Ali Raza,Muhammad Shoaib Arif, ,Muhammad Rafiq,Mairaj Bibi,Muhammad Naveed,Muhammad Usman Iqbal,Zubair Butt,Hafiza Anum Naseem and Javeria Nawaz Abbasi
1 Department of Mathematics,Stochastic Analysis &Optimization Research Group,Air University,PAF Complex E-9,Islamabad,Pakistan.
2 Faculty of Engineering University of Central Punjab,Lahore,Pakistan.
3 Department of Mathematics,Comsats University,Park Road Chak Shahzad Campus,Islamabad,Pakistan.
4 Faculty of Computing National College of Business Administration and Economics,Lahore,Pakistan.
Abstract:This writing is an attempt to explain a reliable numerical treatment for stochastic computer virus model.We are comparing the solutions of stochastic and deterministic computer virus models.This paper reveals that a stochastic computer virus paradigm is pragmatic in contrast to the deterministic computer virus model.Outcomes of threshold number C? hold in stochastic computer virus model.If C?<1 then in such a condition virus controlled in the computer population while C?>1 shows virus persists in the computer population.Unfortunately,stochastic numerical methods fail to cope with large step sizes of time.The suggested structure of the stochastic non-standard finite difference scheme (SNSFD) maintains all diverse characteristics such as dynamical consistency,boundedness and positivity as defined by Mickens.The numerical treatment for the stochastic computer virus model manifested that increasing the antivirus ability ultimates small virus dominance in a computer community.
Keywords:Computer virus,euler maruyama scheme,stochastic differential equations,stochastic euler scheme,stochastic runge-kutta scheme,stochastic NSFD scheme,stability.
A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.Virus stands for vital information resources under siege.A computer virus has two features as the potential to duplicate itself and the potential to affix itself to an alternative computer folder.They spread via disks,network or services such as email.Earlier viruses were propagated by computer programs or by hiding in floppy disks.Modern viruses transmit in a subtler way such as phishing which is a fraudulent practice of sending emails inquiring personal information [Patil and Jadhav 2014)].A virus infected computer shows various symptoms.A small number of signs that may inform that a computer has the virus are slow response time,random hard drive crashes and great pop-up ads.A carefully engineered computer virus can disrupt production and cause billions of dollars in damages.For example,the con-flicker also known as down up virus which was discovered in 2008,had infected millions of computers across the world.The estimated damage was over $9.1 billion [Zhu,Yang and Ren (2012)].Viruses have evolved over a period.Their numbers are increasing each day,and they are becoming more sophisticated and harmful.Each new virus assimilates new features along with the old ones,thus making it more difficult to detect and erase [Albazzaz and Almuhanna (2016)].The computers that we usually use do not have adequate built-in security measures as compared to larger systems thus leaving it to the users to purchase,install and utilise anti-virus software.Among significant types of computer viruses,the first type is called the boot sector virus.The boot sector is that first portion of our hard disk where routines to load our operating system reside.If these routines are disturbed or modified,our computer will not be able to work.As the name suggests,the boot sector virus modifies the boot sector program and is loaded in the memory whenever the computer is turned on.The virus is attached with the system executable files,for example,exe,.com etc.Chernobyl virus detects all the Microsoft office files and corrupts them.It also deletes the logical partition information of the disks.Users cannot access their files from the drives,because of this virus.Logic bomb virus occurs only when a particular condition is met.The condition could be any date or any completion of the process (time).After the condition is met,the virus is invoked.This virus can be discovered by chance.Trojan horse virus is embedded in the computer programs.When we run these programs,this virus is activated.Its primary purpose is destruction.The Redlof virus is a polymorphic virus,which is written in VB Script (language).When instructions are being written,this virus is embedded in the programs.It corrupts the folder data file,which is the part of windows active desktop.
An ideal structure of a computer virus holds three subroutines.The task of first sub-routine,known as infect-executable,is to find executable files and infect them by copying its code into them.Second sub-routine,namely do-damage also called the payload of the virus,is a code which delivers the malicious part of the virus.The final sub-routine trigger-pulled inspects if the required conditions are met in order to deliver its payload [Patil and Jadhav (2014)].Much work has been done on the concept of computer viruses such as new techniques for virus detection and its prevention.New researches help us to understand how sophisticated viruses work.To inspect computer viruses,the compartment modelling technique of infectious diseases was proposed [Cohen (1987);Murray (1988)].
1n last decade of the twentieth century the authors were the first ones to typical the spreading behaviour of the computer virus.This paved the way for developing mathematical models for computer virus propagation [Billings,Spears and Schwartz (2002);Han and Tan (2010);Mishra and Jha (2007);Piqueira and Araujo (2009);Piqueira,Vasconcelos,Gabriel et al.(2008);Ren,Yang,Yang et al.(2012);Ren,Yang,Zhu et al.(2012);Wierman and Marchette (2004);Yuan and Chen (2008)].Just like any biological virus the computer virus also contains a dormant period.During this period a single computer is vulnerable to a computer virus but is not infectious yet.An exposed computer,which is an infected computer in dormancy,will not transmit the virus to other computers quickly;but it still can be infected.The delay used in some models of computer virus is also based on these characteristics.It shows that although the exposed computer does not infect other computers,it still has infectivity [Han and Tan (2010);Zhu,Yang and Ren (2012)].The authors proposed SLB and SLBS models in which they observed that the computer has latency [Yang,Yang,Zhu et al.