Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Applying fractional calculus to malware spread: A fractal-based approach to threat analysis

  • Nausheen Razi,

    Roles Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Software, Supervision, Validation, Visualization, Writing – original draft, Writing – review & editing

    Affiliation Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan

  • Muhammad Bilal Riaz,

    Roles Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Software, Supervision, Validation, Visualization, Writing – original draft, Writing – review & editing

    Affiliations IT4Innovations, VSB – Technical University of Ostrava, Ostrava, Czech Republic, Department of Computer Science and Mathematics, Lebanese American University, Byblos, Lebanon

  • Ambreen Bano,

    Roles Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Software, Supervision, Validation, Visualization, Writing – original draft, Writing – review & editing

    Affiliation Department of Mathematics and Statistics, Ripha International University, Islamabad, Pakistan

  • Tayyab Kamran,

    Roles Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Software, Supervision, Validation, Visualization, Writing – original draft, Writing – review & editing

    Affiliation Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan

  • Umar Ishtiaq ,

    Roles Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Software, Supervision, Validation, Visualization, Writing – original draft, Writing – review & editing

    umar.32411007@math.qau.edu.pk

    Affiliation Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan

  • Anum Shafiq

    Roles Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Software, Supervision, Validation, Visualization, Writing – original draft, Writing – review & editing

    Affiliation IT4Innovations, VSB – Technical University of Ostrava, Ostrava, Czech Republic

Abstract

Malware is a common word in modern era. Everyone using computer is aware of it. Some users have to face the problem known as Cyber crimes. Nobody can survive without use of modern technologies based on computer networking. To avoid threat of malware, different companies provide antivirus strategies on a high cost. To prevent the data and keep privacy, companies using computers have to buy these antivirus programs (software). Software varies due to types of malware and is developed on structure of malware with a deep insight on behavior of nodes. We selected a mathematical malware propagation model having variable infection rate. We were interested in examining the impact of memory effects in this dynamical system in the sense of fractal fractional (FF) derivatives. In this paper, theoretical analysis is performed by concepts of fixed point theory. Existence, uniqueness and stability conditions are investigated for FF model. Numerical algorithm based on Lagrange two points interpolation polynomial is formed and simulation is done using Matlab R2016a on the deterministic model. We see the impact of different FF orders using power law kernel. Sensitivity analysis of different parameters such as initial infection rate, variable adjustment to sensitivity of infected nodes, immune rate of antivirus strategies and loss rate of immunity of removed nodes is investigated under FF model and is compared with classical. On investigation, we find that FF model describes the effects of memory on nodes in detail. Antivirus software can be developed considering the effect of FF orders and parameters to reduce persistence and eradication of infection. Small changes cause significant perturbation in infected nodes and malware can be driven into passive mode by understanding its propagation by FF derivatives and may take necessary actions to prevent the disaster caused by cyber crimes.

1 Introduction

Malware is a program tailored to impair, interrupt or damage a computer chain or in cyberspace. Hackers use their technical skills to develop such programs for stealing important and personal information. It normally occurs in the form of a malicious code. Different types of malware propagate differently. They may self-propagate, or their propagation may be through user interactions via internet or sharing devices like Wifi/Bluetooth etc. Most known types of malware are: Virus, Worms, Adware, Spyware, Trojan, Rootkit, Backdoors, Keyloggers, Ransomware, Cookies, Sniffers, Botnet, Spam, Mobile malware [13]. The software has been developed to deal with such program or malware according to its nature. The software is usually called antivirus. It can detect and kill malware. Moreover, it may be installed in computers to act as shield against propagation of malware [4, 5].

To develop effective antivirus software against some particular malware one should know how the malware propagates and works in computers. For this purpose, Feng et al. [6] presented a model of propagation of malware through internet via three states: susceptible, infected and recovered (removed). They assumed that total numbers of nodes (computers) in a network at time σ are N(σ) along with the assumption that each node changes with respect to time in three states. They described that susceptible state (Δ) represents a node which has a weakness that the malware can easily exploit it, infected state (ℵ) shows that when it is infected it can infects its neighboring nodes and still infectious and recovered/removed state (Θ) represents that a detection tool has been installed that is used to identify and overcome a malware. Considering these definitions of states they represented the model in the form of ODES as: (1.1) where Π shows the susceptible rate of new nodes, θ shows the number of new nodes, ζ is the loss rate of immunity of the recovered nodes, μ is the replacement rate, ν is the real time immune rate of antivirus strategies, κ is the recovered rate of infected nodes, τ is the change in time, β0 is the initial infection rate and satisfies the assumptions as in [6]. The initial conditions are defined by Δ(0) = Δ0 ≥ 0, ℵ(0) = ℵ0 ≥ 0 and Θ(0) = Θ0 ≥ 0. Moreover, N(σ) = Δ(σ) + ℵ(σ) + Θ(σ) as given above.

