 Research
 Open Access
 Published:
Modeling the spread of computer virus via Caputo fractional derivative and the betaderivative
Asia Pacific Journal on Computational Engineering volume 4, Article number: 1 (2017)
Abstract
The concept of information science is inevitable in the human development as science and technology has become the driving force of all economics. The connection of one human being during epidemics is vital and can be studied using mathematical principles. In this study, a wellrecognized model of computer virus by Piqueira et al. (J Comput Sci 1:31−34, 2005) and Piqueira and Araujo (Appl Math Comput 2(213):355−360, 2009) is investigated through the Caputo and betaderivatives. A less detail of stability analysis was discussed on the extended model. The analytical solution of the extended model was solved via the Laplace perturbation method and the homotopy decomposition technique. The sequential summary of each of iteration method for the extend model was presented. Using the parameters in Piqueira and Araujo (Appl Math Comput 2(213):355−360, 2009), some numerical simulation results are presented.
Background
The idea of computer virus came into being around 1980 and has continued threatening the society. During these early stages, the threat of this virus was minimal [1]. Modern civilized societies are being automated with computer applications making life easy in the areas such as education, health, transportation, agriculture and many more. Following recent development in complex computer systems, the trend has shifted to sophisticate dynamic of computer virus which is difficult to deal with. In 2001, for example, the cost associated with computer virus was estimated to be 10.7 United State dollars for only the first quarter [1]. Consequently, a comprehensive understanding of computer virus dynamics has become inevitable to researchers considering the role played by this wonderful device. To ensure the safety and reliability of computers, this virus burden can be tackled in twofold: microscopic and macroscopic [2−6].
The microscopic level has been investigated by [3], who developed antivirus program that removes virus from the computer system when detected. The program is capable of upgrading itself to ensure that new virus can be dealt with when attacks computer. The characteristics of this program are similar to that of vaccination against a disease. They are not able to guarantee safety in computer network system and also difficult to make good future predictions. The macroscopic aspect of computer has seen tremendous attention in the area of modeling the spread of this virus and determining the longterm behavior of the virus in the network system since 1980 [4]. The concept of epidemiological modeling of disease has been applied in the study of the spread of computer virus in macroscopic scale [6−8].
Possibly reality of nature could be well understood via fractional calculus perspective. A considerable attention has been devoted to fractional differential equations by the fact that fractionalorder system is capable to converge to the integerorder system timely. Fractionalorder differential equations’ applications in modeling processes have the merit of nonlocal property [9–11]. The model proposed in [10] is a deterministic one and fails to have hereditary and memory effect and therefore, cannot adequately describe the processes very well.
In this paper, we present the fractionalorder derivative and obtain analytic numeric solution of the model presented in [10]. The rationale behind the application of fractional derivatives can also be ascertained from some of the current papers published on mathematical modeling [12–16]. In addition to this, the practical implication of fractional derivative can be established in [17].
Model formulation
In this study, we take into account the model proposed by [10]. In their study, the total population of this model is denoted by T which is subdivided into four groups. S denotes the noninfected computers capable of being infected after making contact with infected computer. A is the kind of computers noninfected equipped with antivirus. I denotes infected computers capable of infecting noninfected computers and R deals with removed ones due to infection or not. The recruitment rate of computers into the noninfected computers’ class is denoted by N and \(\mu\) is the proportion coefficient for the mortality rate which is not attributable to the virus. \(\beta\) is the rate of proportion of infection as a result of product of SI. The conversion of susceptible computer into antidotal is the product of SI denoted by \(\alpha _{SA}\). The proportion of converting infected computers into antidotal ones in the network is the product of SA denoted by \(\alpha _{IA}\). The rate of removed computers being converted into susceptible class is represented by \(\sigma\) and \(\delta\) denotes the rate at which the virus rate computers useless and remove from the system.
