Skip to main content
Log in

Control on the transmission of computer viruses in network

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This study made an inductive discussion on the definition and characteristics of computer viruses and analyzed virus transmission models as well as virus control. Like tumor cells in human body, computer viruses will rapidly transfer and disperse if they are not controlled, indicating a poor stability. To investigate the transmission control of computer viruses, a dynamical model was established for virus transmission and the concept of “equivalent day” was introduced to analyze the dynamic characteristics of discrete transfer of the model and the stability of virus-free equilibrium points and endemic equilibrium points. The characteristic value was obtained by calculating the equation of the model. Moreover, the necessary and sufficient conditions for virus-free and endemic equilibrium points of the model were obtained by proof using Lyapunov first method and disc theorem. Then the model was compared with SIS and SIR models. Finally, a control item was added based on the virus discrete transmission model and the transformation trends of the number of the infected principle machine and the infective principal machine before and after the addition of the control item were compared. In this way, the optimal control strategy for virus transmission model was designed and the effectiveness of the optimal control was verified.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ying, X., Artificial intelligence and its application in computer network technology, Technol. Mark., 2011, vol. 18, no. 2, p. 20.

    Google Scholar 

  2. Xiaoxiao, Z., Research on the ability of index members in the era of big data, Libr. Work Res., 2016, vol. 3, pp. 25–27.

    Google Scholar 

  3. Mingming, Y. and Jing, L., Introduction of computer virus and preventive measures, Intell. Comput. Appl., 2010, vol. 1, pp. 145–146.

    Google Scholar 

  4. Ping, Z., Discussion on computer network security vulnerabilities and preventive measures, Comput. CD-ROM Software Appl., 2012, vol. 3, pp. 31–32.

    Google Scholar 

  5. Liying, Z., Discussion on the computer network security vulnerabilities and defense, China Mag., 2014, vol. 3, p. 282.

    Google Scholar 

  6. Youfei, Y., Analysis of ARP virus attack in LAN of electric power enterprises, Pract. Electron., 2013, vol. 24, p. 141.

    Google Scholar 

  7. Feng, G., All-pervasive high-tech hacking, People’s Police, 2009, vol. 13, pp. 50–52.

    Google Scholar 

  8. Chunye, L., The Legal Rules and Regulations of the Information of the Rubbish in Our Country, D. Jilin University, 2010.

    Google Scholar 

  9. Chengguang, G., A brief discussion on the connotation and characteristics of computer virus, Electron. Technol. Software Eng., 2012, vol. 22, pp. 50–52.

    Google Scholar 

  10. Wanxin, D. and Zhiqiang, L., Discussion on computer virus protection, Inf. Syst. Eng., 2014, vol. 2, p. 76.

    Google Scholar 

  11. Yan, Z. and Jian, X., Some common knowledge about computer “virus,” Shandong Arch., 2002, vol. 2, pp. 42–43.

    Google Scholar 

  12. Shuang, B., Computer virus prevention measures, Gakuen Scholars: Spiritual Home, 2010, no. 3, p. 175.

    Google Scholar 

  13. Ning, H. and Yonghong, J., Discussion on computer virus and its protective measures, Comput. CD Software Appl., 2012, vol. 8, p. 85.

    Google Scholar 

  14. Chunmei, L., Application of Lyapunov Method in System Stability Theory, Northeast Normal University, 2010.

    Google Scholar 

  15. Qixin, Z., Shousong, H., and Ya, L., Stochastic optimal control of networked control systems with long time delay in network control systems, Control Theory Appl., 2004, vol. 21, no. 3, pp. 321–326.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunqing Han.

Additional information

The article is published in the original.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, C., Li, L. Control on the transmission of computer viruses in network. Aut. Control Comp. Sci. 51, 233–239 (2017). https://doi.org/10.3103/S0146411617040022

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617040022

Keywords

Navigation