Stability analysis of a virulent code in a network of
computers
S’yanda Mungwe, Stellenbosch
University
SAMS Subject Classification Number: 23
Network of computers are vulnerable to attack by virulent codes which
can halt an organization’s activities and in the process resulting in
loss of revenue. The need to understand their dynamics is utmost
importance and hence there is a need to develop mathematical models.
These models will help us understand the impact these virulent codes
have on the network of computers. In this article, we develop and solve
numerically a mathematical model which can be used to understand the
dynamics of a virulent code in a network of computers. This model is
called the Immune, susceptible, exposed, infectious, quarantine, and
recovered (MSEIQR).The model is solved using a very robust spectral
method called the piecewise pseudospectral relaxation method (PPRM).
PPRM accuracy is validated by comparing the results with the standard
Runge-Kutta method. Stability analysis is also performed on the modified
MSEIQR model for malicious code. Results generated are in agreement with
the stability analysis performed.
References
[1] U. Saxena, J.S. Sodhi, and R. Tanwar, Augmenting smart home network security using blockchain technology, International Journal of Electronic Security and Digital Forensics 12 (2020), pp. 99-117.