Figures
Abstract
Malware is a common word in modern era. Everyone using computer is aware of it. Some users have to face the problem known as Cyber crimes. Nobody can survive without use of modern technologies based on computer networking. To avoid threat of malware, different companies provide antivirus strategies on a high cost. To prevent the data and keep privacy, companies using computers have to buy these antivirus programs (software). Software varies due to types of malware and is developed on structure of malware with a deep insight on behavior of nodes. We selected a mathematical malware propagation model having variable infection rate. We were interested in examining the impact of memory effects in this dynamical system in the sense of fractal fractional (FF) derivatives. In this paper, theoretical analysis is performed by concepts of fixed point theory. Existence, uniqueness and stability conditions are investigated for FF model. Numerical algorithm based on Lagrange two points interpolation polynomial is formed and simulation is done using Matlab R2016a on the deterministic model. We see the impact of different FF orders using power law kernel. Sensitivity analysis of different parameters such as initial infection rate, variable adjustment to sensitivity of infected nodes, immune rate of antivirus strategies and loss rate of immunity of removed nodes is investigated under FF model and is compared with classical. On investigation, we find that FF model describes the effects of memory on nodes in detail. Antivirus software can be developed considering the effect of FF orders and parameters to reduce persistence and eradication of infection. Small changes cause significant perturbation in infected nodes and malware can be driven into passive mode by understanding its propagation by FF derivatives and may take necessary actions to prevent the disaster caused by cyber crimes.
Citation: Razi N, Riaz MB, Bano A, Kamran T, Ishtiaq U, Shafiq A (2025) Applying fractional calculus to malware spread: A fractal-based approach to threat analysis. PLoS ONE 20(1): e0313914. https://doi.org/10.1371/journal.pone.0313914
Editor: Joshua Kiddy K. Asamoah, Kwame Nkrumah University of Science and Technology, GHANA
Received: August 8, 2024; Accepted: October 19, 2024; Published: January 8, 2025
Copyright: © 2025 Razi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: The data are all contained within the manuscript.
Funding: This article has been produced with the financial support of the European Union under the REFRESH – Research Excellence for Region Sustainability and High-tech Industries project number CZ.10.03.01/00/22_003/0000048 via the Operational Programme Just Transition.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
Malware is a program tailored to impair, interrupt or damage a computer chain or in cyberspace. Hackers use their technical skills to develop such programs for stealing important and personal information. It normally occurs in the form of a malicious code. Different types of malware propagate differently. They may self-propagate, or their propagation may be through user interactions via internet or sharing devices like Wifi/Bluetooth etc. Most known types of malware are: Virus, Worms, Adware, Spyware, Trojan, Rootkit, Backdoors, Keyloggers, Ransomware, Cookies, Sniffers, Botnet, Spam, Mobile malware [1–3]. The software has been developed to deal with such program or malware according to its nature. The software is usually called antivirus. It can detect and kill malware. Moreover, it may be installed in computers to act as shield against propagation of malware [4, 5].
To develop effective antivirus software against some particular malware one should know how the malware propagates and works in computers. For this purpose, Feng et al. [6] presented a model of propagation of malware through internet via three states: susceptible, infected and recovered (removed). They assumed that total numbers of nodes (computers) in a network at time σ are N(σ) along with the assumption that each node changes with respect to time in three states. They described that susceptible state (Δ) represents a node which has a weakness that the malware can easily exploit it, infected state (ℵ) shows that when it is infected it can infects its neighboring nodes and still infectious and recovered/removed state (Θ) represents that a detection tool has been installed that is used to identify and overcome a malware. Considering these definitions of states they represented the model in the form of ODES as:
(1.1)
where Π shows the susceptible rate of new nodes, θ shows the number of new nodes, ζ is the loss rate of immunity of the recovered nodes, μ is the replacement rate, ν is the real time immune rate of antivirus strategies, κ is the recovered rate of infected nodes, τ is the change in time, β0 is the initial infection rate and
satisfies the assumptions as in [6]. The initial conditions are defined by Δ(0) = Δ0 ≥ 0, ℵ(0) = ℵ0 ≥ 0 and Θ(0) = Θ0 ≥ 0. Moreover, N(σ) = Δ(σ) + ℵ(σ) + Θ(σ) as given above.
As the time passed, due to the increase in the spread of virus and its different aspects we have to study the mathematical models in fractional calculus instead of classical. Fractional calculus is a stereotype of classical. Its concept is known since 1695 when L’Hospital asked Leibnitz about the fractional power of derivative. By replacing usual operators from classical to the fractional, we get more accurate results in many physical problems [7]. Many definitions of fractional derivatives were found [8–11]. Several fractional derivatives and integrals in extended form as with variable order [12, 13] were defined to solve different forms of differential equations and functions but there was a problem that these operators had singular kernel. To solve this problem, fractional operators were found without singular kernels [14, 15] and in refined form with non local as well [16]. Then more advanced papers were published in which flaws of previous papers were removed [17–19].