(2013);Yang,Yang,Wen et al.(2012)] and in this period of latency it also has infectivity.Multilayer networks can be responsible for spreading computer viruses.Examples of computer virus include mobile phone virus,which can use 3G,4G,Wi-Fi,or Bluetooth as a tool to communicate with other networks.Founded on the notion of multilayer network,the IBMF (Individual-Based Mean Field) was applied to the SLBS model by Zhang [Zhang (2018)].A model was developed to expect the activities of worm on the network.A time-delayed SIQVD worm propagation model with variable infection rate was framed.This model can be utilized for internet worms [Yao,Fu,Yang et al.(2018)].A research has been conducted on the susceptible,latent,breaking-out,quarantine and susceptible (SLBQRS) computer virus model.Three finite difference patterns have been used to solve the epidemic system [Fatima,Ali,Ahmed et al.(2018)].HAM (Homotopy Analysis Method) has been utilized to solve the modified nonlinear SIR epidemiological model of computer viruses [Noeiaghdam,Suleman and Budak (2018)].The propagation mechanism of computer viruses is explored by the nodebased models.To examine the dynamic behavior of a computer virus a model named SLIS which is node-based has also been proposed which demonstrated that the virus-free equilibrium is asymptotically or exponentially stable [Yu,Hu and Zeng (2019)].
However,the influence of installing anti-virus software and the period of inactivity was not taken into account.The interaction frequency of afresh entered computers on the internet from vulnerable status to unprotected status is the same as that of vulnerable status entering into infected status.This tabloid works on the stochastic model of computer virus namely SEIR model.It describes the vulnerability of susceptible computer and how they can get infected by other infected or exposed computers and thus changing to exposed status.This model based on fake immunity considers the bilinear incident rate for the latent period and infection status.We suppose that computers which freshly join the internet are susceptible.The computers interact with exposed computers,let their adequate contact rate is denoted by β1and computers also interact with infected computers,let their adequate interaction be denoted by β2Anti-virus software will compel the segments that newly entered the internet to enter the class R(t),and the segments of computer that come in contact with exposed and infected computers will be in latent state before becoming infectious and enter the class E(t).A threshold factor C?is used to determine the dynamic characteristics of the suggested model.
Scientific demonstrating has appeared as an efficient tool for the extraction of comprehensive insight about widespread viruses.For inspecting the comparison and sensitivity of conjuncture paradigms,the construction and the likely imitations of the model are used.These models’ outcomes are expected to predict certain parameters that are crucial to the public’s health.The parameters include a biological factor,host and mediator.This critical information develops health services which are used by the authority that is responsible for the public health policy [Anwar,Goldberg,Fraser et al.(2014)].Many types of research have been done on various computer virus transmission dynamics models [Cai and Li (2010);Peng,He,Huang et al.(2013)].It had already been established that non-linear IVPs do not always hold analytical solutions.Runge-Kutta and Euler methods cause disorder and fraudulent oscillations for some parameters of the discretisation parameters [Zafar,Rehan and Mushtaq (2017);Zafar,Rehan,Mushtaq et al.(2017);Zafar,Rehan and Mushtaq (2017);Bayram,Partal and Buyukoz (2018)].Such models prove to be less advantaged choices,due to uncertainties.
Stochastic differential equation models play an essential role in many branches of applied sciences such as industries,including population dynamics,finance,mechanics,medicine and biology as they provide an extra degree of realism compared to their deterministic counterpart.[Bayram,Partal and Buyukoz (2018)].
Generally,the elasticity of stochastic differential equations (SDEs) is difficult,and the solutions of stochastic differential equations do not exist explicitly.Different numerical schemes utilized to join the indicated equations in understanding convergence is difficult [Mickens (1994,2005);Cresson and Pierret (2014);Pierret (2015)].An obvious question can be raised on numerical schemes despite the convergence analysis:Are the dynamical characteristics of the original system protected by the numerical scheme [Mickens (2005)]? In the case of deterministic modelling,Euler and Runge-Kutta- usual pragmatic numerical schemes do not protect the dynamical characteristics of the initial system.Neither is it protected by stochastic Euler,stochastic Runge-Kutta and Euler Maruyama scheme which begs the question:Is there any stochastic numerical method that can protect all dynamical properties?
Our foremost persistence in this paper is to propose a method which we call stochastic nonstandard finite difference scheme (SNSFD).It is built on the model proposed by Mickens in the deterministic case [Mickens (1994,2005)].
This paper is further divided into the following segments:
In Section 2,we have given all the basic details of SDEs.Section 3 deals with the invention of stochastic models.Section 4 is dedicated to the discussion of deterministic computer virus paradigm and the points of equilibrium.In Section 5,we look for the construction of stochastic computer virus model.In Section 6,different stochastic numerical schemes’ outcomes are compared with deterministic results.Finally,in Section 7,we will reach our deduction and provide our forthcoming work.
Einstein gave the idea of stochastic differential equations in (1905) [Gard (1988);Karatzas and Shreve (1991);Platen (1991);Mickens (2005);Allen (2007);Britton (2010)].These days the stochastic differential equations are catching much attention because of their growth in systems of our daily life.One of the reasons for their growth is that the ODEs (Ordinary Differential Equations) do not support randomness and stochastic ideas.A stochastic calculus distributes a mathematical constituent for the manner of SDEs.Generally,the stochastic differential equation with continuous time t and variable Ctcan be written as