As the time passed, due to the increase in the spread of virus and its different aspects we have to study the mathematical models in fractional calculus instead of classical. Fractional calculus is a stereotype of classical. Its concept is known since 1695 when L’Hospital asked Leibnitz about the fractional power of derivative. By replacing usual operators from classical to the fractional, we get more accurate results in many physical problems [7]. Many definitions of fractional derivatives were found [811]. Several fractional derivatives and integrals in extended form as with variable order [12, 13] were defined to solve different forms of differential equations and functions but there was a problem that these operators had singular kernel. To solve this problem, fractional operators were found without singular kernels [14, 15] and in refined form with non local as well [16]. Then more advanced papers were published in which flaws of previous papers were removed [1719].

The notion of fractional operators had not been much worthy for modeling the complex problems of real world. These complex real world problems can be based on those physical occurrences that show fractal behaviour. To handle this type of problems a nonstandard derivative was introduced [20] known as fractal derivative which scales independent variable. In [20] Atangana introduced novel concept of differentiation. The term fractal- fractional (FF) derivative was used in the paper where two concepts of fractal derivative and fractional derivative were combined. He derived fractal fractional derivatives in Caputo sense and in Riemann-Liouville sense also with three different forms of kernels mentioned above. Atangana presented the new definition of Fractal Laplace transform and then used it to solve the fractal differential equation and found corresponding integral.

Malware constitute a chaotic behaviour in the real world and it is random and unpredictable in a nonlinear rule. Phenomena of malware relates to data heterogeneities that cannot be well-defined using other forms of derivatives [21]. To study the complexity of such chaotic system, fractal fractional derivative is much better than classical one [19, 22, 23]. We find detail in [8, 20, 2428] for more details. To see the memory effect, earlier fractional derivative of variable order [12, 13] were used but recently fractal fractional orders are used to check memory effect [29]. Rezapour et al. [30] provided a theoretical and numerical analysis of two strain (FF) model of meningitis. Recently, fractal fractional derivatives with its theory and numerical aspects were applied for some most important issues like intervention measures in a mathematical model for monkeypox and COVID-19 co-dynamics [31] and for Ebola [32] and most common problem of our countries “corruption” [33]. Poria and Dhiman [34] examined existence and uniqueness theorem for ODES. Authors in [3537] worked on stability of different equations in the context of Banach spaces.

Malware is a generic issue and many authors have discussed different mathematical models to explain its extremities. Due to its complex features involving chaotic behavior, heterogeneities and memory effect, some authors tried to solve it using the concept of fractional calculus and in advance form of fractal fractional theory. Till now we have seen the models which have a simple nature. So we decided to investigate a more complex mathematical model as presented by Feng et al. This model has a variable infection rate which gives a deep insight of the behavior of malware. Moreover, infection rate is defined as a nonlinear function of infected nodes. To better understand the behavior of such type of malware and develop antivirus software to overcome the malware, we decided to deal this model by converting it into fractal fractional mathematical model with power law kernel initially. We also tried to find the impacts of different parameters on malware propagation for integer and non integer orders.

The objective of our paper was to replace ordinary derivatives with FF derivatives using kernel of power-law in model (1.1) and compare our findings with the findings of model (1.1) in [6]. We apply results from fixed point theory to establish existence, and convergence of solution of our proposed model. Moreover, we check the stability of our model. Furthermore, we generated Matlab code for our fractal fractional model which described the behavior of nodes for arbitrary values of fractional orders and fractal dimensions to better understand the propagation of malware in-detail to overcome it.

We organized this paper as: in section 2, some basic definitions and theorems are described that are useful for our work. In section 3, fractal fractional mathematical model is formulated. In section 4, this model has been formulated as fixed point problem. Then in sections 5, 6 and 7 existence, uniqueness and stability of the solution is proved by results of fixed point theory. In section 8, a numerical scheme based on two points Lagrangian interpolation is developed as this method provides more accuracy, better convergence and most of all it is simple to understand and coding is easier than other methods. Then coding is done using Matlab R2016a for different fractal and fractional orders and parameters. In section 9, simulation is discussed and in section 10, we concluded our work.

2 Preliminaries

2.1 Classical calculus

This section includes some definitions and theorems from fixed point theory and fractional calculus which are needed in the sequel. We use the following results defined in [24].

Let Ψ displays a subclass of non-decreasing operators ψ: [0, ∞) → [0, ∞) such that where ψj is the jth iterate. It satisfies the following lemma:

Lemma 2.1. [24] Every function ψ: [0, ∞) → [0, ∞) in the class Ψ satisfies the condition:

For any σ > 0,

Definition 2.2. [24] Let be a normed space and with ψ: [0, ∞) → [0, ∞) and , then F is a ϕψcontraction if for ,

Definition 2.3. [24] If and , then F is ϕ-admissible if for ,

With the help of above Definitions 2.2 and 2.3, the authors derived the following results for existence of fixed point.

Theorem 2.4. [24] Let be a complete metric space and be a ϕ-ψ-contraction mapping with the conditions:

  1. (i) F is ϕ-admissible;
  2. (ii) there exists such that ϕ(y0, Fy0) ≥ 1;
  3. (iii) if {yn} is a sequence in such that ϕ(yn, yn+1) ≥ 1 for all n and as n → ∞, implies ϕ(yn, y) ≥ 1 for all

Then, F has a fixed point.