The notion of fractional operators had not been much worthy for modeling the complex problems of real world. These complex real world problems can be based on those physical occurrences that show fractal behaviour. To handle this type of problems a nonstandard derivative was introduced [20] known as fractal derivative which scales independent variable. In [20] Atangana introduced novel concept of differentiation. The term fractal- fractional (FF) derivative was used in the paper where two concepts of fractal derivative and fractional derivative were combined. He derived fractal fractional derivatives in Caputo sense and in Riemann-Liouville sense also with three different forms of kernels mentioned above. Atangana presented the new definition of Fractal Laplace transform and then used it to solve the fractal differential equation and found corresponding integral.
Malware constitute a chaotic behaviour in the real world and it is random and unpredictable in a nonlinear rule. Phenomena of malware relates to data heterogeneities that cannot be well-defined using other forms of derivatives [21]. To study the complexity of such chaotic system, fractal fractional derivative is much better than classical one [19, 22, 23]. We find detail in [8, 20, 24–28] for more details. To see the memory effect, earlier fractional derivative of variable order [12, 13] were used but recently fractal fractional orders are used to check memory effect [29]. Rezapour et al. [30] provided a theoretical and numerical analysis of two strain (FF) model of meningitis. Recently, fractal fractional derivatives with its theory and numerical aspects were applied for some most important issues like intervention measures in a mathematical model for monkeypox and COVID-19 co-dynamics [31] and for Ebola [32] and most common problem of our countries “corruption” [33]. Poria and Dhiman [34] examined existence and uniqueness theorem for ODES. Authors in [35–37] worked on stability of different equations in the context of Banach spaces.
Malware is a generic issue and many authors have discussed different mathematical models to explain its extremities. Due to its complex features involving chaotic behavior, heterogeneities and memory effect, some authors tried to solve it using the concept of fractional calculus and in advance form of fractal fractional theory. Till now we have seen the models which have a simple nature. So we decided to investigate a more complex mathematical model as presented by Feng et al. This model has a variable infection rate which gives a deep insight of the behavior of malware. Moreover, infection rate is defined as a nonlinear function of infected nodes. To better understand the behavior of such type of malware and develop antivirus software to overcome the malware, we decided to deal this model by converting it into fractal fractional mathematical model with power law kernel initially. We also tried to find the impacts of different parameters on malware propagation for integer and non integer orders.
The objective of our paper was to replace ordinary derivatives with FF derivatives using kernel of power-law in model (1.1) and compare our findings with the findings of model (1.1) in [6]. We apply results from fixed point theory to establish existence, and convergence of solution of our proposed model. Moreover, we check the stability of our model. Furthermore, we generated Matlab code for our fractal fractional model which described the behavior of nodes for arbitrary values of fractional orders and fractal dimensions to better understand the propagation of malware in-detail to overcome it.
We organized this paper as: in section 2, some basic definitions and theorems are described that are useful for our work. In section 3, fractal fractional mathematical model is formulated. In section 4, this model has been formulated as fixed point problem. Then in sections 5, 6 and 7 existence, uniqueness and stability of the solution is proved by results of fixed point theory. In section 8, a numerical scheme based on two points Lagrangian interpolation is developed as this method provides more accuracy, better convergence and most of all it is simple to understand and coding is easier than other methods. Then coding is done using Matlab R2016a for different fractal and fractional orders and parameters. In section 9, simulation is discussed and in section 10, we concluded our work.
2 Preliminaries
2.1 Classical calculus
This section includes some definitions and theorems from fixed point theory and fractional calculus which are needed in the sequel. We use the following results defined in [24].
Let Ψ displays a subclass of non-decreasing operators ψ: [0, ∞) → [0, ∞) such that
where ψj is the jth iterate. It satisfies the following lemma:
Lemma 2.1. [24] Every function ψ: [0, ∞) → [0, ∞) in the class Ψ satisfies the condition:
Definition 2.2. [24] Let be a normed space and
with ψ: [0, ∞) → [0, ∞) and
, then F is a ϕ − ψ − contraction if for
,
Definition 2.3. [24] If and
, then F is ϕ-admissible if for
,
With the help of above Definitions 2.2 and 2.3, the authors derived the following results for existence of fixed point.
Theorem 2.4. [24] Let be a complete metric space and
be a ϕ-ψ-contraction mapping with the conditions:
- (i) F is ϕ-admissible;
- (ii) there exists
such that ϕ(y0, Fy0) ≥ 1;
- (iii) if {yn} is a sequence in
such that ϕ(yn, yn+1) ≥ 1 for all n and
as n → ∞, implies ϕ(yn, y) ≥ 1 for all
Then, F has a fixed point.