The mathematical model under consideration here is given as:
Here, the recruitment rate is taken to be \(N=0,\) indicating that there is no new computer entering into the system during the propagation of the virus. This is because in reality the transfer of virus is faster than adding new computers into the system. The same reason can assign to the choice of \(\mu =0\), taking into account the fact that the computer outmodedness time is longer than the time of the virus action being manifested. Accordingly, equation system (1) is reformulated as follows:
In this paper, we shall fully explore the concept of fractional derivatives and other current proposed derivatives, and in this study, we shall examine this model in the context of fractional derivatives as well as the betaderivatives. Consequently, Eq. (2) can be transformed into the following:
where \(_0^A D_t^\alpha\) represents the Caputo derivative or the new derivative called betaderivative. In the next section, some background on the use of fractional and betaderivatives will be presented. The basic aim of this study is to explore both fractional and betaderivatives for modeling epidemiological problem in computers. The fractional derivatives are noted for nonlocal problems and maybe appropriate for epidemiological issues. The fractional order, however, is an indispensable tool for numerical simulations, and therefore, a local derivative with fractional order is presented in this study to model the propagation of computer virus in a network.
This provides the invariance of \(\Omega\) as to be determined. We conclude from this theorem, that it is sufficient to deal with the dynamics of (1) in \(\Omega\). In this respect, the model can be assumed as being epidemiologically and mathematically wellposed [18].
Basic concept about the betaderivative and Caputo derivative
Definition 1
Let f be a function, such that, \(f:\left[ {a,\infty } \right) \rightarrow \mathbb {R}.\) Then, the betaderivative is expressed as follows:
for all \(x \geqslant a,\beta \in \left( {0,1} \right] .\) Then if the limit of the above exists, it is said to be betadifferentiable. It can be noted that the above definition does not depend on the interval stated. If the function is differentiable, then definition given at a point zero is different from zero.
Theorem 1
Assuming that \(g \ne 0\) and there are two functions betadifferentiable with \(\beta \in \left( {0,1} \right] ;\) then, the following relations can be presented:

1.
\(_0^A D_x^\alpha \left( {af(x) + bg(x)} \right) = a_0^A D_x^\alpha \left( {f(x)} \right) + b_0^A D_x^\alpha \left( {f(x)} \right)\) for all a and b being real numbers,

2.
\(_0^A D_x^\alpha (c) = 0\) for c any given constant,

3.
\(_0^A D_x^\alpha \left( {f(x)g(x)} \right) = g(x)_0^A D_x^\alpha \left( {f(x)} \right) + f(x)_0^A D_x^\alpha \left( {g(x)} \right)\)

4.
\(_0^A D_x^\alpha \left( {\frac{{f(x)}}{{g(x)}}} \right) = \frac{{g(x)_0^A D_x^\alpha \left( {f(x)} \right)  f(x)D_x^\alpha \left( {g(x)} \right) }}{{g^2 x}}\)
The proofs of the above relations are identical to the one in [19].
Definition 2
Assuming that \(f:\left[ {a,\infty } \right) \rightarrow \mathbb {R}\) be a function in a way that f is differentiable and also alphadifferentiable. Assume g be a function defined in the range of f and also differentiable, then we obtain the following rule:
The above operator is referred to as the inverse operator of the proposed fractional derivative. We shall present the principle behind this statement using the following theorem.
Theorem 2
\(_0^A D_x^\alpha \left[ {_0^A I_x^\beta f(x)} \right] = f(x)\) for all \(x \geqslant a\) with f a given continuous and differentiable function.
Definition 3
The Caputo fractional derivative of a differentiable function is expressed as:
The properties behind the use of the Caputo derivative can be established in [14–16, 19]. Given all the information discussed, we shall introduce in the subsequent section the analysis of this model.
Analysis of the mathematical model
This section is devoted to discuss the stability analysis of the model. The diseasefree equilibrium and endemic equilibrium points are established. To determine the equilibria points, we make an asumption that the system does not depend on time; hence,
Solving the above system, we obtain
Hence, the diseasefree equilibria are given as:
The stability analysis of this model has been extensively dealt with in [10]. The next section will be concentrated on an approximate solution based on the two analytical techniques for each situation.