For the existence of solution in the support of (2.4), Leray Schauder criteria is also used which is defined as:

Theorem 2.5. [25] Let be a Banach space, be a bounded and closed set in such that is convex and U be an open set in with the property 0 ∈ U, then a compact and continuous operator , shows either

  1. (a) G has a fixed point in
    or
  2. (b) there exists y ∈ ∂U and η ∈ (0, 1) s.t y = ηG(y).

Moreover, for compactness of operator, Arzela-Ascoli’s theorem is used which is defined as:

Theorem 2.6. [26] Let , . Then W is compact if and only if W is closed, bounded and equicontinuous.

2.2 Fractional calculus

Now-a-days fractal theory is most widely used to understand the behaviour of variables. To study the behaviour of a given variable with respect to a scaled variable, Chen et al. [27] defined:

Definition 2.7. Fractal derivative (earlier defined as Hausdorff derivative in [28]) of f(σ) with respect to a fractal order is

Combining the concepts of fractal differentiation and fractal derivative, a novel concept of differentiation was presented by Atangana [20] as:

Definition 2.8. Let Υ(σ) be continuous and fractal differentiable of order on (a, b). Then Riemann-liouville fractal-fractional derivative with power law kernel of Υ of order is defined as where .

He constructed fractal-fractional integral associated to fractal-fractional derivative as:

Definition 2.9. [20] Let Υ(σ) be continuous on (a, b), then fractal-fractional integral of Υ with order and taking n = 1 is

3 Conversion of classical mathematical model to fractal-fractional mathematical model

Inspired by the concepts of fractal fractional calculus, we convert classical mathematical model (1.1) in terms of fractal-fractional derivatives. So, our required model is (3.1) with the initial conditions Δ(0) = Δ0 ≥ 0, ℵ(0) = ℵ0 ≥ 0, Θ(0) = Θ0 ≥ 0, and N(σ) = Δ(σ) + ℵ(σ) + Θ(σ) for σJ = [0, T], T > 0. Also and all parameters are to be taken non-negative. Here FFP represents the term fractal-fractional derivative with power law kernel defined in [20].

4 Formulation of model as fixed point problem

In this section, we convert mathematical model of ODES (1.1) in fixed point problem. We apply results of fixed point theory on model (3.1). Consider , a Banach space and represents the class of all continuous functions with the norm defined by First, rewrite given model (3.1) as (4.1) Comparing models (3.1) and (4.1), we have (4.2) Since where from ([8]) for n = 1, we have So, model (4.2) can be written as (4.3) Hence, we get (4.4) In general, we can write model (4.4) as (4.5) where Applying fractal-fractional integral on model (4.5), using the result in ([20]), we get (4.6) Hence, we can write (4.7) So, now we can transform (3.1) into a fixed point problem.

Define an operator F: Ξ → Ξ by (4.8)

5 Existence of solution

For existence, we prove a theorem on the basis of Theorem 2.4 as in ([30]).

Theorem 5.1. Suppose that, ψ ∈ Ψ and Υ ∈ C(J × Ξ, Ξ) satisfying the following conditions:

(β1): and σJ, with and ;

(β2): such thatσJ,

(β3): with , (5.1) for every n and σ.

Hence, we say that F has a fixed point. So a solution of malware propagation model exists.

Proof. Take so that for every σJ.

Now, we take By using (β1), we deduce Now, by using the definition of norm After doing some computations and using the definition of beta function and using definition of , we get (5.2) Moreover, if we define a function ϕ: Ξ2 → [0, ∞) such that for , and zero otherwise, then for each equation (5.2) can be written as This shows that F is a ϕ-ψ-contraction.

Now, suppose that with the property that . By the definition of ϕ, we deduce and by (β2), we get and .

So, by applying definition of ϕ, we have Hence, F is ϕ-admissible. (*)

Moreover, by (β2), it can be seen that for some in Ξ, ∀σJ, we have . (**)

Now, consider with and for all n and

By definition of ϕ this implies .

Thus, by (β3) this implies

Hence, for all n. (***)

So (*), (**), (***) show the conditions of Theorem 2.4 are satisfied, so we can say that there exists some such that .

Hence, is a solution of our model.

Theorem 2.5 also establishes that solution of model exists and on basis of this model we also define the following theorem as:

Theorem 5.2. Let Ξ be a Banach space, be a bounded and closed set in Ξ and A be an open in with 0 ∈ A, then there exists a compact and continuous operator F with the conditions (β4) and (β5) from which satisfies one of the two conditions,

(a) G has a fixed point in ,

or

(b) there exists and ω ∈ (0, 1) s.t ;

where

(β4): Suppose Υ ∈ C(J × Ξ, Ξ) and there exists ϕL1(J, [0, ∞)) and BC([0, ∞), [0, ∞)) where B is an increasing function satisfying the condition for all σJ and ;

(β5): If ϕ* = supσJ|ϕ(σ)| thena no r s.t where .

Proof. Consider F: Ξ → Ξ as and for some positive ϵ.

We show that F is compact on . For this we prove that F is uniformly bounded and equicontinuous.

Since Υ is continuous, this implies F is continuous.

Now for in , we obtain and from (β4), we have after simplification of the integral, we get the beta function. So applying value of beta function and λ, we get Hence, by applying norm, we have (5.3) This implies F is uniformly bounded.