For the existence of solution in the support of (2.4), Leray Schauder criteria is also used which is defined as:
Theorem 2.5. [25] Let be a Banach space,
be a bounded and closed set in
such that
is convex and U be an open set in
with the property 0 ∈ U, then a compact and continuous operator
, shows either
- (a) G has a fixed point in
or - (b) there exists y ∈ ∂U and η ∈ (0, 1) s.t y = ηG(y).
Moreover, for compactness of operator, Arzela-Ascoli’s theorem is used which is defined as:
Theorem 2.6. [26] Let ,
. Then W is compact if and only if W is closed, bounded and equicontinuous.
2.2 Fractional calculus
Now-a-days fractal theory is most widely used to understand the behaviour of variables. To study the behaviour of a given variable with respect to a scaled variable, Chen et al. [27] defined:
Definition 2.7. Fractal derivative (earlier defined as Hausdorff derivative in [28]) of f(σ) with respect to a fractal order is
Combining the concepts of fractal differentiation and fractal derivative, a novel concept of differentiation was presented by Atangana [20] as:
Definition 2.8. Let Υ(σ) be continuous and fractal differentiable of order on (a, b). Then Riemann-liouville fractal-fractional derivative with power law kernel of Υ of order
is defined as
where
.
He constructed fractal-fractional integral associated to fractal-fractional derivative as:
Definition 2.9. [20] Let Υ(σ) be continuous on (a, b), then fractal-fractional integral of Υ with order and taking n = 1 is
3 Conversion of classical mathematical model to fractal-fractional mathematical model
Inspired by the concepts of fractal fractional calculus, we convert classical mathematical model (1.1) in terms of fractal-fractional derivatives. So, our required model is
(3.1)
with the initial conditions Δ(0) = Δ0 ≥ 0, ℵ(0) = ℵ0 ≥ 0, Θ(0) = Θ0 ≥ 0, and N(σ) = Δ(σ) + ℵ(σ) + Θ(σ) for σ ∈ J = [0, T], T > 0. Also
and all parameters are to be taken non-negative. Here FFP represents the term fractal-fractional derivative with power law kernel defined in [20].
4 Formulation of model as fixed point problem
In this section, we convert mathematical model of ODES (1.1) in fixed point problem. We apply results of fixed point theory on model (3.1). Consider , a Banach space and
represents the class of all continuous functions with the norm defined by
First, rewrite given model (3.1) as
(4.1)
Comparing models (3.1) and (4.1), we have
(4.2)
Since
where from ([8]) for n = 1, we have
So, model (4.2) can be written as
(4.3)
Hence, we get
(4.4)
In general, we can write model (4.4) as
(4.5)
where
Applying fractal-fractional integral on model (4.5), using the result in ([20]), we get
(4.6)
Hence, we can write
(4.7)
So, now we can transform (3.1) into a fixed point problem.
5 Existence of solution
For existence, we prove a theorem on the basis of Theorem 2.4 as in ([30]).
Theorem 5.1. Suppose that ∃ , ψ ∈ Ψ and Υ ∈ C(J × Ξ, Ξ) satisfying the following conditions:
(β3): with
,
(5.1) for every n and σ.
Hence, we say that F has a fixed point. So a solution of malware propagation model exists.
Proof. Take so that
for every σ ∈ J.
Now, we take
By using (β1), we deduce
Now, by using the definition of norm
After doing some computations and using the definition of beta function and using definition of ℓ, we get
(5.2)
Moreover, if we define a function ϕ: Ξ2 → [0, ∞) such that
for
, and zero otherwise, then for each
equation (5.2) can be written as
This shows that F is a ϕ-ψ-contraction.
Now, suppose that with the property that
. By the definition of ϕ, we deduce
and by (β2), we get
and
.
So, by applying definition of ϕ, we have
Hence, F is ϕ-admissible. (*)
Moreover, by (β2), it can be seen that for some in Ξ, ∀σ ∈ J, we have
. (**)
Now, consider with
and for all n and
By definition of ϕ this implies .
Thus, by (β3) this implies
Hence, for all n. (***)
So (*), (**), (***) show the conditions of Theorem 2.4 are satisfied, so we can say that there exists some such that
.
Hence, is a solution of our model.
Theorem 2.5 also establishes that solution of model exists and on basis of this model we also define the following theorem as:
Theorem 5.2. Let Ξ be a Banach space, be a bounded and closed set in Ξ and A be an open in
with 0 ∈ A, then there exists a compact and continuous operator F with the conditions (β4) and (β5) from
which satisfies one of the two conditions,
(a) G has a fixed point in
,
or
(b) there exists
and ω ∈ (0, 1) s.t
;
where
(β4): Suppose Υ ∈ C(J × Ξ, Ξ) and there exists ϕ ∈ L1(J, [0, ∞)) and B ∈ C([0, ∞), [0, ∞)) where B is an increasing function satisfying the condition for all σ ∈ J and
;
(β5): If ϕ* = supσ ∈ J|ϕ(σ)| then ∃ a no r s.t where
.
