Next Article in Journal
Domain-Specific Languages for Algorithmic Graph Processing: A Systematic Literature Review
Previous Article in Journal
Explainability and Interpretability in Concept and Data Drift: A Systematic Literature Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fractional Discrete Computer Virus System: Chaos and Complexity Algorithms

1
Department of Mathematics, Al-Zaytoonah University of Jordan, Amman 11733, Jordan
2
System Dynamics and Control Laboratory, Department of Mathematics and Informatics, University of Larbi Ben M’hidi, Oum El Bouaghi 04000, Algeria
3
Department of Mathematics and Computer Sciences, University of Larbi Ben M’hidi, Oum El Bouaghi 04000, Algeria
4
Dipartimento Ingegneria Innovazione, Universita del Salento, 73100 Lecce, Italy
*
Author to whom correspondence should be addressed.
Algorithms 2025, 18(7), 444; https://doi.org/10.3390/a18070444
Submission received: 19 May 2025 / Revised: 10 July 2025 / Accepted: 17 July 2025 / Published: 19 July 2025
(This article belongs to the Section Algorithms for Multidisciplinary Applications)

Abstract

The spread of computer viruses represents a major challenge to digital security, underscoring the need for a deeper understanding of their propagation mechanisms. This study examines the stability and chaotic dynamics of a fractional discrete Susceptible-Infected (SI) model for computer viruses, incorporating commensurate and incommensurate types of fractional orders. Using the basic reproduction number R 0 , the derivation of stability conditions is followed by an investigation of how varying fractional orders affect the system’s behavior. To explore the system’s nonlinear chaotic behavior, the research of this study employs a suite of analytical tools, including the analysis of bifurcation diagrams, phase portraits, and the evaluation of the maximum Lyapunov exponent (MLE) for the study of chaos. The model’s complexity is confirmed through advanced complexity algorithms, including spectral entropy, approximate entropy, and the 0 1 test. These measures offer a more profound insight into the complex behavior of the system and the role of fractional order. Numerical simulations provide visual evidence of the distinct dynamics associated with commensurate and incommensurate fractional orders. These results provide insights into how fractional derivatives influence behaviors in cyberspace, which can be leveraged to design enhanced cybersecurity measures.

1. Introduction

Computer viruses represent a significant and ever-growing threat to cybersecurity in an increasingly digital world. These malicious programs are designed to self-replicate, spreading from one system to another by attaching themselves to legitimate files or software. Unlike different types of malware, such as worms or Trojans, viruses typically require some form of user interaction to execute and begin their propagation [1,2]. The consequences of a virus infection can be devastating, ranging from the corruption and loss of critical data and system failures to substantial financial losses, widespread operational disruption, and severe breaches of privacy [3,4]. In today’s interconnected world, the impact of a successful virus attack can ripple outward, affecting individuals, organizations, and even critical infrastructure. The evolution of computer viruses has been marked by a steady increase in complexity and sophistication. Early viruses, such as the Creeper program of the 1970s, were relatively harmless, often serving as experimental projects [5]. However, these early examples quickly gave way to more malicious creations. Notable viruses like Stuxnet demonstrated the potential for viruses to inflict massive economic damage and even target critical infrastructure, highlighting the real-world consequences of these digital threats [6]. Modern viruses employ increasingly sophisticated techniques to evade detection and maintain persistence within digital environments. For example, polymorphic and metamorphic viruses dynamically alter their code, making it extremely difficult for traditional signature-based detection systems to identify and neutralize them [7]. This constant evolution necessitates a continuous adaptation of cybersecurity defense mechanisms.
In the ongoing battle against computer viruses, studies have turned to mathematical modeling as a critical tool for understanding virus propagation and developing effective containment strategies [8]. Drawing inspiration from biological epidemiology, various methods have been adapted from traditional epidemic models to analyze and predict the spread of viruses within computer networks [9]. Among these, the Susceptible-Infected (SI) model is a widely used framework for examining virus behavior. However, the standard integer-order versions of these models often fall short when attempting to capture long-term dependencies and memory effects frequently observed in real-world cyber threats [10]. Standard models frequently employ simplifications of intricate interactions and fail to account for the historical context of virus spread. This limitation has led to a growing interest in fractional-order models, which incorporate historical interactions and offer a more detailed and precise depiction of virus propagation [11]. By integrating memory effects, fractional-order models offer a more realistic and powerful tool for predicting and mitigating the impact of evolving digital threats. In parallel, some studies have analyzed the spread of actual computer viruses such as Code Red, Slammer, Conficker, and Stuxnet, using parameterized statistical distributions to fit real outbreak data [12]. These works provide a valuable benchmark for validating the qualitative behavior of theoretical models, including those based on fractional calculus.
Fractional calculus, extending classical calculus, extends differentiation and integration concepts to non-integer orders. This mathematical framework offers unique advantages for modeling complex systems by incorporating memory effects and hereditary properties [13]. Unlike traditional integer-order derivatives, which analyze only local changes, fractional derivatives consider the influence of past events on the present and future behavior of a system [14]. This property makes fractional calculus highly effective in studying systems with long-term dependencies, such as the spread of viruses in digital networks [15]. The application of fractional calculus in mathematical modeling has gained traction within a diverse range of fields, notably physics, biology, engineering, and finance [16]. In epidemiology and cybersecurity, fractional models have been particularly successful in capturing the history-dependent nature of disease and virus propagation [17]. By incorporating fractional derivatives, it is possible to better understand how past infections influence current and future outbreaks, leading to more accurate predictive models [18]. In discrete systems, fractional calculus provides a robust framework for analyzing systems that evolve in discrete time steps, making it highly suitable for modeling digital networks and computational processes. Unlike continuous-time models, which may not fully capture digital environments’ complexities, discrete fractional models offer a more precise approach to studying virus spread in cyberspace. These models account for the cumulative impact of previous infections, providing valuable insights into how viruses persist, adapt, and evolve over time [19].
A fractional discrete SI model extends the classical SI model by incorporating fractional-order derivatives to capture long-term dependencies in virus transmission. While traditional SI models assume that the rate of infection relies solely on the information contained in the current system state, the fractional framework considers historical infection trends, leading to a more accurate representation of real-world virus behavior [20]. The utilization of discrete fractional models in cybersecurity makes it possible to identify hidden patterns, predict outbreaks, and develop proactive defense mechanisms [21]. By analyzing the system’s dynamics, one can determine the conditions under which a virus persists, dies out, or exhibits chaotic behavior [22]. This insight is crucial for designing effective cybersecurity policies, intrusion detection systems, and digital defense strategies. Furthermore, nonlinear analysis, particularly bifurcation theory, is key to understanding the critical points where small changes in system parameters can lead to drastic shifts in behavior, such as the transition from stable infection dynamics to chaotic outbreaks. This allows for a more detailed exploration of how digital epidemics evolve and how they may be controlled or mitigated.
This research investigates the stability and chaotic dynamics of a susceptible-infected (SI) model for computer virus propagation with fractional discrete dynamics, using the Caputo-like difference operator. The key motivation behind this work lies in the growing challenge of controlling sophisticated computer viruses whose spread exhibits unpredictable and highly sensitive dynamics. Understanding such chaotic behavior is essential for designing robust and adaptive cybersecurity strategies. In this context, fractional calculus offers a powerful framework for modeling long-term dependencies and capturing non-local behavior that classical models may overlook. When a virus exhibits chaotic behavior, even minor variations in initial conditions can lead to drastically different outcomes, making prediction and control significantly more difficult. This study provides an in-depth analysis of the relationship between fractional calculus and chaotic dynamics, contributing to the development of more resilient digital defense mechanisms. Unlike normalized continuous-time fractional SIR models [23], which use the Caputo derivative, our model employs a discrete-time Caputo-like fractional difference operator. This approach is more appropriate for modeling digital systems like computer virus spread, where interactions naturally occur at discrete time intervals. The novelty of our work lies in constructing a fractional discrete SI model with both commensurate and incommensurate fractional orders and uncovering its chaotic behavior using advanced nonlinear tools. To the best of our knowledge, our model is the first to explore chaotic dynamics in a discrete fractional SI framework with both commensurate and incommensurate orders. This analysis enables a deeper understanding of virus dynamics and offers insights for designing more robust cybersecurity mechanisms.
The main contributions of this work are as follows:
  • We derive the stability conditions of the proposed fractional discrete SI model using the basic reproduction number R 0 , which helps predict whether a virus outbreak will persist or die out.
  • We examine the influence of both commensurate and incommensurate fractional orders on the system’s dynamics, emphasizing their ability to capture memory effects in digital virus propagation.
  • We apply several chaos detection and complexity analysis tools, including bifurcation diagrams, phase portraits, maximum Lyapunov exponents, spectral entropy, approximate entropy, and the 0 1 test for chaos, to reveal nonlinear and chaotic behaviors in the model.
  • We demonstrate through extensive numerical simulations that the model can exhibit chaos under specific parameter values, revealing the complex and unpredictable nature of virus spread in cyberspace.
The research in this study begins in Section 2 by establishing the necessary background on fractional calculus in discrete time and deriving the Caputo-like fractional discrete computer virus model. Section 3 then focuses on the model under commensurate and incommensurate fractional orders, analyzing its equilibrium points and their stability. Dynamical analysis and simulation results of the fractional model are considered in Section 4. Section 5 explores the complexity of chaos using the SE complexity algorithm, approximate entropy, and the 0 1 test. The paper concludes in Section 6, summarizing key results and outlining future work.