Now, for σ, σ* ∈ J such that σ < σ* and arbitrarily.

If we suppose , then that is independent from . When σ* → σ, its value becomes zero. Hence . Thus proved that F is equicontinuous. So F is compact. As F satisfies the conditions of Theorem 5.2, we say that F will satisfy either one or the other conditions mentioned in Theorem 5.2. For this using (β5), we construct where r > 0 is defined above. Hence, we can write (5.4) Assume, there exists and ω ∈ (0, 1) where .

For , ω and using (β5), we get This gives us r < r, which is impossible. Thus, condition (b) is not satisfied. Hence, by condition (a), F possesses a fixed point in .

6 Uniqueness

Now we will prove uniqueness with the help of theorems using lipschitz condition [34] along with some other conditions.

Theorem 6.1. Let and we assume that (Condition): ||Δ|| ≤ μ1, ||ℵ|| ≤ μ2, α ∈ (0, ∞), (where ||Θ|| ≤ μ4 for some μi > 0, i = 1, 2, 3, 4.

Moreover , where , and b1 > 0, b2 > 0 and b = b1b2, then Υ1, Υ2, Υ3 defined in Model 4.1 are lipschitz functions with the following values w1 = (β0 μ3 + μ + ν), w2 = (β0 μ1 b + μ + γ), w3 = (ζ + μ), where 0 < wi < 1, i = 1, 2, 3.

Proof. Considering Υ1 for each , we take Hence, Υ1 is Lipschitz with respect to Δ with w1 > 0.

Consider Υ2 for each , we take Hence, Υ2 is Lipschitz w.r.t ℵ with w2 > 0.

Considering Υ3 for each , we take Hence, Υ3 is Lipschitz with respect to Θ with w3 > 0.

Moreover, we see the uniqueness of solution in Theorem 6.2 under the condition defined in Theorem 6.1.

Theorem 6.2. If ||Δ|| ≤ μ1, ||ℵ|| ≤ μ2, ||Θ|| ≤ μ4 for some μi > 0, i = 1, 2, 3, 4 and w1 = (β0 μ3 + μ + ν), w2 = (β0 μ1 b + μ + γ), w3 = (ζ + μ), where 0 < wi < 1, i = 1, 2, 3; then our model has a unique solution if λwi < 1 for i = 1, 2, 3.

Proof. Suppose the model has two solutions (Δ(σ), ℵ(σ), Θ(σ)) and (Δ*(σ), ℵ*(σ), Θ*(σ)) with initial conditions defined above. So, we can write Take since Υ1 is considered with respect to Δ and Δ* so by Theorem 6.1 and definition of Beta function, we get Hence, This implies that (1 − λw1)||Δ(σ) − Δ*(σ)|| ≤ 0.

As λw1 < 1, so this is possible when ||Δ(σ) − Δ*(σ)|| = 0. Thus, Δ(σ) = Δ*(σ).

Similarly, we have Take since Υ2 is considered with respect to ℵ and ℵ* so by using previous result and definition of Beta function, we have Hence, we obtain

This implies that As λw2 < 1, this is possible when ||ℵ(σ) − ℵ*(σ)|| = 0. Thus, ℵ(σ) = ℵ*(σ). Also, we have Take since Υ3 is considered w.r.t Θ and Θ* so by using previous result and definition of Beta function, we have Hence, ||Θ(σ) − Θ*(σ)|| ≤ λw3||Θ(σ) − Θ*(σ)|| ⇒ (1 − λw3)||Θ(σ) − Θ*(σ)|| ≤ 0.

As λw3 < 1, this is possible when ||Θ(σ) − Θ*(σ)|| = 0. Thus Θ(σ) = Θ*(σ). That is, (Δ(σ), ℵ(σ), Θ(σ)) = (Δ*(σ), ℵ*(σ), Θ*(σ)). Hence, solution is unique.

7 Stability

In this section, we check stability of solution. We use Ulam–Hyers and Ulam–Hayers–Rassias theorems to check it. First, we define the following theorems for our model.

Definition 7.1. Model (4.1) is Ulam-Hyers stable [35], if for all ϵi > 0, there exist , which depend on Υi, i = 1, 2, 3 respectively, and for all (Δ*, ℵ*, Θ*) satisfying the inequalities (7.1) there exists (Δ, ℵ, Θ) ∈ Ξ satisfying model (4.1) with the condition (7.2)

Remark 7.2. (Δ*, ℵ*, Θ*) ∈ Ξ is a solution of model (7.1) iffηiC([0, T], [0, ∞)) such that for all σJ,

  1. (i) |ηi(σ)| < ϵi,
  2. (ii) (7.3)

Theorem 7.3. The fractal fraction model is Ulam–Hayers stable on J such that λwi < 1, where wi and λ are defined as above.

Proof. Let ϵ1 > 0 and s.t by above remark, we have (7.4) As is the unique solution, then That is Hence, we have If , then ||Δ* − Δ|| ≤ M1 ϵ1.

Similarly, we can prove that ||ℵ* − ℵ|| ≤ M2 ϵ2, and ||Θ* − Θ|| ≤ M3 ϵ3.