Proof. Consider F: Ξ → Ξ as
and
for some positive ϵ.
We show that F is compact on . For this we prove that F is uniformly bounded and equicontinuous.
Since Υ is continuous, this implies F is continuous.
Now for in
, we obtain
and from (β4), we have
after simplification of the integral, we get the beta function. So applying value of beta function and λ, we get
Hence, by applying norm, we have
(5.3)
This implies F is uniformly bounded.
Now, for σ, σ* ∈ J such that σ < σ* and arbitrarily.
If we suppose , then
that is independent from
. When σ* → σ, its value becomes zero. Hence
. Thus proved that F is equicontinuous. So F is compact. As F satisfies the conditions of Theorem 5.2, we say that F will satisfy either one or the other conditions mentioned in Theorem 5.2. For this using (β5), we construct
where r > 0 is defined above. Hence, we can write
(5.4)
Assume, there exists
and ω ∈ (0, 1) where
.
For , ω and using (β5), we get
This gives us r < r, which is impossible. Thus, condition (b) is not satisfied. Hence, by condition (a), F possesses a fixed point in
.
6 Uniqueness
Now we will prove uniqueness with the help of theorems using lipschitz condition [34] along with some other conditions.
Theorem 6.1. Let and we assume that (Condition): ||Δ|| ≤ μ1, ||ℵ|| ≤ μ2, α ∈ (0, ∞),
(where
||Θ|| ≤ μ4 for some μi > 0, i = 1, 2, 3, 4.
Moreover
,
where
,
and b1 > 0, b2 > 0 and b = b1 ⋅ b2, then Υ1, Υ2, Υ3 defined in Model 4.1 are lipschitz functions with the following values w1 = (β0 μ3 + μ + ν), w2 = (β0 μ1 b + μ + γ), w3 = (ζ + μ), where 0 < wi < 1, i = 1, 2, 3.
Proof. Considering Υ1 for each , we take
Hence, Υ1 is Lipschitz with respect to Δ with w1 > 0.
Consider Υ2 for each , we take
Hence, Υ2 is Lipschitz w.r.t ℵ with w2 > 0.
Considering Υ3 for each , we take
Hence, Υ3 is Lipschitz with respect to Θ with w3 > 0.
Moreover, we see the uniqueness of solution in Theorem 6.2 under the condition defined in Theorem 6.1.
Theorem 6.2. If ||Δ|| ≤ μ1, ||ℵ|| ≤ μ2, ||Θ|| ≤ μ4 for some μi > 0, i = 1, 2, 3, 4 and w1 = (β0 μ3 + μ + ν), w2 = (β0 μ1 b + μ + γ), w3 = (ζ + μ), where 0 < wi < 1, i = 1, 2, 3; then our model has a unique solution if λwi < 1 for i = 1, 2, 3.
Proof. Suppose the model has two solutions (Δ(σ), ℵ(σ), Θ(σ)) and (Δ*(σ), ℵ*(σ), Θ*(σ)) with initial conditions defined above. So, we can write
Take
since Υ1 is considered with respect to Δ and Δ* so by Theorem 6.1 and definition of Beta function, we get
Hence,
This implies that (1 − λw1)||Δ(σ) − Δ*(σ)|| ≤ 0.
As λw1 < 1, so this is possible when ||Δ(σ) − Δ*(σ)|| = 0. Thus, Δ(σ) = Δ*(σ).
Similarly, we have
Take
since Υ2 is considered with respect to ℵ and ℵ* so by using previous result and definition of Beta function, we have
Hence, we obtain
This implies that
As λw2 < 1, this is possible when ||ℵ(σ) − ℵ*(σ)|| = 0. Thus, ℵ(σ) = ℵ*(σ). Also, we have
Take
since Υ3 is considered w.r.t Θ and Θ* so by using previous result and definition of Beta function, we have
Hence, ||Θ(σ) − Θ*(σ)|| ≤ λw3||Θ(σ) − Θ*(σ)|| ⇒ (1 − λw3)||Θ(σ) − Θ*(σ)|| ≤ 0.
As λw3 < 1, this is possible when ||Θ(σ) − Θ*(σ)|| = 0. Thus Θ(σ) = Θ*(σ). That is, (Δ(σ), ℵ(σ), Θ(σ)) = (Δ*(σ), ℵ*(σ), Θ*(σ)). Hence, solution is unique.
7 Stability
In this section, we check stability of solution. We use Ulam–Hyers and Ulam–Hayers–Rassias theorems to check it. First, we define the following theorems for our model.