2. Theoretical Foundations and Model Description

This section is introduced with two subsections. The first provides essential background on discrete fractional calculus, while the second presents a detailed description of the proposed model.

2.1. Theoretical Foundations

Before constructing the fractional-order Computer Virus Model, a necessary introduction is provided by means of discrete fractional calculus. Specifically, the Caputo-like difference operator is introduced, that is, Δ ρ η c from [24], which will be central to the derivation and subsequent analysis of the fractional model.
The Caputo-like difference operator, Δ ρ η c , is defined as
Δ ρ η c χ ( σ ) = Δ ρ ( α η ) Δ α χ ( σ ) ,
such as σ N ρ + α η , and α = η + 1 . The fractional sum Δ ρ η is defined in [25] as
Δ ρ η χ ( σ ) = 1 Γ ( η ) ς = η σ η ( σ 1 ς ) ( η 1 ) χ ( ς ) .
Theorem 1
([26]). Regarding the delta fractional difference equation
Δ ρ η c χ ( σ ) = g ( σ + η 1 , χ ( σ + η 1 ) ) , Δ j χ ( ρ ) = χ j , α = η + 1 , j = 0 , , α 1 .
The corresponding integral equation in the discrete domain can be formulated as
χ ( σ ) = χ 0 ( σ ) + 1 Γ ( η ) ς = ρ + α η σ η ( σ ς 1 ) ( η 1 ) g ( σ + η 1 , χ ( σ + η 1 ) ) , σ N ρ + α ,
in which the initial iteration χ 0 ( σ ) takes the form
χ 0 ( σ ) = j = 0 α 1 ( σ ρ ) j Γ ( j + 1 ) Δ j χ ( ρ ) .
When ρ = 0 , α = 1 , j = ς + η 1 , and
( σ 1 ς ) ( η 1 ) = Γ ( σ ς ) Γ ( σ ς η + 1 ) ,
for η ( 0 , 1 ] , the above Equation (4) is numerically formulated as
χ ( σ ) = χ ( 0 ) + 1 Γ ( η ) j = 0 σ 1 Γ ( σ 1 + η j ) Γ ( σ j ) g ( j , χ ( j ) ) .

2.2. Model Description

The model considers three distinct states for computers within the network: susceptible (S(t)), infected (I(t)), and recovered (R(t)), based on [27,28,29,30]. Four parameters govern the transitions between these states: b (the rate of new computers joining), ϵ (recovery rate), d (removal rate), and λ (the infection rate).
d S d t = b λ S ( t ) I ( t ) d S ( t ) , d I d t = λ S ( t ) I ( t ) ϵ I ( t ) d I ( t ) , d R d t = ϵ I ( t ) d R ( t ) .
It is noteworthy that the recovered compartment R in System (8) exhibits no influence on the dynamics of the susceptible or infected compartments. Consequently, this study will be restricted to the following reduced system:
d S d t = b λ S ( t ) I ( t ) d S ( t ) , d I d t = λ S ( t ) I ( t ) ϵ I ( t ) d I ( t ) .
The discretization and dynamical analysis in this work are based on model (9). This choice is motivated by the discrete nature of real-world data, which makes discrete models more suitable for simulating virus transmission. To obtain a discrete approximation of model (9), the forward Euler scheme with a unit time step is employed, yielding
S ( σ + 1 ) = b λ S ( σ ) I ( σ ) d S ( σ ) + S ( σ ) , I ( σ + 1 ) = λ S ( σ ) I ( σ ) ϵ I ( σ ) d I ( σ ) + I ( σ ) .
Equation (10) provides a discrete-time approximation using the forward Euler method. This scheme is widely adopted due to its simplicity and effectiveness in digital simulations. The validity of this discretization is supported by its ability to preserve essential qualitative features of the continuous model, such as stability and positivity of solutions. Additionally, the accuracy of this method has been verified through extensive simulations and alignment with theoretical predictions. Convergence results for similar discrete schemes can be found in [24,25], further supporting the reliability of the adopted approach.
To highlight the dynamics in the first-order difference setting, we also present the classical discrete SI model as
Δ S ( σ ) = b λ S ( σ ) I ( σ ) d S ( σ ) , Δ I ( σ ) = λ S ( σ ) I ( σ ) ϵ I ( σ ) d I ( σ ) .
In light of the preceding considerations, attention is now turned to the analysis of the following discrete-time fractional model for the propagation of computer viruses using the Caputo-like difference operator:
Δ ρ η c S ( σ ) = b λ S ( σ + η 1 ) I ( σ + η 1 ) d S ( σ + η 1 ) , Δ ρ η c I ( σ ) = λ S ( σ + η 1 ) I ( σ + η 1 ) ϵ I ( σ + η 1 ) d I ( σ + η 1 ) .
where Δ ρ η c denotes the Caputo-like discrete fractional difference operator of order η with base point ρ .

3. Stability Analysis of Equilibria

Here, an analysis is carried out to assess the stability and dynamics of the fractional discrete computer virus system (12) under commensurate and incommensurate orders.
Setting ρ = 0 and applying Theorem 1, the fractional discrete model’s numerical Formula (12) is
S ( σ ) = S ( 0 ) + 1 Γ ( η ) j = 1 σ Γ ( σ j + η ) Γ ( σ j + 1 ) [ b λ S ( j 1 ) I ( j 1 ) d S ( j 1 ) ] , I ( σ ) = I ( 0 ) + 1 Γ ( η ) j = 1 σ Γ ( σ j + η ) Γ ( σ j + 1 ) [ λ S ( j 1 ) I ( j 1 ) ϵ I ( j 1 ) d I ( j 1 ) ] .
A crucial step in analyzing the dynamics of System (12) is determining its fixed points. To achieve this, it is necessary to solve the following nonlinear system:
b λ S I d S = 0 , λ S I ϵ I d I = 0 .
Equation (14) has a virus-free equilibrium E 0 = ( b d , 0 ) and a positive solution E * = ( ϵ + d λ , b ϵ + d d λ ) .
R 0 , identified as the basic reproduction number, is a fundamental epidemiological parameter that denotes the mean measure of new infections attributable to a single infective in a population of susceptible individuals. In the context of computer virus propagation, R 0 can be thought of as the average number of devices or systems that a single infected device will successfully compromise within a fully vulnerable network. An R 0 value greater than 1 indicates the potential for a virus to spread throughout the network, while a value less than 1 suggests that the virus is unlikely to propagate. R 0 is calculated using the dominant eigenvalue of the next-generation matrix FV 1 , as described in [31], where
F = 0 0 0 λ b d , and V = d λ b d 0 ϵ + d ,
so
FV 1 = 0 0 0 λ b d ( ϵ + d ) .
Calculating the eigenvalues of FV 1 yields the reproduction number
R 0 = λ b d ( ϵ + d ) ,
which implies S * = b d R 0 and I * = d λ ( R 0 1 ) .