Thus Ulam–Hayers stability criteria is fulfilled by our fractal–fractional model.

Definition 7.4. We define the Ulam–Hayers–Rassias stability criteria for our fractal–fractional model ([36]). Model (4.1) is Ulam-Hyers–Rassias stable with respect to the functions ψi, if for all ϵi > 0, there exist Mi > 0 ∈ [0, ∞), which depend on Υi and ψi, i = 1, 2, 3 respectively and for all (Δ*, ℵ*, Θ*) satisfying the inequalities: (7.5) there exists (Δ, ℵ, Θ) ∈ Ξ satisfying model (4.1) with the conditions: (7.6)

Remark 7.5. (Δ*, ℵ*, Θ*) ∈ Ξ is a solution iffηiC(J, [0, ∞)) such that for all σJ,

  1. (i) |ηi(σ)| < ϵi ψi(σ),
  2. (ii) (7.7)

Theorem 7.6. The fractal–fractional model (4.1) is Ulam–Hayers–Rassias stable when the following conditions are satisfied for all σJ there exists nondecreasing mappings ψiC(J, [0, ∞)) and ξi > 0 depending upon ψi such that .

Proof. Let ϵ1 > 0 and such that then, by the conditions of remark 7.5, we consider As is the unique solution, then Therefore, we get Hence, we have If then, we get Similarly, we can prove that Thus, Ulam–Hayers–Rassias stability criteria is fulfilled by our fractal–fractional model.

8 Numerical algorithm

Now, we make a numerical scheme using the two–point Lagrangian interpolation formula for our fractal–fractional model as in [37]. The difference between our scheme and others is that in our model Υ1 and Υ3 depend on σ and (στ) so we deal it differently in the end.

First we take σ = σn+1 and and we get (8.1) Approximating integral as the sum of integrals on sub intervals, we have (8.2)

Now, we approximate the functions by two points Lagrange interpolation polynomials on the interval [σj, σj+1]. We can write Thus, we have (8.3) Using values of we integrate the above integrals according to limits and taking σjσj−1 = h, we get the final results. where

,

.

Since in the original model Υ1 and Υ3, Θ depends on σ and (στ) = σ1(say), so we write Υ1 = U1(σj, Δj, ℵj, Θj) + U3(σ1j, Θj) and Υ3 = U2(σj, Δj, ℵj, Θj) − U3(σ1j, Θj) where

  1. U1(σj, Δj, ℵj, Θj) = Πθβ0 f(ℵ(σ))Δ(σ) − (μ + ν)Δ(σ),
  2. U2(σj, Δj, ℵj, Θj) = (1 − Π)θ + νΔ(σ) + κℵ(σ) − μΘ(σ),
  3. U3(σ1j, Θj) = ζΘ(στ).

Hence, our numerical scheme is

9 Discussion through simulations based on numerical algorithm

In this section, we see the simulation of Δ, ℵ and Θ under the effect of several fractal-fractional orders and also the behaviour of Δ, ℵ and Θ model with respect to some parameters and compare the results of fractal-fractional model to the ordinary differential model. We take the parameters as taken for figure 2 in [6], Π = 0.5, θ = 0.8, β0 = 0.02, μ = 0.1, ν = 0.2, ζ = 0.01, κ = 0.2, τ = 7.3, α = 1 and some estimated initial conditions Δ(0) = 3, ℵ(0) = 1, Θ(0) = 0.1.

Figs 13 show the simulation of Δ, ℵ and Θ for different fractal and fractional orders separately. We can see in Fig 1, the simulation of Δ in one figure under the different fractional orders keeping fractal order one and in the other figure under different fractal orders by keeping fractional order one. We see that initially number of susceptible nodes is more at lower fractional and fractal orders. In fractal model, after 20s, this number becomes less at lower fractal order and then converges after 80s. On the other hand, in fractional model the no of susceptible nodes is more at lower fractional orders throughout the time period and it converges slowly as compared to fractal model. So, we can see that in fractal model nodes converge more quickly that means no. of susceptible nodes is less affected by previous nodes. So we can predict that it has less memory effect, less sensitivity and more stability. Similarly Fig 2 is for ℵ. It represents higher number of nodes of infected nodes at lower fractal or fractional orders in both models. However, the convergence in fractal model is rapid so we can conclude that it has less memory effect, less sensitivity and more stability. Fig 3 is for Θ. In this figure, in both models the number of removed nodes is less at lower fractional or fractal orders but in fractal model the number of nodes is more than the number of nodes in fractional model at different orders. The nodes become stable more quickly as compared to fractional model. The fractal model has less memory effect, low sensitivity to initial conditions and limited information retention. It shows the uniqueness of the solution and existence of fixed point.

thumbnail
Fig 1. Trajectories of Δ(σ) for arbitrary fractal orders when and different fractional orders when .

https://doi.org/10.1371/journal.pone.0313914.g001

thumbnail
Fig 2. Trajectories of ℵ(σ) for arbitrary fractal orders when and different fractional orders when .

https://doi.org/10.1371/journal.pone.0313914.g002

thumbnail
Fig 3. Trajectories of Θ(σ) for arbitrary fractal orders when and different fractional orders when .