Definition 7.1. Model (4.1) is Ulam-Hyers stable [35], if for all ϵi > 0, there exist , which depend on Υi, i = 1, 2, 3 respectively, and for all (Δ*, ℵ*, Θ*) satisfying the inequalities
(7.1) there exists (Δ, ℵ, Θ) ∈ Ξ satisfying model (4.1) with the condition
(7.2)
Remark 7.2. (Δ*, ℵ*, Θ*) ∈ Ξ is a solution of model (7.1) iff ∃ ηi ∈ C([0, T], [0, ∞)) such that for all σ ∈ J,
Theorem 7.3. The fractal fraction model is Ulam–Hayers stable on J such that λwi < 1, where wi and λ are defined as above.
Proof. Let ϵ1 > 0 and s.t
by above remark, we have
(7.4)
As
is the unique solution, then
That is
Hence, we have
If
, then ||Δ* − Δ|| ≤ M1 ϵ1.
Similarly, we can prove that ||ℵ* − ℵ|| ≤ M2 ϵ2, and ||Θ* − Θ|| ≤ M3 ϵ3.
Thus Ulam–Hayers stability criteria is fulfilled by our fractal–fractional model.
Definition 7.4. We define the Ulam–Hayers–Rassias stability criteria for our fractal–fractional model ([36]). Model (4.1) is Ulam-Hyers–Rassias stable with respect to the functions ψi, if for all ϵi > 0, there exist Mi > 0 ∈ [0, ∞), which depend on Υi and ψi, i = 1, 2, 3 respectively and for all (Δ*, ℵ*, Θ*) satisfying the inequalities:
(7.5) there exists (Δ, ℵ, Θ) ∈ Ξ satisfying model (4.1) with the conditions:
(7.6)
Remark 7.5. (Δ*, ℵ*, Θ*) ∈ Ξ is a solution iff ∃ ηi ∈ C(J, [0, ∞)) such that for all σ ∈ J,
Theorem 7.6. The fractal–fractional model (4.1) is Ulam–Hayers–Rassias stable when the following conditions are satisfied for all σ ∈ J there exists nondecreasing mappings ψi ∈ C(J, [0, ∞)) and ξi > 0 depending upon ψi such that .
Proof. Let ϵ1 > 0 and such that
then, by the conditions of remark 7.5, we consider
As
is the unique solution, then
Therefore, we get
Hence, we have
If
then, we get
Similarly, we can prove that
Thus, Ulam–Hayers–Rassias stability criteria is fulfilled by our fractal–fractional model.
8 Numerical algorithm
Now, we make a numerical scheme using the two–point Lagrangian interpolation formula for our fractal–fractional model as in [37]. The difference between our scheme and others is that in our model Υ1 and Υ3 depend on σ and (σ − τ) so we deal it differently in the end.
First we take σ = σn+1 and and we get
(8.1)
Approximating integral as the sum of integrals on sub intervals, we have
(8.2)
Now, we approximate the functions by two points Lagrange interpolation polynomials on the interval [σj, σj+1]. We can write
Thus, we have
(8.3)
Using values of
we integrate the above integrals according to limits and taking σj − σj−1 = h, we get the final results.
where
,
.
Since in the original model Υ1 and Υ3, Θ depends on σ and (σ − τ) = σ1(say), so we write Υ1 = U1(σj, Δj, ℵj, Θj) + U3(σ1j, Θj) and Υ3 = U2(σj, Δj, ℵj, Θj) − U3(σ1j, Θj) where
- U1(σj, Δj, ℵj, Θj) = Πθ − β0 f(ℵ(σ))Δ(σ) − (μ + ν)Δ(σ),
- U2(σj, Δj, ℵj, Θj) = (1 − Π)θ + νΔ(σ) + κℵ(σ) − μΘ(σ),
- U3(σ1j, Θj) = ζΘ(σ − τ).
9 Discussion through simulations based on numerical algorithm
In this section, we see the simulation of Δ, ℵ and Θ under the effect of several fractal-fractional orders and also the behaviour of Δ, ℵ and Θ model with respect to some parameters and compare the results of fractal-fractional model to the ordinary differential model. We take the parameters as taken for figure 2 in [6], Π = 0.5, θ = 0.8, β0 = 0.02, μ = 0.1, ν = 0.2, ζ = 0.01, κ = 0.2, τ = 7.3, α = 1 and some estimated initial conditions Δ(0) = 3, ℵ(0) = 1, Θ(0) = 0.1.