Analysis of approximate solutions
One of the most challenging tasks in nonlinear fractional differential equation systems is probably how to obtain exact analytical solutions. This accounts for the reasons why in recent times, a lot of attention has been devoted in the quest for obtaining techniques that can ensure asymptotic solutions in such situations. We shall make reference to some of the recent techniques on this subject which are efficient and effective and have been widely used; for instance, the decomposition method [12], Sumudu homotopy perturbation method [20], the Adomian Decomposition method [11, 21], homotopy perturbation method [19, 22, 23], the homotopy Laplace perturbation method [24], and the homotopy. In this study however, we shall make use of two of these stated techniques, specifically the Laplace homotopy perturbation method and the homotopy decomposition method. The homotopy decomposition method will be employed to provide solution to the model with the betaderivative, followed by the Laplace homotopy perturbation method which will be used to solve the system with Caputo derivative.
Solution with the Laplace homotopy perturbation method
This form was initially proposed in [18], and has been also employed in various scientific researches. We shall explore the methodology for obtaining solution to system (3) with the Caputo fractional derivative in this section:
Applying the Laplace transform operator on both sides of the above system, we obtain the following:
The Laplace variable is denoted by \(\tau{\rm s}\). Further, the inverse Laplace transform is applied on both sides of the system to yield
Following the system above, we shall make an assumption that a solution can be obtained in the form of series as follows:
Conversely, substituting the above solution in system (11) and adding the embedding parameter \(p \in \left( {0,1} \right] ,\) bringing all the terms of the same power of the embedding parameter p together, we have
In broadspectrum, we shall obtain the following system of iteration formulas (15):
The above general rule can be simplified in the following algorithm steps:

Algorithm 1. This technique can be employed to obtain a special solution to system (2) via a Caputo fractional derivative

Input \(p^0:\left\{ \begin{array}{l}S_0 (t) = S(0) \\ I_0 (t) = I(0) \\ R_0 (t) = R(0) \\ A_0 (t) = A(0) \quad \\ \end{array} \right.\) as initial input,

\(j\)number terms in the rough computation,

Output: \(\left\{ {\begin{array}{*{20}l} {S_{{{\text{appr}}}} (t) = S(0)} \hfill \\ {I_{{{\text{appr}}}} (t) = I(0)} \hfill \\ {R_{{{\text{appr}}}} (t) = R(0)} \hfill \\ {A_{{{\text{appr}}}} (t) = A(0),} \hfill \\ \end{array} } \right.\quad {\text{the estimated solution}}\).
$$\begin{aligned} {\text{Step}}\mathrm{{ }}1:{\text{Put}}\left\{ \begin{array}{l} S_0 (t) = S(0) \\ I_0 (t) = I(0) \\ R_0 (t) = R(0) \\ A_0 (t) = A(0) \\ \end{array} \right. \mathrm{{ }}\quad {\text{and}}\quad\mathrm{{ }}\left\{ \begin{array}{l} S_{{\rm appr}} (t) = S(0) \\ I_{{\rm appr}} (t) = I(0) \\ R_{{\rm appr}} (t) = R(0) \\ A_{{\rm appr}} (t) = A(0) \\ \end{array} \right. = \mathrm{{ }}\left\{ \begin{array}{l} S_0 (t) = S(t) \\ I_0 (t) = I(t) \\ R_0 (t) = R(t) \\ A_0 (t) = A(t), \\ \end{array} \right. \end{aligned}$$(20)Step 2: For \(j = 1\) to \(n1\) do step 3, step 4 and step 5:
$$\begin{aligned} \left\{ \begin{array}{l} S_1 (t) = \ell ^{  1} \left\{ {\frac{1}{{\tau ^\alpha }}\ell \left( {  \alpha _{AS} S_0 A_0  \beta S_0 I_0 + \sigma R_0 } \right) } \right\} \\ I_1 (t) = \ell ^{  1} \left\{ {\frac{1}{{\tau ^\alpha }}\ell \left( {\beta S_0 I_0  \alpha _{AI} A_0 I_0  \delta I_0 } \right) } \right\} \\ R_1 (t) = \ell ^{  1} \left\{ {\frac{1}{{\tau ^\alpha }}\ell \left( {\delta I_0  \sigma R_0 } \right) } \right\} \\ A_1 (t) = \ell ^{  1} \left\{ {\frac{1}{{\tau ^\alpha }}\ell \left( {\alpha _{AS} S_0 A_0 + \alpha _{AI} A_0 I_0 } \right) } \right\} \\ \end{array} \right. \end{aligned}$$(21)Step 3: Compute
$$\begin{aligned} \left\{ \begin{array}{l} S_n (t) = \ell ^{  1} \left\{ {\frac{1}{{\tau ^\alpha }}\ell \left( {  \alpha _{AS} \sum \limits _{j = 0}^{n  1} {A_{(n  j  1)} } S_j A_j  \beta \sum \limits _{j = 0}^{n  1} {I_{\left( {n  j  1} \right) } } S_j + \sigma R_{\left( {n  1} \right) } } \right) } \right\} \\ I_n (t) = \ell ^{  1} \left\{ {\frac{1}{{\tau ^\alpha }}\ell \left( {\beta \sum \limits _{j = 0}^{n  1} {I_{\left( {n  j  1} \right) } } S_j  \alpha _{AI} \sum \limits _{j = 0}^{n  1} {I_{\left( {n  j  1} \right) } } A_j  \delta I_{\left( {n  1} \right) } } \right) } \right\} \\ R_n (t) = \ell ^{  1} \left\{ {\frac{1}{{\tau ^\alpha }}\ell \left( {\delta I_{\left( {n  1} \right) }  \sigma R_{\left( {n  1} \right) } } \right) } \right\} \\ A_n (t) = \ell ^{  1} \left\{ {\frac{1}{{\tau ^\alpha }}\ell \left( {\alpha _{AS} \alpha _{AS} \sum \limits _{j = 0}^{n  1} {A_{(n  j  1)} } S_j A_j + \alpha _{AI} \sum \limits _{j = 0}^{n  1} {I_{\left( {n  j  1} \right) } } A_j } \right) } \right\} \\ \end{array} \right. \end{aligned}$$(22)Step 4: Compute
$$\begin{aligned} \left\{ \begin{array}{l} S_{\left( {m + 1} \right) } (t) = B_m (t) + S_{({\rm appr})} (t) \\ I_{\left( {m + 1} \right) } (t) = B_m (t) + I_{({\rm appr})} (t) \\ R_{\left( {m + 1} \right) } (t) = K_m (t) + R_{({\rm appr})} (t) \\ A_{\left( {m + 1} \right) } (t) = K_m (t) + A_{({\rm appr})} (t) \\ \end{array} \right. \end{aligned}$$(23)Step 5: Compute
$$\begin{aligned} \left\{ \begin{array}{l} S_{\left( {{\rm appr}} \right) } (t) = S_{{\rm appr}} (t) + S_{(m + 1)} (t) \\ I_{\left( {{\rm appr}} \right) } (t) = I_{{\rm appr}} (t) + I_{(m + 1)} (t) \\ R_{\left( {{\rm appr}} \right) } (t) = R_{{\rm appr}} (t) + R_{(m + 1)} (t) \\ A_{\left( {{\rm appr}} \right) } (t) = A_{{\rm appr}} (t) + A_{(m + 1)} (t) \\ \end{array} \right. \end{aligned}$$(24)Stop.
The above algorithm shall be applied to obtain the unique solution of system (3) via the Caputo derivative. We shall explore the situation where the betaderivative is used and this will be discussed in “Basic concept about the betaderivative and Caputo derivative” section.
Solution with the homotopy decomposition method
This method is explored here to obtain a special solution to system (3) with the betaderivative. The reason is that using the Laplace transform on this derivative does not guarantee desirable results. The inverse operator of this derivative, however, can be applied which is termed as the betaintegral, and this helps to convert the ordinary differential equation into an integral equation in a way that the concept of homotopy can be applied. Consequently, taking the inverse operator on both sides of system (2), we have the following system of integral equations:
where
Additionally, we shall make an assumption that a solution of the above can be derived in a form of series as follows:
Conversely, substituting the above solution in system (15) and adding the embedding parameter \(p \in \left( {0,1} \right] ,\) bringing all the terms of the same power of the embedding parameter p together, we have
In broad sense, we shall have the ensuing system of iteration formulas:
The above embellishment can be taken up in the succeeding procedure.
Input \(\left\{ {\begin{array}{*{20}l} {S_{0} (t) = S(0)} \\ {I_{0} (t) = I(0)} \\ {R_{0} (t) = R(0)} \\ {A_{0} (t) = A(0)} \\ \end{array} } \right.\quad {\text{as initial input}}\),
\(j\)number terms in the rough computation,
Output:\(\left\{ \begin{array}{l}S_{{\rm appr}} (t) \\ I_{{\rm appr}} (t) \\ R_{{\rm appr}} (t) \\ A_{{\rm appr}} (t) \quad\\ \end{array} \right.\) the estimated solution.
Step 1:
Step 2: For \(J1\) to \(n1\) do step 3, step 4 and step 5:
Step 3: Compute:
Step 4: Compute:
Step 5: Compute:
Numerical results
We shall employ both Algorithms 1 and 2 to obtain an approximate solution of system (3) via the Caputo fractional derivative and the betaderivative methods.
With the Caputo fractional derivative
In this part, Algorithm 1 is applied to obtain an approximation solution of system (3):
With the betaderivative
Algorithm 2 is used to derive the following series solutions:
Numerical simulations
In this section, we use parameters in [10], to obtain numerical simulation on illustration of the approximate solutions based on function of time as well as alpha. The parameter values used are \(\alpha _{AS} = 0.6,\) \(\alpha _{IA} = 0.4\), \(\beta =0.2\), \(\sigma = 0.85\), \(\delta = 0.40\) and with the following initial conditions \(S(0) = 100\), \(I(0) = 10\), \(R(0) = 5\) and \(A(0) = 20.\)
Figures 1, 2, 3, 4, 5, 6, 7 and 8 depict the graphical representations of system (3). It is clearly seen from the graph that susceptible class which also represents the total population get quickly infected due to how fast the virus spread with the system. It is obvious in the above figures that the total number of infected computers decreased as the total number of antidotal increased which is a strategy to reduce the number of susceptible computers. The numerical predictions (Figs. 1, 2, 3, 4, 5, 6, 7, 8) are also attributable to fractional order of beta. Realistically, when the beta is above 0.5, the nonrealistic prediction is attained. As the beta value increases above 0.5, it appears that anodotal computers exceed the entire initial population. Thus, there exists unrealistic prediction. The best option to secure more computers is put antivirus on both infected and susceptible computers to avoid disaster and huge cost. This is achieved when the beta value is <0.5 as observed in (Figs. 4, 5, 6, 7, 8). It is not surprising, given the potential danger of anti virus in a computer system because the entire initial population ends up in that compartment. It is remarkable to note that when beta is 1 we obtain the ordinary derivative which implies the model ordinary derivative and hardly give good predictions. The newly introduced betacalculus, however, has the potential of vividly describing a given physical problem. The obtained Figs. 1, 2, 3, 4, 5, 6, 7 and 8 is far better and accurate as compared to those obtained in [17]. This work has given better predictions as shown in Figs. 1, 2, 3, 4, 5, 6, 7 and 8 which is not the case of integer order in [17].
Conclusions
The concept of betaderivative and Caputo fractional derivative has assisted in investigating the spread of computer virus in a system. This computer virus has been found all over the world where computers are available and causing major financial losses to many establishments. It is worthy to note that the definition of fractional derivative is associated with the convolution of the derivative of a given function with its function power. Convolution is applied to many branches of engineering including image processing as a filter. Fractional derivative, however, in epidemiology serves a memory capable of tracing the spread from beginning to the infected individual. For betaderivative which ranges between fractional order and local derivative, the spread of computer virus at local level is identified with a given fractional order. In this study, two distinct concepts of derivatives are employed to investigate the spread of computer virus. The proposed model based on the methodology used was solved iteratively. The numerical simulation results depict that the prediction is based on the fractional order of beta. Simply when beta is close to 1, we obtain nonrealistic prediction which is not the case in [10] and when beta is ≤0.5, a good prediction is attained. Since it is the desire of any institution to have their computers with virus free, the initial computers at the end of the simulation moved into Anodotal section when beta is <0.5 as observed in Figs. 4, 5, 6, 7 and 8. It worthy to notice that when beta is 1, we have ordinary differential derivative cases for both derivatives which do not provide a good prediction. Thus, with the newly introduced, betacalculus has the potential of providing a vivid account of physical problem more precisely.
References
 1.