3.1. The Commensurate Case

The next step is to establish sufficient conditions regarding the long-term stability of the two fixed points of System (12). Prior to examining stability, the following theorem is needed:
Theorem 2
([32]). Take into account the fractional difference system
Δ ρ η c χ ( σ ) = G χ ( σ + η 1 ) ,
where χ ( σ ) = ( χ 1 ( σ ) , , χ n ( σ ) ) T , 0 < η < 1 , and γ j , ( j = 1 , 2 , , n ) , are the eigenvalues of G R n × n . If all γ j , fulfill this condition
γ j , ϑ C : | ϑ | < 2 cos | arg ( ϑ ) | π 2 η η , a n d | arg ( ϑ ) | > η π 2 ,
then the asymptotic stability of the zero solution of (18) is achieved.
The zero equilibrium point’s stability in fractional discrete maps is able to be assessed following Theorem 2. However, for non-zero equilibrium points, a distinct approach is necessary. To this end, the following change of variables is considered.
X 0 ( σ + η 1 ) = S ( σ + η 1 ) S 0 , Y 0 ( σ + η 1 ) = I ( σ + η 1 ) I 0 , X * ( σ + η 1 ) = S ( σ + η 1 ) S * , Y * ( σ + η 1 ) = I ( σ + η 1 ) I * .
The transformation yields two new maps, both of which have a zero equilibrium
Δ ρ η c ( X 0 ( σ ) + S 0 ) = b λ ( X 0 ( σ + η 1 ) + b d ) Y 0 ( σ + η 1 ) d ( X 0 ( σ + η 1 ) + b d ) , Δ ρ η c ( Y 0 ( σ ) + I 0 ) = λ ( X 0 ( σ + η 1 ) + b d ) Y 0 ( σ + η 1 ) ϵ Y 0 ( σ + η 1 ) d Y 0 ( σ + η 1 ) ,
and
Δ ρ η c ( X * ( σ ) + S * ) = b λ ( X * ( σ + η 1 ) + S * ) ( Y * ( σ + η 1 ) + I * ) d ( X * ( σ + η 1 ) + S * ) , Δ ρ η c ( Y * ( σ ) + I * ) = λ ( X * ( σ + η 1 ) + S * ) ( Y * ( σ + η 1 ) + I * ) ϵ ( Y * ( σ + η 1 ) + I * ) d ( Y * ( σ + η 1 ) + I * ) .
Proposition 1.
The virus-free fixed point, denoted E 0 , of Model (12) is shown to be stable in a local asymptotic sense if the conditions outlined below are verified
d < 2 η , R 0 < 1 , | ( ϵ + d ) ( R 0 1 ) | < 2 η ,
Proof. 
Determining the Jacobian matrix for model (21) at the zero equilibrium point yields
J 0 = d λ b d 0 λ b d ϵ d ,
the corresponding characteristic equation:
( d γ ) λ b d ϵ d γ = 0 ,
the eigenvalues of J 0 are γ 1 = d and γ 2 = λ b d ϵ d = ( ϵ + d ) ( R 0 1 ) .
For γ 1 = d
| γ 1 | = d , | arg γ 1 | = π > κ π 2 ,
the condition | γ 1 | < 2 cos | arg γ 1 | π 2 η η = 2 η is satisfied if d < 2 η .
For γ 2 = ( ϵ + d ) ( R 0 1 )
| γ 2 | = | ( ϵ + d ) ( R 0 1 ) | , | arg γ 2 | = π ,
the condition | γ 2 | < 2 cos | arg γ 2 | π 2 η η = 2 η is satisfied if | ( ϵ + d ) ( R 0 1 ) | < 2 η , the condition | arg γ 2 | > κ π 2 , is satisfied if γ 2 < 0 i.e., R 0 < 1 .
So the hypothesis of Theorem 13 is satisfied; the virus-free fixed point of (12) reveals local asymptotic stability. □
Proposition 2.
Local asymptotic stability of E * is guaranteed if either one of the following two conditions is verified.
A 2 4 B , R 0 > 1 , | A ± A 2 4 B 2 | < 2 η ,
or
A 2 < 4 B , | γ 3 , 4 | < 2 cos | arg γ 3 , 4 | π 2 η η , | arg γ 3 , 4 | > η π 2 .
where A = R 0 d and B = λ b ( 1 1 R 0 ) .
Proof. 
The Jacobian matrix is computed
J * = λ I * d λ S * λ I * λ S * ϵ d ,
The characteristic equation determines the eigenvalues of J *
γ 2 + A γ + B = 0 ,
with
A = R 0 d and B = λ b ( 1 1 R 0 ) ,
which implies
γ 3 , 4 = 1 2 A ± A 2 4 B ,
for A 2 4 B The eigenvalues γ 3 , 4 have arguments of π when γ 3 , 4 < 0 which is fulfilled if
R 0 d > 0 , ( holds true because all the parameters are positive ) λ b ( 1 1 R 0 ) > 0 , i . e , R 0 > 1 ,
this leads to γ 3 , 4 = π > η π 2 . The condition | γ 3 , 4 | < 2 cos | arg γ 3 , 4 | π 2 η η = 2 η is valid if | A ± A 2 4 B 2 | < 2 η .
For A 2 < 4 B , in this case, γ 3 , 4 are complex. The requirements for stability hold true if
| γ 3 , 4 | < 2 cos | arg ( γ 3 , 4 ) | π 2 η η , and | arg ( γ 3 , 4 ) | > η π 2 .  
Example 1.
Consider System (12) with parameters ( b , λ , d , ϵ ) = ( 5 , 0.01 , 0.2 , 0.13 ) and η = 0.9 , which implies that R 0 = 0.75 < 1 . Figure 1a demonstrates the stability of E 0 = ( 25 , 0 ) .
Example 2.
Let System (12) with parameters ( b , λ , d , ϵ ) = ( 5 , 0.04 , 0.2 , 0.13 ) and η = 0.9 , which implies that R 0 = 3.03 > 1 . In Figure 1b, E * = ( 8.25 , 10.15 ) is confirmed to be stable.
Example 3.
Consider System (12) with parameters ( b , λ , d , ϵ ) = ( 20 , 0.04 , 0.2 , 0.13 ) and η = 0.4 , which implies that R 0 = 12.1212 . Figure 1c highlights the chaotic dynamics of the system characterized by irregular and unpredictable fluctuations in its states. This behavior is typical of systems with sensitive parameters and fractional order variations, where small changes can lead to significantly different outcomes.