Figs 1–3 show the simulation of Δ, ℵ and Θ for different fractal and fractional orders separately. We can see in Fig 1, the simulation of Δ in one figure under the different fractional orders keeping fractal order one and in the other figure under different fractal orders by keeping fractional order one. We see that initially number of susceptible nodes is more at lower fractional and fractal orders. In fractal model, after 20s, this number becomes less at lower fractal order and then converges after 80s. On the other hand, in fractional model the no of susceptible nodes is more at lower fractional orders throughout the time period and it converges slowly as compared to fractal model. So, we can see that in fractal model nodes converge more quickly that means no. of susceptible nodes is less affected by previous nodes. So we can predict that it has less memory effect, less sensitivity and more stability. Similarly Fig 2 is for ℵ. It represents higher number of nodes of infected nodes at lower fractal or fractional orders in both models. However, the convergence in fractal model is rapid so we can conclude that it has less memory effect, less sensitivity and more stability. Fig 3 is for Θ. In this figure, in both models the number of removed nodes is less at lower fractional or fractal orders but in fractal model the number of nodes is more than the number of nodes in fractional model at different orders. The nodes become stable more quickly as compared to fractional model. The fractal model has less memory effect, low sensitivity to initial conditions and limited information retention. It shows the uniqueness of the solution and existence of fixed point.
Figs 4–6 show the simulation of Δ, ℵ and Θ under the combined effect of arbitrary fractal and fractional orders. Fig 4 shows that as the fractal-fractional orders decrease, the number of susceptible nodes is higher at lower fractal-fractional orders and after some time it becomes stable rapidly and converges to the same limit except at order 0.80. This behavior depicts that these nodes have a higher risk of infection or perturbation. They are more sensitive to external influences, have strong memory effect and rapid stabilization. Fig 5 represents the behavior of infected nodes. The number of infected nodes first decreases then becomes stable at all fractal fractional orders. It depicts that the system has resilience to adapt infection where some nodes are still resistant and preventing further infection. Also, the number of nodes becomes zero at fractal fractional level one which describes that infection has been eradicated while at lower level of fractal fraction when no. of nodes goes on decreases but does not become zero show that the system has not been fully eradicated but also has the effect of memory which contributes to the persistence of infected nodes. In Fig 6, we see that number of removed nodes reduces as we reduce the fractal-fractional orders which are represented by and
. It describes that the memory effect is less in these nodes and these nodes have high stability and fast convergence. It depicts that at lower level of fractal fraction the persistence and containment of infection is high.
Moreover in Fig 7, we compare Δ, ℵ and Θ model for fractal-fractional orders ,
as
and
which shows behaviour of three nodes in one figure. We can see from the comparison of nodes that at lower level of fractal fractional, memory effect is stronger and has more influence of initial conditions and previous nodes.
Since in our original model, infection rate depends on initial infection rate β0 and also on a function of ℵ which depends on another variable called α. Therefore we see the impact of both variables on our fractal-fractional model too. Fig 8, first we see that in both models no. of infected nodes goes on increasing for higher initial infection rate i.e. as initial infection rate increases, no. of infected nodes also increases. It describes that outbreak is escalating and infected nodes are increasing rapidly. On the other hand, when we compare both models it shows that at lower fractal fractional order the malware spreads faster and has stronger memory effect than the integer order model.
Also in the original model, α is used to adjust the infection rate sensitivity to ℵ. Here α = 0 means constant infection rate. According to the authors in [6], at α = 1, the scale of malware spreading is smaller than the rate at α = 0. From Fig 9 first we see that this condition is satisfied in both models. Also we observe that no. of infected nodes goes on decreasing more quickly as time passes in FF model as compared to integer order model. As a result, we can see that FF model has weaker memory effect and more stability and resilience to outbreaks in the nodes.
In Fig 10, we see the effect of real-time immune rate on ℵ for classical and FF model. We see as we increase the immune rate, the number of infected nodes goes on decreasing in both models. As a comparison of both models, we see that no. of infected nodes is greater in FF model, which tells that in FF model nodes have stronger memory effect that enhances its sensitivity to network structure. Similarly Fig 11 shows that as the immune rate increases, no. of recovered nodes also increases in both models but in FF model this number is less than in classical model. It describes weak memory effect and decreased sensitivity in FF model.
Moreover, the recovered nodes lose their immunity after some time, so to see this impact we check the graphs of Δ, ℵ and Θ. We see in Fig 12 that in both models as the loss rate of immunity is increasing, no. of susceptible nodes is also increasing that describes weaker memory effect and higher sensitivity but in comparison FF model has stronger memory effect than classical one except at zero value.
In Fig 13, we see the effect of loss rate of immunity on ℵ for both models. We see as loss rate of immunity increases, the number of infected nodes goes on decreasing in both models which indicates stronger memory effect. As a comparison of both models, no. of infected nodes is greater in FF model, which tells that in FF model nodes have weaker memory effect that decrease its resilience to network structure. In Fig 14 as loss rate of immunity increases, the no. of removed nodes is also increases, it indicates that immune response is effective and has strong memory effect. When we compare both models, we see that no of removed nodes is less in FF model. Hence, we say that theses nodes have weaker memory effect in FF model as compared to classical.
10 Conclusion
In this paper, a deterministic mathematical model on malware propagation has been discussed in the sense of fractal fractional derivative. At first stage the classical mathematical model given in [6] has been converted in fractal fractional model with power law kernel. Initially this model was examined theoretically. Conditions for existence (Leray Schauder criteria), uniqueness (Lipschitz property) and stability (Ulam-Hyers and Ulam-Hyers-Rassias theorems) of the fractal fractional model were examined using concepts of fixed point theory. Secondly, numerical scheme was developed and simulations were performed to verify the accuracy of theoretical results.
At second stage, fractal fractional model was examined under fractal dimensions and fractional orders separately. Then combined effect of fractal dimensions and fractional orders was discussed. We observed that at lower FF orders, the number of susceptible and infected nodes was higher. It demonstrates the sensitivity to external influences, resilience to adapt infection and strong memory effects. Under combined effect, we found out that removed nodes have higher containment of infection and persistence at lower level of FF orders.
At the next stage, we compared Δ, ℵ and Θ model for classical (FF order at one) and fractal fractional model for orders . We examined the impact of different parameters such as initial infection rate, variable adjustment to sensitivity of infected nodes, immune rate of antivirus strategies and loss rate of immunity of recovered nodes of mathematical model [6] under
and
.
Through the graphs we find out the effect of memory on different types of nodes in system. We explore sensitivity, convergence, and stability of susceptible, infected, and removed nodes under fractal fractional model. It will help us to predict about the vulnerabilities in computer systems. Antivirus strategies can be made by developing software that may help in containment and eradication of infection in the nodes by keeping an eye on the behavior of nodes. In classical form, this model gave a clear insight that by choosing appropriate variable infection rate, the prevalence of malware can be controlled. Our fractal fractional model agrees with it. Continuing this process, we investigated the impacts of other parameters too on malware model. Our findings may be helpful in installing antivirus software in cyber security practice by keeping in view the past behaviors of previous nodes. This model is suitable for malware like red worms, Nimda, Slammer worms, and Wittyworms etc. The malware which depends on variable infection rate and time delay factor, in that case our findings will help in developing antivirus strategies keeping in mind its cost factor.
This study has some limitations. Unavailability of sufficient real data causes hurdles to investigate the results. In future, we want to explore the behavior of mathematical model with respect to different kernels and different numerical schemes and by fractional and fractal derivatives of variable order so that more effective antivirus strategies may be developed to predict outbreaks for controlling malware propagation.
References
- 1.
Megira S, Pangesti AR, Wibowo FW. Malware analysis and detection using reverse engineering technique. InJournal of Physics: Conference Series 2018 Dec 1 (Vol. 1140, No. 1, p. 012042). IOP Publishing.
- 2. Tahir R. A study on malware and malware detection techniques. International Journal of Education and Management Engineering. 2018 Mar 1;8(2):20.
- 3. Gounder MP, Farik M. New ways to fight malware. Int. J. Sci. Technol. Res. 2017 Jun;6(06).
- 4. Raza A, Fatima U, Rafiq M, Ahmed N, Khan I, Nisar KS, et al. Mathematical analysis and design of the nonstandard computational method for an epidemic model of computer virus with delay effect: application of mathematical biology in computer science. Results in Physics. 2021 Feb 1;21:103750.
- 5.
Data S, Wang H. The effectiveness of vaccinations on the spread of email-borne computer viruses. InCanadian Conference on Electrical and Computer Engineering, 2005. 2005 May 1 (pp. 219–223). IEEE.
- 6. Feng L, Liao X, Han Q, Li H. Dynamical analysis and control strategies on malware propagation model. Applied Mathematical Modelling. 2013 Sep 1;37(16-17):8225–36.
- 7. Abbas S., Benchohra M., and Vityuk A. N. (2012). On fractional order derivatives and Darboux problem for implicit differential equations. Fractional Calculus and Applied Analysis, 15(2), 168–182.
- 8. Oliveira EC, Machado JA. A review of definitions for fractional derivatives and integral. Mathematical Problems in Engineering. 2014 Jun 10;2014:1–7.
- 9. Gerasimov AN. Generalization of linear deformation laws and their application to internal friction problems. Applied mathematics and mechanics. 1948;12:529–39.
- 10. Caputo M. Linear models of dissipation whose Q is almost frequency independent—II. Geophysical journal international. 1967 Nov 1;13(5):529–39.
- 11. Kilbas AA, Srivastava HM, Trujillo JJ. Theory and applications of fractional differential equations. elsevier; 2006 Feb 16.
- 12. Tverdyi D, Parovik R. Investigation of Finite-Difference Schemes for the Numerical Solution of a Fractional Nonlinear Equation. Fractal and Fractional. 2021 Dec 31;6(1):23.
- 13. Sun H, Chang A, Zhang Y, Chen W. A review on variable-order fractional differential equations: mathematical foundations, physical models, numerical methods and applications. Fractional Calculus and Applied Analysis. 2019 Feb 25;22(1):27–59.
- 14. Caputo M, Fabrizio M. A new definition of fractional derivative without singular kernel. Progress in Fractional Differentiation and Applications. 2015;1(2):73–85. http://dx.doi.org/10.12785/pfda/010201
- 15. Losada J, Nieto JJ. Properties of a new fractional derivative without singular kernel. Progr. Fract. Differ. Appl. 2015 Apr;1(2):87–92. http://dx.doi.org/10.12785/pfda/010202.
- 16.
Atangana A, Baleanu D. New fractional derivatives with nonlocal and non-singular kernel: theory and application to heat transfer model. arXiv preprint arXiv:1602.03408. 2016 Jan 20.
- 17. Hattaf K. A new generalized definition of fractional derivative with non-singular kernel. Computation. 2020 May 21;8(2):49.
- 18. Al-Refai M. On weighted Atangana–Baleanu fractional operators. Advances in Difference Equations. 2020 Jan 2;2020(1):3.
- 19. Atangana A, Koca I. Chaos in a simple nonlinear system with Atangana–Baleanu derivatives with fractional order. Chaos, Solitons and Fractals. 2016 Aug 1;89:447–54.
- 20. Atangana A. Fractal-fractional differentiation and integration: connecting fractal calculus and fractional calculus to predict complex system. Chaos, solitons and fractals. 2017 Sep 1;102:396–406.
- 21. Alshabanat A, Jleli M, Kumar S, Samet B. Generalization of Caputo-Fabrizio fractional derivative and applications to electrical circuits. Frontiers in Physics. 2020 Mar 20;8:64.
- 22. Borah M, Gayan A, Sharma JS, Chen Y, Wei Z, Pham VT. Is fractional-order chaos theory the new tool to model chaotic pandemics as Covid-19?. Nonlinear dynamics. 2022 Jul;109(2):1187–215. pmid:35634246
- 23. Partohaghighi M, Yusuf A, Karaca Y, Li YM, Ibrahim TF, Younis BA, et al. A new fractal fractional modeling of the computer viruses system. Fractals. 2022 Aug 4;30(05):2240184.
- 24. Samet B, Vetro C, Vetro P. Fixed point theorems for α–ψ-contractive type mappings. Nonlinear analysis: theory, methods and applications. 2012 Mar 1;75(4):2154–65.
- 25. Mawhin J. Leray-Schauder degree: a half century of extensions and applications. 1999: 195–228.
- 26. Marsden JE. Elementary Classic Analysis. 1973.
- 27. Chen W, Sun H, Zhang X, Korošak D. Anomalous diffusion modeling by fractal and fractional derivatives. Computers and Mathematics with Applications. 2010 Mar 1;59(5):1754–8.
- 28. Chen W. Time–space fabric underlying anomalous diffusion. Chaos, Solitons and Fractals. 2006 May 1;28(4):923–9.
- 29. Avcı İ, Hussain A, Kanwal T. Investigating the impact of memory effects on computer virus population dynamics: A fractal–fractional approach with numerical analysis. Chaos, Solitons and Fractals. 2023 Sep 1;174:113845.
- 30. Rezapour S, Asamoah JK, Hussain A, Ahmad H, Banerjee R, Etemad S, et al. A theoretical and numerical analysis of a fractal–fractional two-strain model of meningitis. Results in Physics. 2022 Aug 1;39:105775.
- 31. Omame A, Raezah AA, Okeke GA, Akram T, Iqbal A. Assessing the impact of intervention measures in a mathematical model for monkeypox and COVID-19 co-dynamics in a high-risk population. Modeling Earth Systems and Environment. 2024 Aug 30:1–5.
- 32. Adu IK, Wireko FA, Sebil C, Asamoah JK. A fractal–fractional model of Ebola with reinfection. Results in Physics. 2023 Sep 1;52:106893.
- 33. Nwajeri UK, Asamoah JK, Ugochukwu NR, Omame A, Jin Z. A mathematical model of corruption dynamics endowed with fractal–fractional derivative. Results in Physics. 2023 Sep 1;52:106894.
- 34.
Poria S, Dhiman A. Existence and uniqueness theorem for ODE: an overview. arXiv preprint arXiv:1605.05317. 2016 May 17.
- 35. Hyers DH. On the stability of the linear functional equation. Proceedings of the National Academy of Sciences. 1941 Apr 15;27(4):222–4. pmid:16578012
- 36. Rassias TM. On the stability of the linear mapping in Banach spaces. Proceedings of the American mathematical society. 1978;72(2):297–300.
- 37. Solís-Pérez JE, Gómez-Aguilar JF, Atangana A. Novel numerical method for solving variable-order fractional differential equations with power, exponential and Mittag-Leffler laws. Chaos, Solitons and Fractals. 2018 Sep 1;114:175–85.