https://doi.org/10.1371/journal.pone.0313914.g003

Figs 46 show the simulation of Δ, ℵ and Θ under the combined effect of arbitrary fractal and fractional orders. Fig 4 shows that as the fractal-fractional orders decrease, the number of susceptible nodes is higher at lower fractal-fractional orders and after some time it becomes stable rapidly and converges to the same limit except at order 0.80. This behavior depicts that these nodes have a higher risk of infection or perturbation. They are more sensitive to external influences, have strong memory effect and rapid stabilization. Fig 5 represents the behavior of infected nodes. The number of infected nodes first decreases then becomes stable at all fractal fractional orders. It depicts that the system has resilience to adapt infection where some nodes are still resistant and preventing further infection. Also, the number of nodes becomes zero at fractal fractional level one which describes that infection has been eradicated while at lower level of fractal fraction when no. of nodes goes on decreases but does not become zero show that the system has not been fully eradicated but also has the effect of memory which contributes to the persistence of infected nodes. In Fig 6, we see that number of removed nodes reduces as we reduce the fractal-fractional orders which are represented by and . It describes that the memory effect is less in these nodes and these nodes have high stability and fast convergence. It depicts that at lower level of fractal fraction the persistence and containment of infection is high.

thumbnail
Fig 5. Trajectories of ℵ(σ) with different orders of .

https://doi.org/10.1371/journal.pone.0313914.g005

Moreover in Fig 7, we compare Δ, ℵ and Θ model for fractal-fractional orders , as and which shows behaviour of three nodes in one figure. We can see from the comparison of nodes that at lower level of fractal fractional, memory effect is stronger and has more influence of initial conditions and previous nodes.

thumbnail
Fig 7. Comparison of Δ, ℵ, and Θ model for classical and FF model at level 0.90.

https://doi.org/10.1371/journal.pone.0313914.g007

Since in our original model, infection rate depends on initial infection rate β0 and also on a function of ℵ which depends on another variable called α. Therefore we see the impact of both variables on our fractal-fractional model too. Fig 8, first we see that in both models no. of infected nodes goes on increasing for higher initial infection rate i.e. as initial infection rate increases, no. of infected nodes also increases. It describes that outbreak is escalating and infected nodes are increasing rapidly. On the other hand, when we compare both models it shows that at lower fractal fractional order the malware spreads faster and has stronger memory effect than the integer order model.

thumbnail
Fig 8. The effect of varying initial infection rate β0 on infected nodes for classical and FF model at level 0.90.

https://doi.org/10.1371/journal.pone.0313914.g008

Also in the original model, α is used to adjust the infection rate sensitivity to ℵ. Here α = 0 means constant infection rate. According to the authors in [6], at α = 1, the scale of malware spreading is smaller than the rate at α = 0. From Fig 9 first we see that this condition is satisfied in both models. Also we observe that no. of infected nodes goes on decreasing more quickly as time passes in FF model as compared to integer order model. As a result, we can see that FF model has weaker memory effect and more stability and resilience to outbreaks in the nodes.

thumbnail
Fig 9. The effect of varying variable to adjust the infection rate sensitivity α on infected nodes for classical and FF model at level 0.90.

https://doi.org/10.1371/journal.pone.0313914.g009

In Fig 10, we see the effect of real-time immune rate on ℵ for classical and FF model. We see as we increase the immune rate, the number of infected nodes goes on decreasing in both models. As a comparison of both models, we see that no. of infected nodes is greater in FF model, which tells that in FF model nodes have stronger memory effect that enhances its sensitivity to network structure. Similarly Fig 11 shows that as the immune rate increases, no. of recovered nodes also increases in both models but in FF model this number is less than in classical model. It describes weak memory effect and decreased sensitivity in FF model.

thumbnail
Fig 10. The effect of varying real-time immune rate ν on infected nodes for classical and FF model at level 0.90.

https://doi.org/10.1371/journal.pone.0313914.g010

thumbnail
Fig 11. The effect of varying real-time immune rate ν on removed nodes for classical and FF model at level 0.90.

https://doi.org/10.1371/journal.pone.0313914.g011

Moreover, the recovered nodes lose their immunity after some time, so to see this impact we check the graphs of Δ, ℵ and Θ. We see in Fig 12 that in both models as the loss rate of immunity is increasing, no. of susceptible nodes is also increasing that describes weaker memory effect and higher sensitivity but in comparison FF model has stronger memory effect than classical one except at zero value.

thumbnail
Fig 12. The effect of varying loss rate of immunity ζ on suspected nodes for classical and FF model at level 0.90.

https://doi.org/10.1371/journal.pone.0313914.g012

In Fig 13, we see the effect of loss rate of immunity on ℵ for both models. We see as loss rate of immunity increases, the number of infected nodes goes on decreasing in both models which indicates stronger memory effect. As a comparison of both models, no. of infected nodes is greater in FF model, which tells that in FF model nodes have weaker memory effect that decrease its resilience to network structure. In Fig 14 as loss rate of immunity increases, the no. of removed nodes is also increases, it indicates that immune response is effective and has strong memory effect. When we compare both models, we see that no of removed nodes is less in FF model. Hence, we say that theses nodes have weaker memory effect in FF model as compared to classical.