3.2. The Incommensurate Case

The focus of this section is the discrete computer virus model with incommensurate fractional orders. In such systems, each equation is governed by a distinct fractional order. The model is represented as follows:
Δ ρ η 1 c S ( σ ) = b λ S ( σ + η 1 1 ) I ( σ + η 1 1 ) d S ( σ + η 1 1 ) , Δ ρ η 2 c I ( σ ) = λ S ( σ + η 2 1 ) I ( σ + η 2 1 ) ϵ I ( σ + η 2 1 ) d I ( σ + η 2 1 ) .
Theorem 1 yields the following numerical model for system (36):
S ( σ ) = S ( 0 ) + 1 Γ ( η 1 ) j = 1 σ Γ ( σ j + η 1 ) Γ ( σ j + 1 ) [ b λ S ( j 1 ) I ( j 1 ) d S ( j 1 ) ] , I ( σ ) = I ( 0 ) + 1 Γ ( η 2 ) j = 1 σ Γ ( σ j + η 2 ) Γ ( σ j + 1 ) [ λ S ( j 1 ) I ( j 1 ) ϵ I ( j 1 ) d I ( j 1 ) ] .
Here, the stability properties of the discrete computer virus model with incommensurate orders are explored. The theorem presented below serves as a basis for investigating the stability of discrete fractional nonlinear models with incommensurate orders.
Theorem 3
([33]). For the following system where 0 < η ι < 1 for ι = 1 , 2 , , n .
Δ 0 η 1 c χ 1 ( σ ) = Υ 1 ( χ ( σ + η 1 1 ) ) , Δ 0 η 2 c χ 2 ( σ ) = Υ 2 ( χ ( σ + η 2 1 ) ) , Δ 0 η n c χ n ( σ ) = Υ n ( χ ( σ + η n 1 ) ) ,
where Υ = ( Υ 1 , Υ 2 , , Υ n ) : R n R n and χ ( σ ) = ( χ 1 ( σ ) , χ 2 ( σ ) , , χ n ( σ ) ) T R n . M is the LCM of the denominators ς ι of η ι , where η ι = ϵ ι ς ι , ( ϵ ι , ς ι ) = 1 and ϵ ι , ς ι Z + for ι = 1 , 2 , , n . Put i = 1 M .
det diag ( γ M η 1 , γ M η 2 , , γ M η n ) ( 1 γ M ) J = 0 ,
such that J is the Jacobian matrix of (38). If all eigenvalues of Equation (39) remain within C \ Ł i , Then, system (38) has a locally asymptotically stable trivial solution, such that
Ł i = l C : | l | 2 cos | arg ( l ) | i i , and | arg ( l ) | i π 2 ,
Example 4.
Consider system (36) with parameters ( b , λ , d , ϵ ) = ( 5 , 0.01 , 0.2 , 0.13 ) , it follows that
J 0 = 0.2 0.25 0 0.75 ,
Let ( η 1 , η 2 ) = ( 0.68 , 0.86 ) , which implies that M = 50 ,
det γ 34 0 0 γ 43 ( 1 γ 50 ) J 0 = 0 ,
equivalent to
1 20 ( γ 50 + 5 γ 34 + 1 ) ( 3 γ 50 + 4 γ 43 + 3 ) = 0 .
Solving Equation (43) yields 100 solutions, γ j ( j = 1 , , 100 ) . All solutions remain within C \ Ł 1 50 . Theorem 3 proves the local asymptotic stability of E 0 .
Example 5.
Consider System (36) with parameters ( b , λ , d , ϵ ) = ( 5 , 0.04 , 0.2 , 0.13 ) , it follows that
J * = 0.606 0.33 0.406 0 ,
Let ( η 1 , η 2 ) = ( 0.68 , 0.86 ) , which implies that M = 50 ,
det γ 34 0 0 γ 43 ( 1 γ 50 ) J * = 0 ,
equivalent to
6699 50000 γ 100 303 500 γ 93 + γ 77 6699 25000 γ 50 + 303 500 γ 43 + 6699 50000 = 0 .
Solving Equation (46) yields 100 solutions, γ j ( j = 1 , , 100 ) . All solutions remain in C \ Ł 1 50 . Theorem 3 demonstrates the local asymptotic stability of E * .
Example 6.
Consider System (36) with parameters ( b , λ , d , ϵ ) = ( 20 , 0.04 , 0.2 , 0.13 ) , it follows that
J 0 = 0.2 4 0 3.67 ,
Let ( η 1 , η 2 ) = ( 0.68 , 0.86 ) , which implies that M = 50 ,
det γ 34 0 0 γ 43 ( 1 γ 50 ) J 0 = 0 ,
equivalent to
1 500 ( γ 50 + 5 γ 34 + 1 ) ( 367 γ 50 + 100 γ 43 367 ) = 0 .
Solving Equation (49) yields 100 solutions, γ j ( j = 1 , , 100 ) . Specifically, γ 1 = 0.99504 Ł 1 50 , satisfying | γ 1 | 2 cos ( 50 | arg ( γ 1 ) | ) 1 50 , and | arg ( γ 1 ) | π 100 . Theorem 3 provides a sufficient condition for the instability of E 0 . And we have
J * = 2.4242 0.33 2.22424 0 ,
thus,
det γ 34 0 0 γ 43 ( 1 γ 50 ) J * = 0 ,
equivalent to
917499 1250000 γ 100 12121 5000 γ 93 + γ 77 917499 625000 γ 50 + 12121 5000 γ 43 + 917499 1250000 = 0 .
Solving Equation (52) yields 100 solutions, γ j ( j = 1 , , 100 ) . There’s γ 1 = 1.010355 Ł 1 50 , satisfying | γ 1 | 2 cos ( 50 | arg ( γ 1 ) | ) 1 50 , and | arg ( γ 1 ) | π 100 . By Theorem 3, E 0 is unstable.
Based on the above, the computer virus incommensurate Model (36) is shown to satisfy a requirement for a chaotic attractor. Figure 2 shows the state evolution for the incommensurate Model (36) of the three previous examples with ( η 1 , η 2 ) = ( 0.68 , 0.86 ) . In the following section, advanced analytical and numerical tools, such as Lyapunov exponents, bifurcation analysis, or phase space reconstruction, are necessary to fully understand and characterize its dynamics.

4. Dynamical Analysis and Simulation Results

The dynamics of System (12) will be characterized using numerical simulations, focusing on phase space representations, bifurcation diagrams, and the principal Lyapunov exponent (MLE) calculations, with the latter being determined via the Jacobian matrix algorithm [34]. A positive MLE indicates sensitive dependence on initial conditions, which signifies chaos. By definition, the Lyapunov exponent is
L E ι = lim σ 1 σ ln | λ ι ( σ ) | , f o r ι = 1 , 2 , 3 .
where λ ι ( ι = 1 , 2 , 3 ) are the tangent map’s eigenvalues J σ .
J σ = f 1 ( σ ) f 2 ( σ ) k 1 ( σ ) k 2 ( σ ) ,
such that
f ι ( σ ) = f ι ( 0 ) + 1 Γ ( η ) j = 1 σ Γ ( σ j + η ) Γ ( σ j + 1 ) ( ( λ I ( j 1 ) d ) f ι ( j 1 ) λ S ( j 1 ) k ι ( j 1 ) ) , k ι ( σ ) = k ι ( 0 ) + 1 Γ ( η ) j = 1 σ Γ ( σ j + η ) Γ ( σ j + 1 ) ( λ I ( j 1 ) f ι ( j 1 ) + ( λ S ( j 1 ) ϵ d ) k ι ( j 1 ) ) ,
using the identity matrix as initial conditions
f 1 ( 0 ) f 2 ( 0 ) k 1 ( 0 ) k 2 ( 0 ) = 1 0 0 1 .