moreover,the integral form is

The differential Eq.(1) is termed as the Ito stochastic differential equation.Here u(t,Tt) and v(t,Tt) are the drift coefficient and diffusion coefficient.The casual variable at an instant tois utilised as an initial value.An outcome Ttof equation one and two is known as a stochastic process.
Epidemics are usually twisted by non-linear systems pragmatic through patchy noisy data.There are two types of epidemic models as deterministic and stochastic models.The deterministic epidemic models do not preserve the natural uncertainty of virus dynamics,but the idea of stochastic epidemic models preserves all types of the uncertainty of virus dynamics.Deterministic epidemic models can be diffused to stochastic epidemic models by numerous conducts [Allen,Allen,Arciniega et al.(2008)].Ito SDEs did the stochastic epidemic modelling.The theme of Ito SDEs gives a more convenient way to study the stochastic epidemic models.The idea of the Ito stochastic differential equation can be pronounced by methods such as parametric and non-parametric perturbations.In the former technique,we select a parameter from the model and transform it into the model’s random variables.In the latter,we propose the Brownian motion in each differential equation (or propose the extra stochasticity parameter).In comparison,the non-parametric perturbation is more convenient by Allen [Karatzas and Shreve (1991);Platen (1991);Allen and Burgin (2000);Holt,Davis and Leirs (2006);Allen (2007);Britton (2010)].We will simulate the way of non-parametric perturbation into deterministic epidemic models and will check its efficacy by using different numerical models on stochastic epidemic models.Here,the idea is to examine the relationship between deterministic and stochastic models.
Figures and tables should be inserted in the text of the manuscript.
Here,we consider the deterministic computer virus model [Peng,He,Huang et al.(2013)].Let at any non-specific time t ,the defined variables are S (t)(exemplifies susceptible computers’ fraction),E (t) (exemplifies exposed computers’ fraction),I (t)(exemplifies infected computers’ fraction) and R (t)(exemplifies recovered computers’ fraction).The communication dynamics of computer virus model is illustrated below.

Figure 1:Flow map of computer virus model
The parameters of model are pronounced as p (pronounces the susceptible computer recovery rate under the influence of antivirus capability),N (pronounces the external computers connection rate to the network),β1(pronounces the susceptible computers contact rate to the infected computer,which ultimates their transformation to exposed status.However the computer has not crashed),β2(pronounces the susceptible computers contact rate to exposed computer,which results its transformation to exposed status),μ (pronounces the withdrawn computer rate from the network),k (pronounces the exposed computer recovery rate in network,under the influence of anti-virus capability) α (pronounces the exposed computer rate that cannot be treated by anti-virus software and crashed),r (pronounces the infected computers recovery rate that are treated).
The governing equations of the computer virus model as follows:

with conditions S(t)≥0,E(t)≥0,I(t)≥0,R(t)≥0
The reduced form of computer virus model is

Given below are two ways of equilibrium point to categorize the steady states of computer virus model (3) as shadows:
where,

Note that C?is the reproductive number of the computer virus model (5).It has an important part in virus dynamics.If C?<1 then this helps us to control the virus and if C?>1 then this will be an alarming situation of virus in the computer population.
Let C(t)=[S(t),E(t),I(t)]Ttformulates the SDEs of computer virus model (1).We want to calculate the expectations E?[?C] and E?[?C?CT].In order to find them the likely changes and their related transition probabilities are in the following table (Tab.1).

Table 1:Possible changes in the process for the computer virus model (5)
The expectation of computer virus model (5) is defined as

The variance of the computer virus model is defined as Var= E?[?C?CT]=

where,

The SDE satisfy the diffusion processes,therefore,


with initial conditions C(0)=Co=[50,40,20]T,0 ≤t ≤C and B(t) is the Brownian motion.
The Euler Maruyama scheme [Maruyama (1955)] to determine the numerical result of SDE (6) by using the parameters values given in literature [Peng,He,Huang et al.(2013)] (Tab.2).

Table 2:Values of Parameter [Peng,He,Huang et al.(2013)]
The Euler Maruyama scheme of stochastic differential Eq.(6) shadows:

where ‘?t ’ is the time step size.The confidence interval holds the solution to stochastic differential equations for both equilibriums as presented in the above numerical experiments.The solution of deterministic computer virus model for the virus-free symmetry V1?=(96.15,0,0) and the procreative number C?=0.2858 <1 helps us to control this virus in the computer population.The endemic equilibrium E1?=(1.2573,48.3787,0.7803) and the reproductive number C?=76.4791 >1 shows that the virus is endemic in the computer population.The graphical behaviour of Euler Maruyama scheme for both virus-free equilibrium and endemic equilibrium at different sub-computers as shown in Fig.2.


Figure 2:Comparison in solutions of euler maruyama and deterministic (a) Susceptible computers fraction at VFE Point for h=0.1 (b) Susceptible computers fraction at VFE Point for h=4 (c) infectious computers fraction at EE Point for h=0.01 (d) infectious computers fraction at EE Point for h=0.1
An additional way to establish the stochastic differential equations from the deterministic ordinary differential equations is to instigate the non-parametric perturbation in every single differential equation of computer virus model (5) as shadows [Raza,Arif and Rafiq (2019)]:

with initial conditions C(0)=[S(0),E(0),I(0),]T=[50,40,20]Twhere σ1,σ2,and σ3is casualness of each cubicle of the computer virus model and Bj(t),(j=1,2,3) are the sovereign Brownian gestures.This type of computer virus model does not have a specific result because of a non-differentiability span of Brownian gesture.For this,we shall introduce the new stochastic numerical methods.
5.2.1 Stochastic Euler scheme
The designed form of stochastic Euler scheme for the model (7) as shadows [Raza,Arif and Rafiq (2019)]:

We pretend the solutions of the model (8) by using the Matlab database and parameters values assumed in Peng et al.[Peng,He,Huang et al.(2013)] (Tab.2) and h is any time step size.

Figure 3:Comparison in solutions of stochastic euler and deterministic (a) Susceptible computers fraction at VFE Point for h=0.01 (b) Susceptible computers fraction at VFE Point for h=2 (c) Exposed computers fraction at EE Point for h=0.01 (d) Exposed computers fraction at EE Point for h=2 (e) Infectious computers fraction at EE Point for h=0.01 (f) Infectious computers fraction at EE Point for h=2
5.2.2 Stochastic runge-kutta scheme
The designed form of stochastic runge-kutta scheme for the model (7) as shadows [Raza,Arif and Rafiq (2019)]:
First Stage

Second Stage

Third Stage
Fourth Stage

Final Stage

We pretend the solutions of the model (9) by using the Matlab database and parameters values assumed in Peng et al.[Peng,He,Huang et al.(2013)] (Tab.2) and h is any time step size.


Figure 4:Comparison in solutions of stochastic runge kutta and deterministic (a) Susceptible computers fraction at VFE Point for h=0.01 (b) Susceptible computers fraction at VFE Point for h=3 (c) Exposed computers fraction at EE Point for h=0.01 (d) Exposed computers fraction at EE Point for h=3 (e) Infectious computers fraction at EE Point for h=0.01 (f) Infectious computers fraction at EE Point for h=3
5.2.3 Stochastic NSFD scheme
The recommended frame works of SNSFD for the model (7) as shadows [Raza,Arif and Rafiq (2019)]:

We pretend the solutions of the model (8) by using the Matlab database and parameters values assumed in Peng et al.[Peng,He,Huang et al.(2013)] (Tab.2) and h is any time step size.
5.2.4 Stability Analysis
We consider the suggested framework of stochastic NSFD scheme as follows:

We define,The Jacobian matrix as follows:

By using the virus-free equilibriumwe have

The eigen value of the Jacobean matrix as follows:

Because the stochasticity like as σ1,σ2,and σ3is small noise disturbance with Brownian motions Bj(t),(j=1,2,3) in each compartment of the computer virus model.So,each stochastic term σj.(j=1,2,3)<a,where the parameter a is the sum of the recovery rate of susceptible computer due to the antivirus ability of network and rate of computer removed from network [Peng,He,Huang et al.(2013)].

A=Trace of the Jacobean matrix.
B=The determinant of the Jacobean matrix.



(i).1+ C1+ C2>0

where “h” is any step size and always positive.
(ii).1- C1+ C2>0

where “h” is any step size and always positive.
(iii).C2<1

This condition is always valid [Peng,He,Huang et al.(2013)].So,the suggested framework of stochastic nonstandard finite difference method is locally asymptotical stable (LAS).


Figure 5:Comparison in solutions of stochastic NSFD and deterministic (a) Susceptible computers fraction at VFE Point for h=0.1 (b) Susceptible computers fraction at VFE Point for h=100 (c) Exposed computers fraction at EE Point for h=0.1 (d) Exposed computers fraction at EE Point for h=100 (e) Infectious computers fraction at EE Point for h=0.1 (f) Infectious computers fraction at EE Point for h=100
The Euler Maruyama scheme meets the factual steady states of the computer virus model whereas Fig.2,also illustrates that a deterministic outcome is the mean of Euler Maruyama outcome for h=0.01 at different sub-computer fractions respectively.In Fig.2,if we enlarge the time step size,the Euler Maryuama scheme is unable to keep boundedness and positivity for virus free equilibrium and endemic equilibrium at different sub-computer fractions.Consequently,for any time step size,Euler Maryuama scheme fails to work.
Fig.3 depicts that the stochastic Euler scheme converges the factual steady states equilibrium whereas the mean of the stochastic Euler solution is the deterministic outcome for discretization h=0.01 at different sub-computer fractions.In Fig.3,if we enlarge time step size,the stochastic Euler scheme is unable to keep positivity and boundedness for virus free and endemic equilibrium at different sub-computer fractions as well.Ultimately for obtaining the solutions of stochastic computer virus model the stochastic Euler scheme is not a reliable method.
Fig.4 represents that the stochastic Runge-Kutta scheme converges the virus-free equilibrium and endemic equilibrium whereas the mean of the stochastic Runge-Kutta solution is the deterministic outcome for discretization h=0.01 at different sub-computer fractions respectively.In Fig.4,if we enlarge the time step size,the stochastic Runge-Kutta scheme is unable to keep boundedness and positivity for virus free equilibrium and also for endemic equilibrium at different sub-computer fractions.Finally,the stochastic Runge-Kutta scheme fails for any time step size.Hence aforesaid stochastic schemes do not support all dynamical properties [Mickens (1994,2005)].
In Fig.5,we have concluded that the stochastic NSFD scheme converges both virus free equilibrium and endemic equilibrium whereas the mean of stochastic NSFD solution is the deterministic outcome for any discretization like h=0.1 and h=100 at different subcomputer fractions respectively.Hence the stochastic NSFD scheme supports all dynamical properties like dynamical consistency,boundedness and positivity characterised by Mickens in a stochastic milieu.The projected framework stochastic NSFD scheme has successfully worked for any time step size.
For comprehending computer virus dynamics incorporating protection against virus,the stochastic epidemic model is a more beneficial approach in contrast to the deterministic epidemic model in terms of numerical analysis.The Euler Maruyama scheme,stochastic Euler scheme and stochastic Runge-Kutta scheme converge right equilibrium points,but for very little time step size.Those above stochastic numerical schemes diverge and lose dynamical properties.However,as we increase the time,these schemes diverge and fail to obey the above-mentioned dynamical properties.The suggested structure of (SNSFD) of computer virus model performs for any time step size defined by Mickens [Mickens (1994,2005)] in the stochastic framework.This framework (SNSFD) is appropriate for all nonlinear and complex stochastic epidemic models.The deterministic ODEs outcomes and the stochastic outcomes are quite close to each other.The stochastic model's study shows a crucial part of virus dynamics.We have detected that stochastic models are more practical rather than deterministic epidemic models.For forthcoming work,we shall extend this stochastic analysis on all types of complicated computer virus models.The proposed (SNSFD) can be executed to the complicated stochastic diffusion and stochastic delay epidemic models.Moreover,in the extension of fractional order dynamical system [Jajarmi and Baleanu (2018);Jajarmi,Baleanu,Bonyah et al.(2018)],the proposed numerical analysis of this work might also be used.We plan to construct an authentic numerical scheme for the fractional order stochastic epidemic model for different viruses.
Acknowledgement:We would like to thank the referees for their valuable comments,and also the authors are grateful to Vice Chancellor,Air vice Marshal Faaiz Amir (Retd.),Air University,Islamabad and Dr Raheel Qamar,Rector COMSATS University,Islamabad,Pakistan for providing excellent research environment and facilities.
Declaration of conflicting interests:We have no competing interest for this article.
Computer Modeling In Engineering&Sciences2019年8期