thumbnail
Fig 13. The effect of varying loss rate of immunity ζ on infected nodes for classical and FF model at level 0.90.

https://doi.org/10.1371/journal.pone.0313914.g013

thumbnail
Fig 14. The effect of varying loss rate of immunity ζ on removed nodes for classical and FF model at level 0.90.

https://doi.org/10.1371/journal.pone.0313914.g014

10 Conclusion

In this paper, a deterministic mathematical model on malware propagation has been discussed in the sense of fractal fractional derivative. At first stage the classical mathematical model given in [6] has been converted in fractal fractional model with power law kernel. Initially this model was examined theoretically. Conditions for existence (Leray Schauder criteria), uniqueness (Lipschitz property) and stability (Ulam-Hyers and Ulam-Hyers-Rassias theorems) of the fractal fractional model were examined using concepts of fixed point theory. Secondly, numerical scheme was developed and simulations were performed to verify the accuracy of theoretical results.

At second stage, fractal fractional model was examined under fractal dimensions and fractional orders separately. Then combined effect of fractal dimensions and fractional orders was discussed. We observed that at lower FF orders, the number of susceptible and infected nodes was higher. It demonstrates the sensitivity to external influences, resilience to adapt infection and strong memory effects. Under combined effect, we found out that removed nodes have higher containment of infection and persistence at lower level of FF orders.

At the next stage, we compared Δ, ℵ and Θ model for classical (FF order at one) and fractal fractional model for orders . We examined the impact of different parameters such as initial infection rate, variable adjustment to sensitivity of infected nodes, immune rate of antivirus strategies and loss rate of immunity of recovered nodes of mathematical model [6] under and .

Through the graphs we find out the effect of memory on different types of nodes in system. We explore sensitivity, convergence, and stability of susceptible, infected, and removed nodes under fractal fractional model. It will help us to predict about the vulnerabilities in computer systems. Antivirus strategies can be made by developing software that may help in containment and eradication of infection in the nodes by keeping an eye on the behavior of nodes. In classical form, this model gave a clear insight that by choosing appropriate variable infection rate, the prevalence of malware can be controlled. Our fractal fractional model agrees with it. Continuing this process, we investigated the impacts of other parameters too on malware model. Our findings may be helpful in installing antivirus software in cyber security practice by keeping in view the past behaviors of previous nodes. This model is suitable for malware like red worms, Nimda, Slammer worms, and Wittyworms etc. The malware which depends on variable infection rate and time delay factor, in that case our findings will help in developing antivirus strategies keeping in mind its cost factor.

This study has some limitations. Unavailability of sufficient real data causes hurdles to investigate the results. In future, we want to explore the behavior of mathematical model with respect to different kernels and different numerical schemes and by fractional and fractal derivatives of variable order so that more effective antivirus strategies may be developed to predict outbreaks for controlling malware propagation.

