Abstract

By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. Through qualitative analysis, the basic reproductive number is given. Furthermore, it is proved that the virus-free equilibrium is globally asymptotically stable if is less than one, whereas the viral equilibrium is globally asymptotically stable if is greater than one. Then, some numerical examples are given to demonstrate the analytical results. Finally, we put forward some efficient control measures according to the theoretical and experimental analysis.

1. Introduction

Malware is the generic term used to designate any informatics program created deliberately to carry out an unauthorized activity that, in many cases, is harmful to the system in which it has been lodged [1]. There is an increasing trend in both the number and types of malware. According to the report in [2], there is an exponential growth in the number of viruses, and in 2017, there are 15,107,232 different malware files that we had never seen before, mainly because of the improvement of technology and the increasing Internet population. Hence, there are lots of researchers trying to develop effective methods and tools to detect malware from a microperspective [35].

Although the scientific approach to combating malware is mainly focused on the design of efficient methods to detect and remove malware [6], it is also worth modeling the propagation behaviors of malware and developing effective control strategies, furthermore, to prevent its outbreak. Most of these models are dynamical systems of ordinary differential equations [7]. They are compartmental, that is, the nodes are divided into different types, such as susceptible, exposed, infectious, recovered, and quarantined. Thus, a great number of models (SIS models [8, 9], SIR models [10, 11], SEIR models [12], and SIRQ models [13]) have been proposed.

In recent years, most malware propagation models are proposed by incorporating some new compartments into the existing models. In [14], by considering the protected nodes in cloud, Gan et al. proposed an SIP model for computer virus propagation. More specifically, the protected nodes in cloud can be not infected but might be converted into an S compartment in a certain probability. Similarly, considering the devices that can be infected by the malware but cannot be damaged, an SIRC model is built in [15], where C denotes the carrier device.

On the other hand, user’s awareness also has gained a lot of attention from researchers. In [16], the authors pointed out that the missing of user awareness might cause some security issues. In [17], Furnell also claimed that phishing is a significant security threat, and the problem cannot be completely solved by technology alone; in this context, user awareness is highly required. It is no doubt that user awareness is essential for cybersecurity. Considering that user awareness also plays an important role in slowing down the propagation of malware, an improved model based on the SLIR model with user awareness has been put forward in [18]. In [18], the user whose computer is not infected or exposed is probable to install antivirus programs, and the probability here is called user awareness.

In [1], the author raised the issue that the infection rate of computers may vary from computer to computer. For example, if users are worried about security issues, the infection rate should be reduced. In contrast, if users have dangerous behaviors, the infection rate should be higher. Inspired by this, this study aims to address the issue of different infection rates of computers with/without user awareness. Different from the work in [18], a new compartment (D compartment) is incorporated into the classical SIS model. Here, D compartment denotes the group of nodes with security awareness, whereas S represents the node with dangerous behaviors. Obviously, the infection rate of D nodes is less than S nodes. Besides, in [19, 20], the author proposed S and W compartments similar to S and D compartments in this article, where the conversion rate of the two is a constant. However, we noticed that the change in user awareness is related to the number of infections. The higher the number of infections, the higher the awareness of users. So, we consider that the rate of consciousness conversion is related to the number of infections.

The main contributions of this work are as follows:(1)A new model describing computer virus propagation is built from the perspective of user awareness(2)Two equilibrium of the model is obtained: the virus-free equilibrium point and the viral equilibrium, and furthermore, their local and global stabilities are proved, respectively.(3)Through qualitative analysis and simulation experiments, effective control measures are proposed to prevent the outbreak and spread of malware

The remaining materials of this study are organized as follows: Section 2 formulates the proposed propagation model of malware. In Section 3, local stabilities of both the infection-free and viral equilibria are analyzed, respectively, while Section 4 deals with the global stabilities of the two equilibria. In Section 5, some numerical simulations are performed to illustrate the obtained theoretical results and efficient control measures. Finally, Section 6 summarizes this work and gives some shortcomings.

2. Mathematical Framework

The model proposed in this work is a compartmental model where the computers are divided into 3 classes: susceptible nodes (S) which can be infected by malware easily, nodes with user awareness (D) which can be infected by malware more difficult than S nodes, and infected nodes (I) which can infect other nodes. The transfer diagram is shown in Figure 1. The following notations and assumptions will be adopted in the sequel.

2.1. Notations

: the number of S nodes at time t: the number of D nodes at time t: the number of I nodes at time t: the total number of nodes at time t: the rate at which the node connects to the network: the rate at which the node disconnects to the network: the infection rate of S nodes caused by an I node: the infection rate of D nodes caused by an I node. Obviously, .: the conversion rate from S nodes to D nodes caused by an I node: the recovery rates of I nodes due to the effect of antivirus software

2.2. Model Assumptions

(i)All newly accessed nodes are S nodes(ii)At time t, the infection force from S to I is given by , and the infection force from D to I is given by .(iii)Due to the spread of malware, users gradually become conscious. At time t, the conversion force from S to D is given by .(iv)At time t, the users of the recovered nodes all have improved, and the recovered force of I nodes is .

2.3. Model Formulation

Considering the above assumptions, the dynamics of the model is governed by the following system of ordinary differential equations:

According to , we have . Obviously, when , . Thus, system (1) can be reduced to the following limit system:

It is easy to verify that all feasible solutions of equation (2) are bounded and finally fall inside the region defined as

Obviously, system (2) has infection-free equilibrium .

The basic reproduction number is defined as the average number of computers infected by an infected device during the period from infection. often serves as a threshold parameter that predicts whether an infection will spread. For system (2), we have

If , system (2) has a viral equilibrium :where

3. Local Stability

In this section, we will analyze the two local stabilities of the equilibria of the system.