4.1. Commensurate Order Case

An investigation is conducted into the dynamic behavior variations of the proposed system (12) by constructing bifurcation diagrams; this approach allows visualization of the system’s long-term behavior as the parameter changes. Initially, the state is ( S ( 0 ) , I ( 0 ) ) = ( 40 , 30 ) , the parameters used in the simulations are ( b , λ , d , ϵ ) = ( 20 , 0.04 , 0.2 , 0.13 ) , and the commensurate order, denoted by η , is treated as the main bifurcation and sensitivity value due to its intrinsic role in governing the system’s memory and long-range interaction effects. By varying η while keeping other model parameters constant, we were able to observe rich dynamical behaviors, including transitions from steady-state to periodic and chaotic regimes. This sensitivity to η highlights its fundamental influence on the system’s stability and complexity. The resulting bifurcation diagram and the corresponding MLEs are seen in Figure 2. The bifurcation charts in Figure 3a,b depict system behavior for varying η inside the interval [ 0 , 1 ] . These diagrams showcase various dynamical regimes, including stable fixed points, periodic oscillations, and chaotic dynamics. For small values of η (approximately η < 0.2 ), the system shows stable behavior, marked by a single fixed point or periodic oscillations. As η increases beyond this range, a series of period-doubling bifurcations occurs, leading to the emergence of chaos around η = 0.25 . The chaotic regime is evident in the bifurcation diagrams, where the state variable displays an irregular and dense structure, reflecting initial condition sensitivity. This chaotic behavior persists roughly in the range 0.25 η 0.7 , during which the system exhibits complex, non-periodic oscillations. The transition from order to chaos is further supported by the MLEs plot in Figure 2c. For η < 0.2 , the MLE remains negative, confirming stability. As η approaches 0.25 , the MLE crosses zero and becomes positive, signaling the onset of chaos. The chaotic regime is most pronounced in the interval 0.25 η 0.7 , where the MLE remains significantly positive, peaking around η = 0.5 . This indicates a high degree of unpredictability and sensitivity to initial conditions. Beyond η = 0.7 , the system gradually transitions back to stability, as indicated by decreasing MLE values. For η > 0.8 , the MLE becomes negative again, suggesting a return to periodic or fixed-point behavior. This demonstrates that while moderate values of η induce chaotic dynamics, higher values restore stability.
The commensurate fractional discrete computer virus System (12) exhibits a range of dynamical behaviors, as illustrated by the phase portraits in Figure 4. For different values of η , the figure shows chaos at lower fractional orders η values. The choice of fractional orders in our simulations was guided by the goal of exploring transitions in system dynamics. Specific values were selected to capture the onset of chaotic behavior, as verified by positive Lyapunov exponents. These numerical simulations highlight the system’s interesting dynamical properties. The oscillatory nature is due to nonlinearity and fractional memory, especially when chaos emerges. Fractional-order systems are known to exhibit oscillations even in the absence of external forcing.
In summary, these findings emphasize the significant contribution of the fractional derivative parameter η in shaping the system’s complexity. The occurrence of bifurcations and chaos within specific intervals highlights the rich dynamical behavior of fractional-order models, making them particularly valuable for studying complex systems. The capacity of fractional-order models to effectively simulate the delayed propagation and reinfection cycles characteristic of known computer worms, such as WannaCry or Conficker, positions them as a suitable tool for cyber-epidemiological forecasting. This ability underscores the significant role of fractional calculus in providing deeper insights into the intricate dynamics of digital epidemics. By offering a more nuanced understanding of virus transmission patterns, these models can ultimately aid in the development of more advanced and effective cybersecurity strategies.

4.2. Incommensurate Order Case

Combined analysis of the bifurcation diagrams (Figure 5a,b) and the largest Lyapunov exponent plot (Figure 5c) reveals the complex dynamics of the incommensurate System (36) as the fractional order parameter η 1 is varied, with η 2 fixed at 0.86 . For small values of η 1 in the range [ 0.25 , 0.55 ] , the system displays chaos, as indicated by the dense and irregular patterns in the bifurcation diagrams. This chaotic regime is further confirmed by the MLE plot, where the exponent remains positive, signifying sensitive dependence on initial conditions. As η 1 increases beyond approximately 0.55 , the system transitions from chaos to periodic behavior through a period-doubling route, with distinct branches emerging in the bifurcation diagrams. This transition is also evident in the MLE plot Figure 5c, where the exponent gradually decreases and becomes negative around η 1 = 0.7 , indicating the system’s stabilization. For η 1 > 0.7 , the system enters a periodic or steady-state regime, characterized by well-defined trajectories.
Figure 6 provides a comprehensive view of the dynamic behavior of an incommensurate system as the fractional order η 2 is varied, while η 1 is held constant at 0.68 . The bifurcation diagrams in Figure 6a,b depict the system’s response to changes in η 2 , showcasing a rich tapestry of periodic windows interspersed with chaotic regions. This intricate pattern suggests a high sensitivity to variations in η 2 , implying that even small changes in this parameter can significantly alter the system’s long-term behavior. Further evidence of this sensitivity is provided by the Maximum Lyapunov Exponent plot in Figure 6c. The MLE, a crucial indicator of chaoticity, fluctuates between positive and negative values. Positive MLE values signify chaotic behavior, marked by sensitivity to initial conditions, while negative values indicate periodic or stable behavior. The observed fluctuations in the MLE confirm the system’s tendency to transition between these distinct dynamical regimes as η 2 is adjusted. This dynamic interplay between order and chaos underscores the complex nature of the system and its intricate response to parameter variations. In essence, Figure 6 reveals a system with a delicate balance between order and chaos, while Figure 7 shows various phase portraits for different incommensurate orders. The bifurcation diagrams and the MLE plot collectively demonstrate that the system’s behavior is remarkably sensitive to fractional order η 2 changes. These findings highlight the significant role of the fractional parameter in governing the system’s stability and complexity. Understanding the transition between chaotic and periodic behavior provides critical insights into computer virus propagation dynamics, aiding in the development of more effective cybersecurity strategies and mitigation techniques. In contrast, statistical-fitting approaches (e.g., [35]), while accurate in reproducing specific outbreak curves, do not capture the memory-dependent and chaotic behavior observed in real-world propagation scenarios. The model adds dynamic interpretability and flexibility through its fractional-order structure, allowing it to simulate a wider range of propagation patterns through parameter tuning.

4.3. Simulation Results

To rigorously address concerns regarding the real-world applicability of our fractional-order model to computer virus propagation (12), we introduce a comprehensive case study focusing on the Stuxnet worm. This prominent real-world virus targeted industrial control systems, with its 2010 outbreak in Iran serving as a critical dataset for model validation. The empirical data describing Stuxnet’s spread were obtained from Masood et al. [36], and we carefully calibrated the parameters of our fractional model to align with this time series. Table 1 and Table 2 present the parameter values and initial conditions used in the simulations, respectively.
The numerical simulations were performed using a step size of h = 10 6 to ensure high accuracy in approximating the fractional-order differences. As shown in Figure 8, the simulation results generated by our model exhibit strong agreement with the actual diffusion trajectory of Stuxnet. The model accurately captures the early exponential growth, the inflection point, and the eventual saturation behavior hallmarks of real-world virus propagation. This close correspondence between simulation and observation confirms that the proposed fractional-order model effectively represents the dynamics of real computer virus outbreaks, thereby reinforcing its practical relevance and directly addressing the reviewer’s concerns.
The numerical simulation of the discrete fractional-order SI model is based on the Caputo-like difference operator. The algorithm follows a step-by-step iterative scheme to compute the values of S ( σ ) and I ( σ ) over time. The procedure can be summarized as follows:
  • Set the initial conditions S ( 0 ) , I ( 0 ) , and parameters ( b , λ , d , ϵ ) .
  • Set the fractional order η and total simulation steps N.
  • For each time step σ = 0 to N:
    • Compute the fractional sums according to the Caputo-like formula:
      Δ ρ η c f ( σ ) = Δ ρ ( δ η ) Δ δ f ( σ )
    • Update S ( σ + 1 ) and I ( σ + 1 ) using the model equations.
  • Save or plot the values at each step for bifurcation, chaos, and entropy analyses.
The simulation flowchart is given in the next Figure 9.

5. Complexity Algorithms

The complexity of chaotic behavior is analyzed to evaluate chaotic systems.Using the spectral and approximate entropy algorithms, a complexity analysis is performed on the fractional discrete virus model, and the 0 − 1 test confirms the occurrence of chaos.

