.org/.57/ijhit.5.8.7. Stability Analysis of a Quarantined Epidemic Model with Latent and reaking-out over the Internet Munna Kumar a imal Kumar Mishra b and T. C. Panda
More informationResearch Article Adaptive Control of Chaos in Chua s Circuit
Mathematical Problems in Engineering Volume 2011, Article ID 620946, 14 pages doi:10.1155/2011/620946 Research Article Adaptive Control of Chaos in Chua s Circuit Weiping Guo and Diantong Liu Institute
More informationModelling of the Hand-Foot-Mouth-Disease with the Carrier Population
Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Ruzhang Zhao, Lijun Yang Department of Mathematical Science, Tsinghua University, China. Corresponding author. Email: lyang@math.tsinghua.edu.cn,
More informationResearch Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components
Applied Mathematics Volume 202, Article ID 689820, 3 pages doi:0.55/202/689820 Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components
More informationDepartment of Mathematics, Faculty of Sciences and Mathematics, Diponegoro University,Semarang, Indonesia
ISS: 978-602-71169-7-9 Proceeding of 5th International Seminar on ew Paradigm and Innovation on atural Science and Its Application (5th ISPISA) Mathematical Modeling of worm infection on computer in a
More informationStability Analysis of a Worm Propagation Model with Quarantine and Vaccination
International Journal of Network Security, Vol.18, No.3, PP.493-5, May 216 493 Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination Fangwei Wang 1,2, Fang Yang 3, Changguang Wang
More informationResearch Article Partial Pole Placement in LMI Region
Control Science and Engineering Article ID 84128 5 pages http://dxdoiorg/11155/214/84128 Research Article Partial Pole Placement in LMI Region Liuli Ou 1 Shaobo Han 2 Yongji Wang 1 Shuai Dong 1 and Lei
More informationA comparison of delayed SIR and SEIR epidemic models
Nonlinear Analysis: Modelling and Control, 2011, Vol. 16, No. 2, 181 190 181 A comparison of delayed SIR and SEIR epidemic models Abdelilah Kaddar a, Abdelhadi Abta b, Hamad Talibi Alaoui b a Université
More informationSI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network. 1 Introduction. Bimal Kumar Mishra 1, Aditya Kumar Singh 2
ISSN 1749-3889 (print), 1749-3897 (online) International Journal of Nonlinear Science Vol.13(2012) No.3,pp.357-362 SI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network Bimal Kumar
More informationA delayed SIR model with general nonlinear incidence rate
Liu Advances in Difference Equations 2015) 2015:329 DOI 10.1186/s13662-015-0619-z R E S E A R C H Open Access A delayed SIR model with general nonlinear incidence rate Luju Liu * * Correspondence: lujuliu@126.com
More informationResearch Article Stabilizing of Subspaces Based on DPGA and Chaos Genetic Algorithm for Optimizing State Feedback Controller
Mathematical Problems in Engineering Volume 2012, Article ID 186481, 9 pages doi:10.1155/2012/186481 Research Article Stabilizing of Subspaces Based on DPGA and Chaos Genetic Algorithm for Optimizing State
More informationAn Improved Computer Multi-Virus Propagation Model with User Awareness
Journal of Information & Computational Science 8: 16 (2011) 4301 4308 Available at http://www.joics.com An Improved Computer Multi-Virus Propagation Model with User Awareness Xiaoqin ZHANG a,, Shuyu CHEN
More informationDelay SIR Model with Nonlinear Incident Rate and Varying Total Population
Delay SIR Model with Nonlinear Incident Rate Varying Total Population Rujira Ouncharoen, Salinthip Daengkongkho, Thongchai Dumrongpokaphan, Yongwimon Lenbury Abstract Recently, models describing the behavior
More informationResearch Article Design of PDC Controllers by Matrix Reversibility for Synchronization of Yin and Yang Chaotic Takagi-Sugeno Fuzzy Henon Maps
Abstract and Applied Analysis Volume 212, Article ID 35821, 11 pages doi:1.1155/212/35821 Research Article Design of PDC Controllers by Matrix Reversibility for Synchronization of Yin and Yang Chaotic
More informationResearch Article On the Stability Property of the Infection-Free Equilibrium of a Viral Infection Model
Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume, Article ID 644, 9 pages doi:.55//644 Research Article On the Stability Property of the Infection-Free Equilibrium of a Viral
More informationResearch Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network
Mathematical Problems in Engineering Volume 2012, Article ID 407064, 13 pages doi:10.1155/2012/407064 Research Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network Bimal
More informationA Mathematical Analysis on the Transmission Dynamics of Neisseria gonorrhoeae. Yk j N k j
North Carolina Journal of Mathematics and Statistics Volume 3, Pages 7 20 (Accepted June 23, 2017, published June 30, 2017 ISSN 2380-7539 A Mathematical Analysis on the Transmission Dynamics of Neisseria
More informationQualitative Analysis of a Discrete SIR Epidemic Model
ISSN (e): 2250 3005 Volume, 05 Issue, 03 March 2015 International Journal of Computational Engineering Research (IJCER) Qualitative Analysis of a Discrete SIR Epidemic Model A. George Maria Selvam 1, D.