References

  1. 1. Megira S, Pangesti AR, Wibowo FW. Malware analysis and detection using reverse engineering technique. InJournal of Physics: Conference Series 2018 Dec 1 (Vol. 1140, No. 1, p. 012042). IOP Publishing.
  2. 2. Tahir R. A study on malware and malware detection techniques. International Journal of Education and Management Engineering. 2018 Mar 1;8(2):20.
  3. 3. Gounder MP, Farik M. New ways to fight malware. Int. J. Sci. Technol. Res. 2017 Jun;6(06).
  4. 4. Raza A, Fatima U, Rafiq M, Ahmed N, Khan I, Nisar KS, et al. Mathematical analysis and design of the nonstandard computational method for an epidemic model of computer virus with delay effect: application of mathematical biology in computer science. Results in Physics. 2021 Feb 1;21:103750.
  5. 5. Data S, Wang H. The effectiveness of vaccinations on the spread of email-borne computer viruses. InCanadian Conference on Electrical and Computer Engineering, 2005. 2005 May 1 (pp. 219–223). IEEE.
  6. 6. Feng L, Liao X, Han Q, Li H. Dynamical analysis and control strategies on malware propagation model. Applied Mathematical Modelling. 2013 Sep 1;37(16-17):8225–36.
  7. 7. Abbas S., Benchohra M., and Vityuk A. N. (2012). On fractional order derivatives and Darboux problem for implicit differential equations. Fractional Calculus and Applied Analysis, 15(2), 168–182.
  8. 8. Oliveira EC, Machado JA. A review of definitions for fractional derivatives and integral. Mathematical Problems in Engineering. 2014 Jun 10;2014:1–7.
  9. 9. Gerasimov AN. Generalization of linear deformation laws and their application to internal friction problems. Applied mathematics and mechanics. 1948;12:529–39.
  10. 10. Caputo M. Linear models of dissipation whose Q is almost frequency independent—II. Geophysical journal international. 1967 Nov 1;13(5):529–39.
  11. 11. Kilbas AA, Srivastava HM, Trujillo JJ. Theory and applications of fractional differential equations. elsevier; 2006 Feb 16.
  12. 12. Tverdyi D, Parovik R. Investigation of Finite-Difference Schemes for the Numerical Solution of a Fractional Nonlinear Equation. Fractal and Fractional. 2021 Dec 31;6(1):23.
  13. 13. Sun H, Chang A, Zhang Y, Chen W. A review on variable-order fractional differential equations: mathematical foundations, physical models, numerical methods and applications. Fractional Calculus and Applied Analysis. 2019 Feb 25;22(1):27–59.
  14. 14. Caputo M, Fabrizio M. A new definition of fractional derivative without singular kernel. Progress in Fractional Differentiation and Applications. 2015;1(2):73–85. http://dx.doi.org/10.12785/pfda/010201
  15. 15. Losada J, Nieto JJ. Properties of a new fractional derivative without singular kernel. Progr. Fract. Differ. Appl. 2015 Apr;1(2):87–92. http://dx.doi.org/10.12785/pfda/010202.
  16. 16. Atangana A, Baleanu D. New fractional derivatives with nonlocal and non-singular kernel: theory and application to heat transfer model. arXiv preprint arXiv:1602.03408. 2016 Jan 20.
  17. 17. Hattaf K. A new generalized definition of fractional derivative with non-singular kernel. Computation. 2020 May 21;8(2):49.
  18. 18. Al-Refai M. On weighted Atangana–Baleanu fractional operators. Advances in Difference Equations. 2020 Jan 2;2020(1):3.
  19. 19. Atangana A, Koca I. Chaos in a simple nonlinear system with Atangana–Baleanu derivatives with fractional order. Chaos, Solitons and Fractals. 2016 Aug 1;89:447–54.
  20. 20. Atangana A. Fractal-fractional differentiation and integration: connecting fractal calculus and fractional calculus to predict complex system. Chaos, solitons and fractals. 2017 Sep 1;102:396–406.
  21. 21. Alshabanat A, Jleli M, Kumar S, Samet B. Generalization of Caputo-Fabrizio fractional derivative and applications to electrical circuits. Frontiers in Physics. 2020 Mar 20;8:64.
  22. 22. Borah M, Gayan A, Sharma JS, Chen Y, Wei Z, Pham VT. Is fractional-order chaos theory the new tool to model chaotic pandemics as Covid-19?. Nonlinear dynamics. 2022 Jul;109(2):1187–215. pmid:35634246
  23. 23. Partohaghighi M, Yusuf A, Karaca Y, Li YM, Ibrahim TF, Younis BA, et al. A new fractal fractional modeling of the computer viruses system. Fractals. 2022 Aug 4;30(05):2240184.
  24. 24. Samet B, Vetro C, Vetro P. Fixed point theorems for αψ-contractive type mappings. Nonlinear analysis: theory, methods and applications. 2012 Mar 1;75(4):2154–65.
  25. 25. Mawhin J. Leray-Schauder degree: a half century of extensions and applications. 1999: 195–228.
  26. 26. Marsden JE. Elementary Classic Analysis. 1973.
  27. 27. Chen W, Sun H, Zhang X, Korošak D. Anomalous diffusion modeling by fractal and fractional derivatives. Computers and Mathematics with Applications. 2010 Mar 1;59(5):1754–8.
  28. 28. Chen W. Time–space fabric underlying anomalous diffusion. Chaos, Solitons and Fractals. 2006 May 1;28(4):923–9.
  29. 29. Avcı İ, Hussain A, Kanwal T. Investigating the impact of memory effects on computer virus population dynamics: A fractal–fractional approach with numerical analysis. Chaos, Solitons and Fractals. 2023 Sep 1;174:113845.
  30. 30. Rezapour S, Asamoah JK, Hussain A, Ahmad H, Banerjee R, Etemad S, et al. A theoretical and numerical analysis of a fractal–fractional two-strain model of meningitis. Results in Physics. 2022 Aug 1;39:105775.
  31. 31. Omame A, Raezah AA, Okeke GA, Akram T, Iqbal A. Assessing the impact of intervention measures in a mathematical model for monkeypox and COVID-19 co-dynamics in a high-risk population. Modeling Earth Systems and Environment. 2024 Aug 30:1–5.
  32. 32. Adu IK, Wireko FA, Sebil C, Asamoah JK. A fractal–fractional model of Ebola with reinfection. Results in Physics. 2023 Sep 1;52:106893.
  33. 33. Nwajeri UK, Asamoah JK, Ugochukwu NR, Omame A, Jin Z. A mathematical model of corruption dynamics endowed with fractal–fractional derivative. Results in Physics. 2023 Sep 1;52:106894.
  34. 34. Poria S, Dhiman A. Existence and uniqueness theorem for ODE: an overview. arXiv preprint arXiv:1605.05317. 2016 May 17.
  35. 35. Hyers DH. On the stability of the linear functional equation. Proceedings of the National Academy of Sciences. 1941 Apr 15;27(4):222–4. pmid:16578012
  36. 36. Rassias TM. On the stability of the linear mapping in Banach spaces. Proceedings of the American mathematical society. 1978;72(2):297–300.
  37. 37. Solís-Pérez JE, Gómez-Aguilar JF, Atangana A. Novel numerical method for solving variable-order fractional differential equations with power, exponential and Mittag-Leffler laws. Chaos, Solitons and Fractals. 2018 Sep 1;114:175–85.