5.1. 0 1 Test

To discern chaos from regularity behavior, the 0−1 test is applied, which was developed by Gottwald and Melbourne [37]. Inputting time series data, the test yields an output close to 1 for chaotic dynamics and close to 0 for regular behavior. The test is described below.
The first step is to use the time series φ ( n ) for n = 1 , 2 , , N to define the translation variables in the following manner:
p c ( k ) = n = 1 k φ ( n ) cos ( i c ) ; q c ( k ) = n = 1 k φ ( n ) sin ( i c ) ; k = 1 , 2 , , N .
The fractional discrete computer virus model exhibits either regular or chaotic behavior, which is determined using the ( p c q c ) chart. Regular dynamics are associated with bounded trajectories of p c and q c , while chaotic dynamics are characterized by Brownian-like motion. The mean square displacement formula, used in this analysis, is given by
M c ( k ) = 1 N n = 1 N ( p c ( n + k ) p c ( n ) ) 2 + ( q c ( n + k ) q c ( n ) ) 2 , k N 10 .
Asymptotic growth is represented in the final step as follows:
K c = lim k log M c log k .
The growth rate k = m e d i a n ( K c ) is vital in distinguishing the onset of chaotic motion from a nonchaotic state in the proposed model (12). Specifically, when the value of k is close to 0, it indicates that the model exhibits nonchaotic behavior. Conversely, as the value of k goes to 1, it indicates that the model’s dynamics are chaotic.
Both the commensurate (12) and incommensurate (36) order computer virus models are examined for chaotic behavior using ( p q ) plots. The results, shown in Figure 10 for the parameter values used ( b , λ , d , ϵ ) = ( 20 , 0.04 , 0.2 , 0.13 ) , (a) with η = 0.4 , (b) with η = 0.9 , and (c) with the incommensurate derivatives η 1 = 0.63 , η 2 = 0.86 . It reveals a clear distinction between periodic behavior (bounded trajectories, Figure 10b) and chaotic motion (Brownian-like trajectories, Figure 10a,c).

5.2. Spectral Entropy Test

Spectral Entropy (SE) measures disorder in the frequency domain [38]. Higher SE values, corresponding to flatter power spectra, indicate greater time series complexity. SE is calculated as follows: For a discrete time series { x ( σ ) , σ = 0 , 1 , 2 , , N 1 } of length N, the mean-adjusted series is x ( σ ) = x ( σ ) x ¯ , where x ¯ is the mean. The Discrete Fourier Transform (DFT) is given by
χ ( k ) = σ = 0 N 1 x ( σ ) e 2 j π σ k / N ,
where k takes values from 0 to N 1 , and j is the imaginary unit. The frequency spectrum at frequency index k is given by | χ ( k ) | 2 , and the normalized probability distribution of the spectral power is defined as
P k = | χ ( k ) | 2 k = 0 N / 2 1 | χ ( k ) | 2 ,
Applying the DFT, corresponding to k values from 0 to N / 2 1 . The spectral entropy is then represented as
S E = k = 0 N / 2 1 P k ln ( P k ) ln ( N / 2 ) ,
where ln ( N / 2 ) represents random signal entropy.
Given the parameter values ( b , λ , d , ϵ ) = ( 20 , 0.01 , 0.2 , 0.8 ) , the SE complexity analysis outcomes for the fractional System (12), across a range of derivative orders, are shown in Figure 11.
Fractional orders clearly influence system dynamics. Figure 11a demonstrates that the commensurate model (12) achieves a high complexity level when η [ 0.18 , 0.45 ] . Similarly, as shown in Figure 11b, for η 2 = 0.86 , the complexity of (36) varies with η 1 . Notably, when η 1 nears 0.62 , the system reaches its highest complexity. Additionally, in Figure 11c, the impact of η 2 can be observed on the dynamic behavior when η 1 = 0.68 . It is evident that complexity increases as η 2 varies, reaching its peak when η 2 approaches 1. These observations align with the findings from the largest Lyapunov exponent. Thus, for complex real-world applications, choosing appropriate fractional orders is crucial.

5.3. Approximate Entropy Test

The complexity of the commensurate (12) and incommensurate (36) computer virus models is analyzed using Approximate Entropy (ApEn). ApEn is a method for quantifying disorder and unpredictability in time series; higher ApEn values indicate greater complexity and chaotic behavior, and its algorithm is described in reference [39] as
A p E n = Υ n ( r ) Υ n + 1 ( r ) ,
such as Υ n ( r ) is given by
Υ n ( r ) = 1 m n + 1 ι = 1 m n + 1 log C ι n ( r ) ,
where r = 0.2 s t d ( χ ) and m = 2 , the standard deviation of the data χ is denoted by s t d ( χ ) . Figure 12 presents the Approximate Entropy (ApEn) for both the commensurate (12) and incommensurate (36) models. The analysis was performed with ( b , λ , d , ϵ ) = ( 20 , 0.01 , 0.2 , 0.8 ) . Specifically, the figure shows ApEn as a function of η (Figure 12a), η 1 with η 2 fixed at 0.86 (Figure 12b), and η 2 with η 1 fixed at 0.68 (Figure 12c). The high ApEn values observed in both models demonstrate significant complexity, consistent with both the ApEn calculation itself and the observed system behavior. Furthermore, positive MLE values confirm the presence of chaos, while the ApEn values quantify the associated disorder and unpredictability. The MLE and ApEn analyses show a strong correlation in their characterization of the system’s dynamics. To demonstrate the added value of fractional-order modeling, we compare the dynamics of the proposed model with its classical integer-order counterpart. The fractional model exhibits richer and more complex dynamics, as evidenced by bifurcation behavior and entropy measures.

6. Conclusions and Future Directions

This study investigates the stability and chaotic dynamical behavior exhibited by a fractional discrete SI model designed for computer viruses, focusing on both commensurate and incommensurate fractional orders. By leveraging fractional calculus, long-term dependencies in virus transmission are captured, offering a more realistic depiction of digital epidemics. The stability analysis, based on the reproduction number R 0 , delineates the conditions under which the virus spreads is either contained or persists.
Moreover, numerical investigations reveal that the system exhibits chaotic behavior in certain parameter regimes, with commensurate and incommensurate fractional orders introducing more intricate and unpredictable dynamics. To systematically examine the chaotic nature of the model, multiple analytical techniques were employed, including bifurcation diagrams, phase portraits, and the maximum Lyapunov exponent. Sophisticated complexity algorithms confirmed the system’s nonlinear and chaotic nature, utilizing spectral entropy, approximate entropy, and the 0 1 test. These tools provided a comprehensive characterization of the system’s nonlinear behavior, confirming that fractional order plays a crucial role in shaping the model’s dynamical properties. The findings indicate that fractional orders contribute to heightened complexity, emphasizing the need for advanced cybersecurity strategies to address unpredictable virus propagation.
While the current study initially focused on theoretical development and numerical analysis, a critical step towards demonstrating its practical utility involved bridging the gap to real-world applicability by applying the model to the well-documented case of the Stuxnet worm. Using empirical time-series data from Masood et al. [36], the parameters were calibrated, and the fractional-order model was shown to accurately reproduce the virus’s diffusion trajectory. This real-world validation highlights the model’s practical potential.
Although retrospective modeling approaches, such as the one by Milošević [35], offer valuable statistical descriptions of cyberattacks, they often lack dynamic interpretability and flexibility. In contrast, the fractional-order framework proposed here offers a dynamic and tunable structure that can simulate complex virus behaviors, including chaos via memory effects and fractional parameters. Although tailored for computer virus propagation, the proposed model structure can be adapted to study biological epidemics by redefining the compartments and transition parameters, making it broadly applicable in epidemiological modeling.
In future work, this validation will be extended to other real cyber threats, such as Conficker or WannaCry, and the generalizability of the model across different virus types will be explored. Plans also include integrating optimization-based data-fitting techniques to refine parameter estimation and collaborating with cybersecurity professionals to evaluate the model’s integration into early detection systems, response mechanisms, and cryptographic schemes that leverage chaotic dynamics. By building on real-world data, the aim is to further enhance the impact of this model on both theoretical understanding and practical cybersecurity applications.