More informationResearch Article Dynamical Models for Computer Viruses Propagation
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 28, Article ID 9426, 11 pages doi:1.11/28/9426 Research Article Dynamical Models for Computer Viruses Propagation José R. C. Piqueira
More informationResearch Article Modeling and Analysis of Epidemic Diffusion within Small-World Network
Applied Mathematics Volume 212, Article ID 841531, 14 pages doi:1.1155/212/841531 Research Article Modeling and Analysis of Epidemic Diffusion within Small-World Network Ming Liu and Yihong Xiao Department
More informationResearch Article Hopf Bifurcation Analysis and Anticontrol of Hopf Circles of the Rössler-Like System
Abstract and Applied Analysis Volume, Article ID 3487, 6 pages doi:.55//3487 Research Article Hopf Bifurcation Analysis and Anticontrol of Hopf Circles of the Rössler-Like System Ranchao Wu and Xiang Li
More informationResearch Article Modeling and Analysis of Peer-to-Peer Botnets
Discrete Dynamics in Nature and Society Volume 2012, Article ID 865075, 18 pages doi:10.1155/2012/865075 Research Article Modeling and Analysis of Peer-to-Peer nets Liping Feng, 1, 2 Xiaofeng Liao, 1 Qi
More informationHOPF BIFURCATION CONTROL WITH PD CONTROLLER
HOPF BIFURCATION CONTROL WITH PD CONTROLLER M. DARVISHI AND H.M. MOHAMMADINEJAD DEPARTMENT OF MATHEMATICS, FACULTY OF MATHEMATICS AND STATISTICS, UNIVERSITY OF BIRJAND, BIRJAND, IRAN E-MAILS: M.DARVISHI@BIRJAND.AC.IR,
More informationKingSaudBinAbdulazizUniversityforHealthScience,Riyadh11481,SaudiArabia. Correspondence should be addressed to Raghib Abu-Saris;
Chaos Volume 26, Article ID 49252, 7 pages http://dx.doi.org/.55/26/49252 Research Article On Matrix Projective Synchronization and Inverse Matrix Projective Synchronization for Different and Identical
More informationAvailable online at Commun. Math. Biol. Neurosci. 2016, 2016:17 ISSN:
Available online at http://scik.org Commun. Math. Biol. Neurosci. 216, 216:17 ISSN: 252-2541 OPTIMAL CONTROL OF A COMPUTER VIRUS MODEL WITH NETWORK ATTACKS HONGYUE PEI 1, YONGZHEN PEI 1,2,, XIYIN LIANG
More informationResearch Article Mathematical Model and Cluster Synchronization for a Complex Dynamical Network with Two Types of Chaotic Oscillators
Applied Mathematics Volume 212, Article ID 936, 12 pages doi:1.11/212/936 Research Article Mathematical Model and Cluster Synchronization for a Complex Dynamical Network with Two Types of Chaotic Oscillators
More informationResearch Article The Application of Baum-Welch Algorithm in Multistep Attack
e Scientific World Journal, Article ID 374260, 7 pages http://dx.doi.org/10.1155/2014/374260 Research Article The Application of Baum-Welch Algorithm in Multistep Attack Yanxue Zhang, 1 Dongmei Zhao, 2
More informationOPTIMAL CONTROL ON THE SPREAD OF SLBS COMPUTER VIRUS MODEL. Brawijaya University Jl. Veteran Malang, 65145, INDONESIA
International Journal of Pure and Applied Mathematics Volume 17 No. 3 216, 749-758 ISSN: 1311-88 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 1.12732/ijpam.v17i3.21
More informationCHATTERING-FREE SMC WITH UNIDIRECTIONAL AUXILIARY SURFACES FOR NONLINEAR SYSTEM WITH STATE CONSTRAINTS. Jian Fu, Qing-Xian Wu and Ze-Hui Mao
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 12, December 2013 pp. 4793 4809 CHATTERING-FREE SMC WITH UNIDIRECTIONAL