Denning PJ (1990) Computers under attack. AddisonWesley, New York. http://www.washtech.com/news/netarch/122671.html
 2.
Forrest S, Hofmayer SA, Somayaj A (1997) Computer immunology. Commun ACM 40(10):88–96
 3.
Kephart JO, Hogg T, Huberman BA (1989) Dynamics of computational ecosystems. Phys Rev A 40(1):404–421
 4.
Kephart JO, White SR, Chess DM (1993) Computers and epidemiology. IEEE Spectr 30(5):20–26
 5.
Kephart JO, Sorkin GB, Swimmer M (1997) An immune system for cyberspace. In: Proceedings of the IEEE international conference on systems, men, and cybernetics. IEEE, Orlando, p 879–884
 6.
Mishra BK, Saini D (2007) Mathematical models on computer viruses. Appl Math Comput 187(2):929–936
 7.
Mishra BK, Jha N (2007) Fixed period of temporary immunity after run of the antimalicious software on computer nodes. Appl Math Comput 190:1207–1212
 8.
Draief M, Ganesh A, Massouili L (2008) Thresholds for virus spread on networks. Ann Appl Probab 18(2):359–378
 9.
Piqueira JRC, Navarro BF, Monteiro LHA (2005) Epidemiological models applied to viruses in computer networks. J Comput Sci 1:31–34
 10.
Piqueira JRC, Araujo VO (2009) A modified epidemiological model for computer viruses. Appl Math Comput 2(213):355–360
 11.
Wazwaz AM (2005) Adomian decomposition method for a reliable treatment of the Bratutype equations. Appl Math Comput 166:652–663
 12.
Atangana A, Bildik N (2013) The use of fractional order derivative to predict the groundwater flow. Math Probl Eng 2013:9
 13.
Cloot A, Botha JF (2005) A generalised groundwater flow equation using the concept of noninteger order derivatives. Water SA 32(1):1–7
 14.
Atangana A, Vermeulen PD (2014) Analytical solutions of a spacetime fractional derivative of groundwater flow equation. Abstr Appl Anal 2014:11
 15.
Su W, Baleanu D, Yang X, Jafari H (2013) Damped wave equation and dissipative wave equation in fractal strings within the local fractional variational iteration method. Fixed Point Theory Appl 2013(1):1
 16.
Miller KS, Ross B (1993) An introduction to the fractional calculus and fractional differential equations. Wiley, New York
 17.
Podlubny I (2002) Geometric and physical interpretation of fractional integration and fractional differentiation. Fract Calc Appl Anal 5:367–386
 18.
Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42(4):599–653
 19.
Ganji DD, Sadighi A (2007) Application of homotopyperturbation and variational iteration methods to nonlinear heat transfer and porous media equations. J Comput Appl Math 207:24–34
 20.
Singh J, Devendra Kumar S (2011) Homotopy perturbation Sumudu transform method for nonlinear equations. Adv Appl Mech 4:165–175
 21.
Adomian G, Rach R (1993) Analytic solution of nonlinear boundary value problems in several dimensions by decomposition. J Math Anal Appl 174:118–137
 22.
Atangana A, Bildik N (2013) Approximate solution of Tuberculosis disease population dynamics model. Appl Anal 2013:1–8
 23.
Jafari H, Momani S (2007) Solving fractional diffusion and wave equations by modified homotopy perturbation method. Phys Lett A 370:388–396
 24.
Khan Y (2009) An effective modification of the Laplace decomposition method for nonlinear equations. Int J Nonlinear Sci Num Simul 10:1373–1376
Authors' contributions
All the authors have contributed equally for the production of this study. All authors read and approved the final manuscript.
Acknowledgements
The authors are thankful to the editor and reviewers for their careful reading and suggestion that greatly improved the quality of the paper.
Competing interests
The authors declare that they have no competing interests.
Author information
Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Bonyah, E., Atangana, A. & Khan, M.A. Modeling the spread of computer virus via Caputo fractional derivative and the betaderivative. Asia Pac. J. Comput. Engin. 4, 1 (2017). https://doi.org/10.1186/s4054001600191
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s4054001600191
Keywords
 Computer virus
 Caputo fractional derivative
 Betaderivative
 Antidotal
 Stability