Author Contributions

Conceptualization, M.A.H. and G.G.; Methodology, I.Z.; Software, I.Z.; Validation, G.G.; Formal analysis, I.Z. and G.G.; Investigation, I.Z. and A.O.; Resources, M.A.H. and A.O.; Data curation, M.A.H. and A.O.; Writing—original draft, I.Z.; Writing—review & editing, M.A.H., A.O. and G.G.; Visualization, I.Z.; Supervision, A.O.; Project administration, A.O.; Funding acquisition, M.A.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article; further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Cohen, F. Computer viruses: Theory and experiments. Comput. Secur. 1987, 6, 22–35. [Google Scholar] [CrossRef]
  2. Szor, P. The Art of Computer Virus Research and Defense; Addison-Wesley: Boston, MA, USA, 2005. [Google Scholar]
  3. Aycock, J. Computer Viruses and Malware; Springer: Berlin, Germany, 2006. [Google Scholar]
  4. Islam, R.; Tian, R.; Batten, L.; Versteeg, S. Classification of malware based on ensemble learning. Inf. Secur. Technol. Rep. 2013, 18, 112–122. [Google Scholar]
  5. Denning, D.E. Information Warfare and Security; Addison-Wesley: Boston, MA, USA, 1999. [Google Scholar]
  6. Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Privacy 2011, 9, 49–51. [Google Scholar] [CrossRef]
  7. Rad, B.B.; Masrom, M.; Ibrahim, S. Camouflage in malware: From encryption to metamorphism. Int. J. Comput. Sci. Network Secur. 2012, 12, 74–83. [Google Scholar]
  8. Pastor-Satorras, R.; Vespignani, A. Epidemic spreading in scale-free networks. Phys. Rev. Lett. 2001, 86, 3200. [Google Scholar] [CrossRef] [PubMed]
  9. Newman, M.E.J. The spread of epidemic disease on networks. Phys. Rev. E 2002, 66, 016128. [Google Scholar] [CrossRef] [PubMed]
  10. Liu, Z.; Zhang, T. Epidemic dynamics of computer viruses. Appl. Math. Comput. 2007, 186, 184–192. [Google Scholar]
  11. Diethelm, K.; Ford, N.J. Analysis of fractional differential equations. J. Math. Anal. Appl. 2002, 265, 229–248. [Google Scholar] [CrossRef]
  12. Chen, Z.; Gao, L.; Kwiat, K. Modeling the spread of active worms. In Proceedings of the IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), San Francisco, CA, USA, 30 March–3 April 2003; Volume 3, pp. 1890–1900. [Google Scholar]
  13. Kilbas, A.A.; Srivastava, H.M.; Trujillo, J.J. Theory and Applications of Fractional Differential Equations; Elsevier: Amsterdam, The Netherlands, 2006. [Google Scholar]
  14. Khennaoui, A.A.; Ouannas, A.; Batiha, I.M.; Pham, V.T. Chaos in Fractional-Order Difference Systems; Elsevier: Amsterdam, The Netherlands, 2022. [Google Scholar]
  15. Tarasov, V.E. Fractional Dynamics: Applications of Fractional Calculus to Dynamics of Particles, Fields, and Media; Springer: Berlin, Germany, 2008. [Google Scholar]
  16. Dababneh, A.; Djenina, N.; Ouannas, A.; Grassi, G.; Batiha, I.M.; Jebril, I.H. A New Incommensurate Fractional-Order Discrete COVID-19 Model with Vaccinated Individuals Compartment. Fractal Fract. 2022, 6, 456. [Google Scholar] [CrossRef]
  17. Abbes, A.; Ouannas, A.; Shawagfeh, N.; Jahanshahi, H. The fractional order discrete COVID-19 pandemic model: Stability and chaos. Nonlinear Dyn. 2022, 107, 1787–1804. [Google Scholar] [CrossRef] [PubMed]
  18. Baleanu, D.; Diethelm, K.; Scalas, E.; Trujillo, J.J. Fractional Calculus: Models and Numerical Methods; World Scientific: Singapore, 2012. [Google Scholar]
  19. Oustaloup, A. Diversity and Non-Integer Differentiation for System Dynamics; Springer: Berlin, Germany, 2014. [Google Scholar]
  20. Li, Y.; Chen, Y.Q.; Podlubny, I. Stability of fractional-order nonlinear dynamic systems: Lyapunov direct method and generalized Mittag-Leffler stability. Comput. Math. Appl. 2009, 59, 1810–1821. [Google Scholar] [CrossRef]
  21. Wu, G.C.; Baleanu, D.; Xie, H.P. Discrete fractional calculus and its applications. Phys. Lett. A 2015, 379, 660–663. [Google Scholar]
  22. Zhang, S.; Wang, X.; Tang, M. Fractional-order epidemic models on complex networks with applications to computer viruses. Appl. Math. Comput. 2018, 328, 260–275. [Google Scholar]
  23. Kim, J. Influence of Fractional Order on the Behavior of a Normalized Time-Fractional SIR Model. Mathematics 2024, 12, 3081. [Google Scholar] [CrossRef]
  24. Abdeljawad, T. On Riemann and Caputo fractional differences. Comput. Math. Appl. 2011, 62, 1602–1611. [Google Scholar] [CrossRef]
  25. Atici, F.M.; Eloe, P. Discrete fractional calculus with the nabla operator. Electron. J. Qual. Theory Differ. Equ. 2009, 62, 1–14. [Google Scholar] [CrossRef]
  26. Anastassiou, G.A. Principles of delta fractional calculus on time scales and inequalities. Math. Comput. Model. 2010, 52, 556–566. [Google Scholar] [CrossRef]
  27. Kephart, J.O.; Hogg, T.; Huberman, B.A. Dynamics of computational ecosystems. Phys. Rev. A 1998, 40, 404–421. [Google Scholar] [CrossRef] [PubMed]
  28. Wierman, J.C.; Marchette, D.J. Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction. Comput. Stat. Data Anal. 2004, 45, 3–23. [Google Scholar] [CrossRef]
  29. Piqueira, J.R.C.; Araujo, V.O. A modified epidemiological model for computer viruses. Appl. Math. Comput. 2009, 213, 355–360. [Google Scholar] [CrossRef]
  30. Ren, J.; Yang, X.; Zhu, Q.; Yang, L.X.; Zhang, C. A novel computer virus model and its dynamics. Nonlinear Anal. Real World Appl. 2012, 13, 376–384. [Google Scholar] [CrossRef]
  31. Van den Driessche, P.; Watmough, J. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. Math. Biosci. 2002, 180, 29–48. [Google Scholar] [CrossRef] [PubMed]
  32. Čermák, J.; Győri, I.; Nechvátal, L. On explicit stability conditions for a linear fractional difference system. Electron. J. Qual. Theory Differ. Equ. 2015, 18, 651–672. [Google Scholar] [CrossRef]
  33. Shatnawi, M.T.; Djenina, N.; Ouannas, A.; Batiha, I.M.; Grassi, G. Novel convenient conditions for the stability of nonlinear incommensurate fractional-order difference systems. Alex. Eng. J. 2022, 61, 1655–1663. [Google Scholar] [CrossRef]
  34. Wu, G.C.; Baleanu, D. Jacobian matrix algorithm for Lyapunov exponents of the discrete fractional maps. Commun. Nonlinear Sci. Numer. Simul. 2015, 22, 95–100. [Google Scholar] [CrossRef]
  35. Milošević, D. Stuxnet propagation modeling using parameterized statistical distributions. Cent. Eur. J. Inf. Technol. 2020, 7, 125–134. [Google Scholar]