More informationResearch Article Forward and Reverse Movements of a Linear Positioning Stage Based on the Parasitic Motion Principle
Advances in Mechanical Engineering, Article ID 45256, 7 pages http://dx.doi.org/1.1155/214/45256 Research Article Forward and Reverse Movements of a Linear Positioning Stage Based on the Parasitic Motion
More informationResearch Article New Oscillation Criteria for Second-Order Neutral Delay Differential Equations with Positive and Negative Coefficients
Abstract and Applied Analysis Volume 2010, Article ID 564068, 11 pages doi:10.1155/2010/564068 Research Article New Oscillation Criteria for Second-Order Neutral Delay Differential Equations with Positive
More informationGLOBAL STABILITY AND HOPF BIFURCATION OF A DELAYED EPIDEMIOLOGICAL MODEL WITH LOGISTIC GROWTH AND DISEASE RELAPSE YUGUANG MU, RUI XU
Available online at http://scik.org Commun. Math. Biol. Neurosci. 2018, 2018:7 https://doi.org/10.28919/cmbn/3636 ISSN: 2052-2541 GLOBAL STABILITY AND HOPF BIFURCATION OF A DELAYED EPIDEMIOLOGICAL MODEL
More informationResearch Article Towards the Epidemiological Modeling of Computer Viruses
Discrete Dynamics in Nature and Society Volume 2012, Article ID 259671, 11 pages doi:10.1155/2012/259671 Research Article Towards the Epidemiological Modeling of Computer Viruses Xiaofan Yang 1, 2 and
More informationResearch Article Unicity of Entire Functions concerning Shifts and Difference Operators
Abstract and Applied Analysis Volume 204, Article ID 38090, 5 pages http://dx.doi.org/0.55/204/38090 Research Article Unicity of Entire Functions concerning Shifts and Difference Operators Dan Liu, Degui
More informationStability of SEIR Model of Infectious Diseases with Human Immunity
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 6 (2017), pp. 1811 1819 Research India Publications http://www.ripublication.com/gjpam.htm Stability of SEIR Model of Infectious
More informationStability analysis of delayed SIR epidemic models with a class of nonlinear incidence rates
Published in Applied Mathematics and Computation 218 (2012 5327-5336 DOI: 10.1016/j.amc.2011.11.016 Stability analysis of delayed SIR epidemic models with a class of nonlinear incidence rates Yoichi Enatsu
More informationResearch Article Solvability for a Coupled System of Fractional Integrodifferential Equations with m-point Boundary Conditions on the Half-Line
Abstract and Applied Analysis Volume 24, Article ID 29734, 7 pages http://dx.doi.org/.55/24/29734 Research Article Solvability for a Coupled System of Fractional Integrodifferential Equations with m-point
More informationOpen Access Permanent Magnet Synchronous Motor Vector Control Based on Weighted Integral Gain of Sliding Mode Variable Structure
Send Orders for Reprints to reprints@benthamscienceae The Open Automation and Control Systems Journal, 5, 7, 33-33 33 Open Access Permanent Magnet Synchronous Motor Vector Control Based on Weighted Integral
More informationANALYSIS AND CONTROLLING OF HOPF BIFURCATION FOR CHAOTIC VAN DER POL-DUFFING SYSTEM. China
Mathematical and Computational Applications, Vol. 9, No., pp. 84-9, 4 ANALYSIS AND CONTROLLING OF HOPF BIFURCATION FOR CHAOTIC VAN DER POL-DUFFING SYSTEM Ping Cai,, Jia-Shi Tang, Zhen-Bo Li College of
More informationResearch Article A Note on the Solutions of the Van der Pol and Duffing Equations Using a Linearisation Method
Mathematical Problems in Engineering Volume 1, Article ID 693453, 1 pages doi:11155/1/693453 Research Article A Note on the Solutions of the Van der Pol and Duffing Equations Using a Linearisation Method
More informationA Note on the Spread of Infectious Diseases. in a Large Susceptible Population
International Mathematical Forum, Vol. 7, 2012, no. 50, 2481-2492 A Note on the Spread of Infectious Diseases in a Large Susceptible Population B. Barnes Department of Mathematics Kwame Nkrumah University
More informationResearch Article Solvability of a Class of Integral Inclusions
Abstract and Applied Analysis Volume 212, Article ID 21327, 12 pages doi:1.1155/212/21327 Research Article Solvability of a Class of Integral Inclusions Ying Chen and Shihuang Hong Institute of Applied
More informationSTABILITY ANALYSIS OF DELAY DIFFERENTIAL EQUATIONS WITH TWO DISCRETE DELAYS
CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 20, Number 4, Winter 2012 STABILITY ANALYSIS OF DELAY DIFFERENTIAL EQUATIONS WITH TWO DISCRETE DELAYS XIHUI LIN AND HAO WANG ABSTRACT. We use an algebraic
More informationResearch Article Propagation Characteristics of Oblique Incident Terahertz Wave in Nonuniform Dusty Plasma
Antennas and Propagation Volume 216, Article ID 945473, 6 pages http://dx.doi.org/1.1155/216/945473 Research Article Propagation Characteristics of Oblique Incident Terahert Wave in Nonuniform Dusty Plasma
More informationResearch Article The Microphone Feedback Analogy for Chatter in Machining
Shock and Vibration Volume 215, Article ID 976819, 5 pages http://dx.doi.org/1.1155/215/976819 Research Article The Microphone Feedback Analogy for Chatter in Machining Tony Schmitz UniversityofNorthCarolinaatCharlotte,Charlotte,NC28223,USA
More informationResearch Article Existence of Periodic Positive Solutions for Abstract Difference Equations
Discrete Dynamics in Nature and Society Volume 2011, Article ID 870164, 7 pages doi:10.1155/2011/870164 Research Article Existence of Periodic Positive Solutions for Abstract Difference Equations Shugui
More informationResearch Article Robust Switching Control Strategy for a Transmission System with Unknown Backlash
Mathematical Problems in Engineering Volume 24, Article ID 79384, 8 pages http://dx.doi.org/.55/24/79384 Research Article Robust Switching Control Strategy for a Transmission System with Unknown Backlash
More informationHopf Bifurcation Analysis and Approximation of Limit Cycle in Coupled Van Der Pol and Duffing Oscillators
The Open Acoustics Journal 8 9-3 9 Open Access Hopf ifurcation Analysis and Approximation of Limit Cycle in Coupled Van Der Pol and Duffing Oscillators Jianping Cai *a and Jianhe Shen b a Department of
More informationQualitative analysis for a delayed epidemic model with latent and breaking-out over the Internet
Zhang and Wang Advances in Difference Equations (17) 17:31 DOI 1.1186/s1366-17-174-9 R E S E A R C H Open Access Qualitative analysis for a delayed epidemic model with latent and breaking-out over the
More informationResearch Article On Exponential Stability Conditions of Descriptor Systems with Time-Varying Delay
Applied Mathematics Volume 2012, Article ID 532912, 12 pages doi:10.1155/2012/532912 Research Article On Exponential Stability Conditions of Descriptor Systems with Time-Varying Delay S. Cong and Z.-B.
More informationNew results on the existences of solutions of the Dirichlet problem with respect to the Schrödinger-prey operator and their applications
Chen Zhang Journal of Inequalities Applications 2017 2017:143 DOI 10.1186/s13660-017-1417-9 R E S E A R C H Open Access New results on the existences of solutions of the Dirichlet problem with respect
More informationResearch Article A New Class of Meromorphic Functions Associated with Spirallike Functions
Applied Mathematics Volume 202, Article ID 49497, 2 pages doi:0.55/202/49497 Research Article A New Class of Meromorphic Functions Associated with Spirallike Functions Lei Shi, Zhi-Gang Wang, and Jing-Ping
More informationResearch Article Representing Smoothed Spectrum Estimate with the Cauchy Integral
Mathematical Problems in Engineering Volume 1, Article ID 67349, 5 pages doi:1.1155/1/67349 Research Article Representing Smoothed Spectrum Estimate with the Cauchy Integral Ming Li 1, 1 School of Information
More informationResearch Article Chaos and Control of Game Model Based on Heterogeneous Expectations in Electric Power Triopoly
Discrete Dnamics in Nature and Societ Volume 29, Article ID 469564, 8 pages doi:.55/29/469564 Research Article Chaos and Control of Game Model Based on Heterogeneous Epectations in Electric Power Triopol
More informationResearch Article Chaos Control on a Duopoly Game with Homogeneous Strategy
Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume 16, Article ID 74185, 7 pages http://dx.doi.org/1.1155/16/74185 Publication Year 16 Research Article Chaos Control on a Duopoly
More informationResearch Article The Stability of Gauss Model Having One-Prey and Two-Predators
Abstract and Applied Analysis Volume 2012, Article ID 219640, 9 pages doi:10.1155/2012/219640 Research Article The Stability of Gauss Model Having One-Prey and Two-Predators A. Farajzadeh, 1 M. H. Rahmani
More informationGLOBAL STABILITY OF SIR MODELS WITH NONLINEAR INCIDENCE AND DISCONTINUOUS TREATMENT
Electronic Journal of Differential Equations, Vol. 2015 (2015), No. 304, pp. 1 8. SSN: 1072-6691. URL: http://ejde.math.txstate.edu or http://ejde.math.unt.edu ftp ejde.math.txstate.edu GLOBAL STABLTY
More informationResearch Article The Approximate Solution of Fredholm Integral Equations with Oscillatory Trigonometric Kernels
Applied Mathematics, Article ID 72327, 7 pages http://ddoiorg/055/204/72327 Research Article The Approimate Solution of Fredholm Integral Equations with Oscillatory Trigonometric Kernels Qinghua Wu School
More informationResearch Article Asymptotic Behavior of the Solutions of System of Difference Equations of Exponential Form
Difference Equations Article ID 936302 6 pages http://dx.doi.org/10.1155/2014/936302 Research Article Asymptotic Behavior of the Solutions of System of Difference Equations of Exponential Form Vu Van Khuong
More informationResearch Article An Optimized Grey GM(2,1) Model and Forecasting of Highway Subgrade Settlement
Mathematical Problems in Engineering Volume 015, Article ID 606707, 6 pages http://dx.doi.org/10.1155/015/606707 Research Article An Optimized Grey GM(,1) Model and Forecasting of Highway Subgrade Settlement
More informationResearch Article A Novel Differential Evolution Invasive Weed Optimization Algorithm for Solving Nonlinear Equations Systems
Journal of Applied Mathematics Volume 2013, Article ID 757391, 18 pages http://dx.doi.org/10.1155/2013/757391 Research Article A Novel Differential Evolution Invasive Weed Optimization for Solving Nonlinear
More informationResearch Article Minor Prime Factorization for n-d Polynomial Matrices over Arbitrary Coefficient Field
Complexity, Article ID 6235649, 9 pages https://doi.org/10.1155/2018/6235649 Research Article Minor Prime Factorization for n-d Polynomial Matrices over Arbitrary Coefficient Field Jinwang Liu, Dongmei
More informationGlobal Analysis of an Epidemic Model with Nonmonotone Incidence Rate
Global Analysis of an Epidemic Model with Nonmonotone Incidence Rate Dongmei Xiao Department of Mathematics, Shanghai Jiaotong University, Shanghai 00030, China E-mail: xiaodm@sjtu.edu.cn and Shigui Ruan
More informationResearch Article Positive Solutions for Neumann Boundary Value Problems of Second-Order Impulsive Differential Equations in Banach Spaces
Abstract and Applied Analysis Volume 212, Article ID 41923, 14 pages doi:1.1155/212/41923 Research Article Positive Solutions for Neumann Boundary Value Problems of Second-Order Impulsive Differential
More informationResearch Article A PLS-Based Weighted Artificial Neural Network Approach for Alpha Radioactivity Prediction inside Contaminated Pipes
Mathematical Problems in Engineering, Article ID 517605, 5 pages http://dxdoiorg/101155/2014/517605 Research Article A PLS-Based Weighted Artificial Neural Network Approach for Alpha Radioactivity Prediction
More informationResearch Article On New Wilker-Type Inequalities
International Scholarly Research Network ISRN Mathematical Analysis Volume 2011, Article ID 681702, 7 pages doi:10.5402/2011/681702 Research Article On New Wilker-Type Inequalities Zhengjie Sun and Ling
More informationResearch Article A New Fractional Integral Inequality with Singularity and Its Application
Abstract and Applied Analysis Volume 212, Article ID 93798, 12 pages doi:1.1155/212/93798 Research Article A New Fractional Integral Inequality with Singularity and Its Application Qiong-Xiang Kong 1 and
More informationHopf Bifurcation Analysis of a Dynamical Heart Model with Time Delay
Applied Mathematical Sciences, Vol 11, 2017, no 22, 1089-1095 HIKARI Ltd, wwwm-hikaricom https://doiorg/1012988/ams20177271 Hopf Bifurcation Analysis of a Dynamical Heart Model with Time Delay Luca Guerrini
More informationResearch Article Data-Driven Fault Diagnosis Method for Power Transformers Using Modified Kriging Model
Hindawi Mathematical Problems in Engineering Volume 2017, Article ID 3068548, 5 pages https://doi.org/10.1155/2017/3068548 Research Article Data-Driven Fault Diagnosis Method for Power Transformers Using
More informationDynamics on a General Stage Structured n Parallel Food Chains
Memorial University of Newfoundland Dynamics on a General Stage Structured n Parallel Food Chains Isam Al-Darabsah and Yuan Yuan November 4, 2013 Outline: Propose a general model with n parallel food chains
More informationResearch Article Global Existence and Boundedness of Solutions to a Second-Order Nonlinear Differential System
Applied Mathematics Volume 212, Article ID 63783, 12 pages doi:1.1155/212/63783 Research Article Global Existence and Boundedness of Solutions to a Second-Order Nonlinear Differential System Changjian
More informationResearch Article Nonlinear Conjugate Gradient Methods with Wolfe Type Line Search
Abstract and Applied Analysis Volume 013, Article ID 74815, 5 pages http://dx.doi.org/10.1155/013/74815 Research Article Nonlinear Conjugate Gradient Methods with Wolfe Type Line Search Yuan-Yuan Chen
More informationIntroduction to SEIR Models
Department of Epidemiology and Public Health Health Systems Research and Dynamical Modelling Unit Introduction to SEIR Models Nakul Chitnis Workshop on Mathematical Models of Climate Variability, Environmental
More informationHopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control
International Journal of Engineering esearch And Management (IJEM) ISSN: 349-58, Volume-5, Issue-6, June 18 Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion
More informationAustralian Journal of Basic and Applied Sciences
AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com A SIR Transmission Model of Political Figure Fever 1 Benny Yong and 2 Nor Azah Samat 1
More informationTHE STABILITY AND HOPF BIFURCATION OF THE DENGUE FEVER MODEL WITH TIME DELAY 1
italian journal of pure and applied mathematics n. 37 2017 (139 156) 139 THE STABILITY AND HOPF BIFURCATION OF THE DENGUE FEVER MODEL WITH TIME DELAY 1 Jinlan Guan 2 Basic Courses Department Guangdong
More informationResearch Article Existence and Uniqueness of Smooth Positive Solutions to a Class of Singular m-point Boundary Value Problems
Hindawi Publishing Corporation Boundary Value Problems Volume 29, Article ID 9627, 3 pages doi:.55/29/9627 Research Article Existence and Uniqueness of Smooth Positive Solutions to a Class of Singular
More informationResearch Article Remarks on the Regularity Criterion of the Navier-Stokes Equations with Nonlinear Damping
Mathematical Problems in Engineering Volume 15, Article ID 194, 5 pages http://dx.doi.org/1.1155/15/194 Research Article Remarks on the Regularity Criterion of the Navier-Stokes Equations with Nonlinear
More informationResearch Article An Inverse Eigenvalue Problem for Jacobi Matrices
Mathematical Problems in Engineering Volume 2011 Article ID 571781 11 pages doi:10.1155/2011/571781 Research Article An Inverse Eigenvalue Problem for Jacobi Matrices Zhengsheng Wang 1 and Baoiang Zhong
More informationResearch Article Frequent Oscillatory Behavior of Delay Partial Difference Equations with Positive and Negative Coefficients
Hindawi Publishing Corporation Advances in Difference Equations Volume 2010, Article ID 606149, 15 pages doi:10.1155/2010/606149 Research Article Frequent Oscillatory Behavior of Delay Partial Difference
More informationResearch Article A New Roper-Suffridge Extension Operator on a Reinhardt Domain
Abstract and Applied Analysis Volume 2011, Article ID 865496, 14 pages doi:10.1155/2011/865496 Research Article A New Roper-Suffridge Extension Operator on a Reinhardt Domain Jianfei Wang and Cailing Gao
More informationResearch Article Dual-Domain Transform for Travelling Wave in FRFT Domain
International Scholarly Research Network ISRN Applied Mathematics Volume 011, Article ID 161643, 8 pages doi:10.540/011/161643 Research Article Dual-Domain Transform for Travelling Wave in FRFT Domain
More informationThursday. Threshold and Sensitivity Analysis
Thursday Threshold and Sensitivity Analysis SIR Model without Demography ds dt di dt dr dt = βsi (2.1) = βsi γi (2.2) = γi (2.3) With initial conditions S(0) > 0, I(0) > 0, and R(0) = 0. This model can
More informationResearch Article Uniqueness Theorems of Difference Operator on Entire Functions
Discrete Dynamics in Nature and Society Volume 203, Article ID 3649, 6 pages http://dx.doi.org/0.55/203/3649 Research Article Uniqueness Theorems of Difference Operator on Entire Functions Jie Ding School
More informationThe Dynamic Properties of a Deterministic SIR Epidemic Model in Discrete-Time
Applied Mathematics, 05, 6, 665-675 Published Online September 05 in SciRes http://wwwscirporg/journal/am http://dxdoiorg/046/am056048 The Dynamic Properties of a Deterministic SIR Epidemic Model in Discrete-Time
More informationResearch Article Chaotic Attractor Generation via a Simple Linear Time-Varying System
Discrete Dnamics in Nature and Societ Volume, Article ID 836, 8 pages doi:.//836 Research Article Chaotic Attractor Generation via a Simple Linear Time-Varing Sstem Baiu Ou and Desheng Liu Department of
More informationApplications in Biology
11 Applications in Biology In this chapter we make use of the techniques developed in the previous few chapters to examine some nonlinear systems that have been used as mathematical models for a variety
More informationPatrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies
Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies Jun Dai, Xiaoyan Sun, and Peng Liu College of Information Sciences and Technology Pennsylvania State University,
More informationDelay-dependent Stability Analysis for Markovian Jump Systems with Interval Time-varying-delays
International Journal of Automation and Computing 7(2), May 2010, 224-229 DOI: 10.1007/s11633-010-0224-2 Delay-dependent Stability Analysis for Markovian Jump Systems with Interval Time-varying-delays
More informationStability of a Numerical Discretisation Scheme for the SIS Epidemic Model with a Delay
Stability of a Numerical Discretisation Scheme for the SIS Epidemic Model with a Delay Ekkachai Kunnawuttipreechachan Abstract This paper deals with stability properties of the discrete numerical scheme
More informationResearch Article Statistical Tests for the Reciprocal of a Normal Mean with a Known Coefficient of Variation
Probability and Statistics Volume 2015, Article ID 723924, 5 pages http://dx.doi.org/10.1155/2015/723924 Research Article Statistical Tests for the Reciprocal of a Normal Mean with a Known Coefficient
More information