Theorem 1. is locally asymptotically stable if . Whereas, is unstable if .

Proof. By linearizing system (2) at , we get the characteristic equation:Thus,On the one hand, all roots of equation (8) have negative real parts, and hence, is locally asymptotically stable if . On the other hand, equation (8) has at least one root with positive real, and hence, is unstable if .

Theorem 2. is locally asymptotically stable if .

Proof. By linearizing system (2) at , we get the characteristic equation:Thus,whereThe following inequality can be obtained from Section 2: . We can also obtain an equation from the second equation of system (2): .
We have and , so .
It follows from the Hurwitz [21] criterion that the two roots of (11) have negative real parts. Thus, the claimed result follows.

4. Global Stability

Theorem 2 has revealed that the equilibrium and in the system (2) are locally asymptotically stable, respectively. Then, we intend to analyze the global stability of the SID epidemic model in this section. A famous method is for determining a system whether having periodic orbits is the Bendixson–Dulac [22] criterion. The following lemma will be useful in the sequel before proving the global stability of equilibrium points.

Lemma 1. The system has no periodic orbits in for system (2).

Proof. DefineConstructing Dulac function [22],In the interior of , one can getTherefore, it follows from the Bendixson–Dulac criterion [22] that the interior of for system (2) does not contain periodic orbit.
We should take into account the boundary of after considering the interior area. Assume that an arbitrary point () is on the edge of the . After that, the following three possibilities will be discussed, respectively:(1)Case 1: when and , then(2)Case 2: when and , then(3)Case 3: when , , and , thenThus, it complies with the above three cases that there is no periodic orbit getting past () for system (2). In brief, there is no periodic orbit within for system (2). Now, the proof has been completed.
Then, we can set out to prove the equilibria and of system (2) are global asymptotically stable in corresponding conditions, respectively.

Theorem 3. is globally asymptotically stable with respect to if , whereas is globally asymptotically stable with respect to if .

Proof. With the basis of Theorems 1 and 2 and Lemma 1, according to the Poincare–Bendixson theorem [22], one can get that the equilibrium is globally asymptotically stable for system (2) with respect to if , and is globally asymptotically stable with respect to if . Now, we accomplish the proof.

Remark 1. Theorems 13 have presented a phenomenon that the malware cannot be completely suppressed if . But according to Theorem 1, some factors can also suppress the spread of malware. In another aspect, with these related parameters, the proportion of infected can be reduced. This also provides an effective direction to curb the spread of malware in computers.

5. Numerical Simulations

This section is to give some numerical simulations to verify our theoretical results.

Example 1. Consider system (1) with parameters , , , and ; then, , and some initial values are given in Table 1.
In Figure 2, is globally stable if . What is more, we can get a conclusion that the initial value has nothing to do with the global stability if .

Example 2. Consider system (1) with parameters , , , and ; then, , and the initial values of the system are kept the same as given in Table 1.
In Figure 3, is globally stable if . We can also find that the initial value has no effect on the spread of malware if . By comparing Figure 2 with Figure 3, keeping the basic reproduction number is an effective way to prevent the breakout of malware.

Example 3. We will illustrate the influence of different the awareness conversion rate  = {0.02, 0.08, 0.14, 0.20, 0.26} on system (1). Consider system (1) with parameters , , and and with initial conditions , , and .
Since user awareness plays an important role in malware propagation, Figure 4 shows time plots of the number of infected users with varied awareness conversion rates. We can find that the higher the awareness conversion rate, the smaller the number of infected users. So, raising user awareness can effectively control the number of infected users.

Example 4. Due to the importance of , we will discuss how parameters affect the evolution of malware propagation over time. The parameters are given in Table 2.
We can find that and have a positive linear relationship as shown in Figure 5. Therefore, we can keep the contact rate at a low level to prevent the spread of malware in computers effectively. and have a positive linear relationship in Figure 6. Figure 7 shows that decreases as increases. Thus, it is reasonable to reduce the online rate of the computer and increase the disconnect rate of computer when the malware spreads and breaks out. Figure 8 shows that will drop sharply if the recovery rate increased. So, installing the latest antimalware software on computers is another effective countermeasure to control the propagation of malware.

Example 5. Finally, we compare the SIS model with our proposed model through several sets of simulation experiments. The SIS model with the infection rate and the recovery rate have been proposed in [23]. Here, and . The initial conditions are , , and . The parameters are given in Table 3.
In Figure 9, we can clearly see that the final number of infected nodes in the SID model is always smaller than the corresponding number in the SIS model. So, it makes sense to improve the security awareness of users.

6. Conclusion

Inspired that user awareness plays an important role in the spread of malware, a new model based on the SIS model is proposed. Through mathematical analysis and simulation experiments, the rationality of the model is verified, and it is proposed that if we improve user awareness before malware propagation, then preventing the spread of malware will be achieved. Moreover, biological and malware models have many similar behaviors. Hence, it makes sense to compare biological and malware models. The novel coronavirus infectious disease is commonly known as COVID-19 and has become the greatest challenge in this world [24]. To study the spread of the coronavirus, there are plenty of mathematical models about COVID-19 [2527]. The model proposed in this article can also be used to describe the propagation of COVID-19. In this context, S node represents people who have not taken any measures against COVID-19, D node represents people who have taken measures against COVID-19, such as wearing a mask or staying at home, and I node represents people who have been infected and can infect others.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (61903056 and 61702066) and the Chongqing Research Program of Basic Research and Frontier Technology (cstc2019jcyj-msxmX0681 and cstc2018jcyjAX0154).