  36. Masood, Z.; Raja, M.A.Z.; Chaudhary, N.I.; Cheema, K.M.; Milyani, A.H. Fractional dynamics of Stuxnet virus propagation in industrial control systems. Mathematics 2021, 9, 2160. [Google Scholar] [CrossRef]
  37. Gottwald, G.A.; Melbourne, I. The 0-1 test for chaos: A review Chaos detection and predictability. Chaos Detect. Predict. 2016, 915, 221–247. [Google Scholar]
  38. He, S.; Sun, K.; Wang, H. Complexity analysis and DSP implementation of the fractional-order Lorenz hyperchaotic system. Entropy 2015, 17, 8299–8311. [Google Scholar] [CrossRef]
  39. Richman, J.S.; Moorman, J.R. Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol. Heart Circ. Physiol. 2000, 278, H2039–H2049. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Evolution of states of the commensurate discrete Model (12): (a) Example 1, (b) Example 2, (c) Example 3.
Figure 1. Evolution of states of the commensurate discrete Model (12): (a) Example 1, (b) Example 2, (c) Example 3.
Algorithms 18 00444 g001
Figure 2. Evolution of states of the incommensurate discrete Model (36); (a) Example 4, (b) Example 5, (c) Example 6.
Figure 2. Evolution of states of the incommensurate discrete Model (36); (a) Example 4, (b) Example 5, (c) Example 6.
Algorithms 18 00444 g002
Figure 3. (a,b) Bifurcation charts of the commensurate system (12) as the fractional order parameter η varies. (c) The associated MLE.
Figure 3. (a,b) Bifurcation charts of the commensurate system (12) as the fractional order parameter η varies. (c) The associated MLE.
Algorithms 18 00444 g003
Figure 4. Phase space of the commensurate model (12) for varying η ; (a) η = 0.1 , (b) η = 0.3 , (c) η = 0.4 , (d) η = 0.5 , (e) η = 0.55 , (f) η = 0.58 .
Figure 4. Phase space of the commensurate model (12) for varying η ; (a) η = 0.1 , (b) η = 0.3 , (c) η = 0.4 , (d) η = 0.5 , (e) η = 0.55 , (f) η = 0.58 .
Algorithms 18 00444 g004
Figure 5. (a,b) Bifurcation charts of the incommensurate system (36) as the fractional order parameter η 1 varies where η 2 = 0.86 . (c) The associated MLE.
Figure 5. (a,b) Bifurcation charts of the incommensurate system (36) as the fractional order parameter η 1 varies where η 2 = 0.86 . (c) The associated MLE.
Algorithms 18 00444 g005
Figure 6. (a,b) Bifurcation charts of the incommensurate system (36) as the fractional order parameter η 2 varies where η 1 = 0.68 . (c) The associated MLE.
Figure 6. (a,b) Bifurcation charts of the incommensurate system (36) as the fractional order parameter η 2 varies where η 1 = 0.68 . (c) The associated MLE.
Algorithms 18 00444 g006
Figure 7. Phase space of the incommensurate map (36); (a) η 1 = 0.4 , η 2 = 0.52 , (b) η 1 = 0.7 , η 2 = 0.9 , (c) η 1 = 0.36 , η 2 = 0.4 , (d) η 1 = 0.63 , η 2 = 0.86 , (e) η 1 = 0.68 , η 2 = 0.94 , (f) η 1 = 0.68 , η 2 = 1 .
Figure 7. Phase space of the incommensurate map (36); (a) η 1 = 0.4 , η 2 = 0.52 , (b) η 1 = 0.7 , η 2 = 0.9 , (c) η 1 = 0.36 , η 2 = 0.4 , (d) η 1 = 0.63 , η 2 = 0.86 , (e) η 1 = 0.68 , η 2 = 0.94 , (f) η 1 = 0.68 , η 2 = 1 .
Algorithms 18 00444 g007
Figure 8. Simulation of the Stuxnet virus propagation using the proposed fractional discrete computer virus model (36) with real-world data: the blue line represents the Susceptible population, and the red line represents the Infected population (a) case 1 with η = 0.5 , (b) case 2 with η = 0.65 , (c) case 3 with η = 0.8 , (d) case 4 with η = 0.95 .
Figure 8. Simulation of the Stuxnet virus propagation using the proposed fractional discrete computer virus model (36) with real-world data: the blue line represents the Susceptible population, and the red line represents the Infected population (a) case 1 with η = 0.5 , (b) case 2 with η = 0.65 , (c) case 3 with η = 0.8 , (d) case 4 with η = 0.95 .
Algorithms 18 00444 g008
Figure 9. Flowchart of the numerical algorithm for simulating the fractional-order discrete model using the Caputo-like difference operator.
Figure 9. Flowchart of the numerical algorithm for simulating the fractional-order discrete model using the Caputo-like difference operator.
Algorithms 18 00444 g009
Figure 10. 0 1 Test of the fractional discrete model for ( b , λ , d , ϵ ) = ( 20 , 0.04 , 0.2 , 0.13 ) with (a) η = 0.4 , (b) η = 0.9 , (c) η 1 = 0.63 , η 2 = 0.86 .
Figure 10. 0 1 Test of the fractional discrete model for ( b , λ , d , ϵ ) = ( 20 , 0.04 , 0.2 , 0.13 ) with (a) η = 0.4 , (b) η = 0.9 , (c) η 1 = 0.63 , η 2 = 0.86 .
Algorithms 18 00444 g010
Figure 11. SE Complexity of (12) (a) as a function of η , (b) as a function of η 1 with η 2 = 0.86 , (c) as a function of η 2 with η 1 = 0.68 .
Figure 11. SE Complexity of (12) (a) as a function of η , (b) as a function of η 1 with η 2 = 0.86 , (c) as a function of η 2 with η 1 = 0.68 .
Algorithms 18 00444 g011
Figure 12. ApEn of (12) (a) as a function of η , (b) as a function of η 1 with η 2 = 0.86 , (c) as a function of η 2 with η 1 = 0.68 .
Figure 12. ApEn of (12) (a) as a function of η , (b) as a function of η 1 with η 2 = 0.86 , (c) as a function of η 2 with η 1 = 0.68 .
Algorithms 18 00444 g012
Table 1. Model parameters for various simulation cases.
Table 1. Model parameters for various simulation cases.
ParametersCase 1Case 2Case 3Case 4
b0.042401005600
λ 0.3850.3850.40.4
d0.11260.08040.15980.1276
ϵ 0.115250.08140.160.021
Table 2. Initial values of variables used in the simulation of different scenarios.
Table 2. Initial values of variables used in the simulation of different scenarios.
VariablesSI
Case 1 2.3 × 10 6 10,000
Case 2–4 2.3 × 10 6 30,000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Abu Hammad, M.; Zouak, I.; Ouannas, A.; Grassi, G. Fractional Discrete Computer Virus System: Chaos and Complexity Algorithms. Algorithms 2025, 18, 444. https://doi.org/10.3390/a18070444

AMA Style

Abu Hammad M, Zouak I, Ouannas A, Grassi G. Fractional Discrete Computer Virus System: Chaos and Complexity Algorithms. Algorithms. 2025; 18(7):444. https://doi.org/10.3390/a18070444

Chicago/Turabian Style

Abu Hammad, Ma’mon, Imane Zouak, Adel Ouannas, and Giuseppe Grassi. 2025. "Fractional Discrete Computer Virus System: Chaos and Complexity Algorithms" Algorithms 18, no. 7: 444. https://doi.org/10.3390/a18070444

APA Style

Abu Hammad, M., Zouak, I., Ouannas, A., & Grassi, G. (2025). Fractional Discrete Computer Virus System: Chaos and Complexity Algorithms. Algorithms, 18(7), 444. https://doi.org/10.3390/a18070444

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop