Next Article in Journal
Incorporating Parameter Uncertainty into Copula Models: A Fuzzy Approach
Previous Article in Journal
An Enhanced MOPSO Algorithm for Multi-Objective UAV Path Planning in Mountainous Environments
Previous Article in Special Issue
Post-Quantum KEMs for IoT: A Study of Kyber and NTRU
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modeling Computer Virus Spread Using ABC Fractional Derivatives with Mittag-Leffler Kernels: Symmetry, Invariance, and Memory Effects in a Four-Compartment Network Model

1
Department of Mathematics and Computer Science, Faculty of Science, Beni-Suef University, Beni-Suef 2722165, Egypt
2
Department of Mathematics and Statistics, College of Science, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11623, Saudi Arabia
3
Department of Mathematics, Faculty of Science, King Abdulaziz University, P.O. Box 80203, Jeddah 21589, Saudi Arabia
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(11), 1891; https://doi.org/10.3390/sym17111891
Submission received: 19 August 2025 / Revised: 12 September 2025 / Accepted: 31 October 2025 / Published: 6 November 2025
(This article belongs to the Special Issue Symmetry in Applied Continuous Mechanics, 2nd Edition)

Abstract

The spread of computer viruses poses a critical threat to networked systems and requires accurate modeling tools. Classical integer-order approaches had failed to capture memory effects inherent in real digital environments. To address this, we developed a four-compartment fractional-order model using the Atangana–Baleanu–Caputo (ABC) derivative with Mittag-Leffler kernels. We established fundamental properties such as positivity, boundedness, existence, uniqueness, and Hyers–Ulam stability. Analytical solutions were derived via Laplace transform and homotopy series, while the Variation-of-Parameters Method and a dedicated numerical scheme provided approximations. Simulation results showed that the fractional order strongly influenced infection dynamics: smaller orders delayed peaks, prolonged latency, and slowed recovery. Compared to classical models, the ABC framework captured realistic memory-dependent behavior, offering valuable insights for designing timely and effective cybersecurity interventions. The model exhibits structural symmetries: the infection flux depends on the symmetric combination L + I and the feasible region (probability simplex) is invariant under the flow. Under the parameter constraint δ = θ (and equal linear loss terms), the system is equivariant under the involution ( L , I ) ( I , L ) , which is reflected in identical Hyers–Ulam stability bounds for the latent and infectious components.

1. Introduction

Malware and computer viruses continue to threaten networked systems, causing data breaches, financial losses, and systemic vulnerabilities. Mathematical modeling, especially frameworks inspired by epidemic dynamics, offers a principled way to capture propagation, assess defenses, and predict resilience. Classical (integer-order) epidemic models adapted from biological contexts [1,2,3,4] provide valuable insights, but neglect memory and hereditary effects that are ubiquitous in digital settings: latent infections, delayed antivirus responses, and long-terme persistence motivates a move beyond standard ODEs toward memory-aware formulations.
Fractional calculus extends differentiation to non-integer orders and is well suited for systems with heredity and fading memory [5,6,7,8]. Of particular relevance is the Atangana–Baleanu–Caputo (ABC) operator with a non-singular Mittag-Leffler kernel [9,10,11], which preserves non-locality without kernel singularities and has been successfully applied across biology, epidemiology, viscoelasticity, and control [12,13,14,15,16,17,18]. For the stability theory in Caputo fractional differential systems, see [19]. Related applications span computer-virus modeling [20,21], pneumonia [22,23,24], thermo/poroelastic and nanofluid problems [25,26,27,28,29], diabetes [30,31,32,33,34,35,36], and zoonoses [37,38,39,40,41]. We note also the “ α –Fractional Integral and Derivative” of [42], whose kernel and memory structure differ from the ABC operator; in contrast, our work adopts the ABC formulation to better capture hereditary effects without singular behavior at t = 0 .
In this paper, we formulate a new four-compartment model for computer-virus transmission using the ABC derivative in the Caputo sense. The model captures the evolution of susceptible, latent, infectious, and antivirus-protected devices, and extends existing formulations by incorporating non-local memory via the Mittag-Leffler kernel. We rigorously establish non-negativity, boundedness, existence-uniqueness, and Hyers–Ulam stability with explicit constants [43,44,45]. Analytical representations are derived using the Laplace transform and homotopy series, while the Variation-of-Parameters Method (VPM) and a tailored numerical scheme [46,47] yield practical approximations. Simulations demonstrate that the fractional order ε strongly shapes infection dynamics—smaller values delay peaks, prolong latency, and slow antivirus activation—confirming that fractional-order modeling captures realistic memory-dependent behavior in digital ecosystems.
This research contributes to digital epidemiology and computational cybersecurity by providing a comprehensive, memory-aware framework that can underpin optimal control, feedback design, and learning-based countermeasures [48,49,50,51]. In contrast to classical integer-order virus models (e.g., [21]), which overlook non-local memory and often presume exponential recovery, our ABC-based formulation furnishes (i) a fractional mechanism that more faithfully represents hereditary effects; (ii) a rigorous analysis ensuring well-posedness and Hyers–Ulam stability; (iii) analytical and numerical tools adapted to ABC operators; (iv) quantitative evidence that memory modulates peak timing, latency duration, and protection dynamics; and (v) new structural insights into infection–recovery balance under fractional dynamics. Taken together, these elements articulate the objectives and methodology of the study and bridge epidemic-inspired modeling with the realities of cyber-infection processes.
Our ABC fractional malware model exhibits several symmetry properties that highlight its relevance to Symmetry: (i) Permutation symmetry in the infection term: the susceptible flux depends only on the symmetric combination L + I , so exchanging L and I leaves the S-equation unchanged. (ii) Equivariance under ( L , I ) -swap: when δ = θ and the linear loss rates of L and I are equal, the full vector field is invariant under the involution σ ( L , I ) = ( I , L ) . (iii) Invariant sets and simplex symmetry: the nonnegative orthant and the normalized simplex Δ = { ( S , L , I , A ) 0 : S + L + I + A = 1 } remain forward invariant, providing a geometric symmetry of the phase space through coordinate-wise reflections at the boundary. (iv) Symmetry in stability bounds: on the parameter submanifold δ = θ , the Hyers–Ulam stability constants for L and I coincide, reflecting the ( L , I ) -equivariance.
These symmetry features provide a unifying perspective for our theoretical analysis and guide the interpretation of the numerical experiments that follow.
  • Summary of structural symmetries: Infection pressure: symmetric sum L + I . Equivariance: ( L , I ) ( I , L ) for δ = θ . Invariant geometry: forward invariance of the cone and simplex. Stability symmetry: identical Hyers–Ulam bounds for L and I.
The remainder of the paper is organized as follows: Section 2 provides the preliminary concepts and definitions. Section 3 presents the mathematical model of the fractional order for malware propagation. Section 4 is devoted to the solution of the proposed model, including Section 4.1 on positivity and boundedness, Section 4.2 on existence and uniqueness, Section 4.3 on Hyers–Ulam stability, Section 4.4 on the analytic solution, and Section 4.5 on the Iterative Variation-of-Parameters Technique. Section 5 develops the numerical approximation scheme. Section 6 discusses the results, and Section 7 concludes the study.

2. Background

The two-parameter Mittag-Leffler function was first introduced as a generalization of the classical Mittag-Leffler function by Wiman [52], and later formalized in modern treatments by Gorenflo and collaborators [53]. It is defined, for ε > 0 and ρ > 0 , as
E ε , ρ ( ζ ) = m = 0 ζ m Γ ( ε m + ρ ) .
When the second parameter is unity ( ρ = 1 ) , this is reduced to the classic one-parameter Mittag-Leffler function introduced by Mittag-Leffler [54]:
E ε ( ζ ) = m = 0 ζ m Γ ( ε m + 1 ) .
The Caputo–Atangana–Baleanu (CAB) fractional derivative is distinguished by its non-local and nonsingular kernel properties, characterized via convolution with a Mittag-Leffler kernel. For a sufficiently smooth function h ( t ) C 1 ( 0 , T ) and order 0 < ε < 1 , the CAB derivative is given by
D 0 , t ε CAB h ( t ) = C ( ε ) 1 ε 0 t d h ( ξ ) d ξ M ε ε 1 ε ( t ξ ) ε d ξ ,
where C ( ε ) is a normalization constant, typically expressed as C ( ε ) = 1 ε + ω / Γ ( ε ) , and M ε ( · ) denotes the one-parameter Mittag-Leffler function.
Theorem 1
([9,18]). Consider the fractional differential equation involving the CAB operator:
D t ε CAB h ( t ) = ψ ( t ) .
Then, the unique solution can be explicitly represented as
h ( t ) = 1 ε C ( ε ) ψ ( t ) + ε C ( ε ) Γ ( ε ) 0 t ψ ( ξ ) ( t ξ ) ε 1 d ξ .
In a similar context, the associated fractional integral operator related to the CAB derivative takes the form:
I t ε CAB [ φ ( t ) ] = 1 ε C ( ε ) φ ( t ) + ε C ( ε ) Γ ( ε ) 0 t φ ( ξ ) ( t ξ ) ε 1 d ξ .
An alternative formulation of the CAB fractional derivative, specifically in the Caputo sense with Mittag-Leffler kernel, is given by
D t ε CAB Φ ( t ) = C ( ε ) 1 ε 0 t Φ ( t ) M ε ε 1 ε ( t t ) ε d t ,
where ε ( 0 , 1 ) , and C ( ε ) is a normalization function ensuring the derivative behaves consistently as ε 0 or 1.
The Laplace transform of the CAB fractional derivative for a function f ( t ) is expressed as
L D t ε CAB f ( t ) ( s ) = C ( ε ) 1 ε · s ε f ˜ ( s ) s ε 1 f ( 0 ) s ε + ε 1 ε ,
where f ˜ ( s ) = L { f ( t ) } ( s ) denotes the Laplace transform of f ( t ) .
The CAB derivative enjoys the following important properties:
1.
Linearity: For any α , β R and functions ψ 1 , ψ 2 in the domain of D t ε CAB ,
D t ε CAB α ψ 1 ( t ) + β ψ 2 ( t ) = α D t ε CAB ψ 1 ( t ) + β D t ε CAB ψ 2 ( t ) .
2.
Non-singular kernel: Unlike classical Riemann–Liouville or Caputo operators, the CAB derivative employs the Mittag-Leffler kernel, which is non-singular and non-local, thus avoiding divergence at t = 0 and capturing long-memory effects.
3.
Consistency with integer order: If ε 1 , then
lim ε 1 D t ε CAB ψ ( t ) = ψ ( t ) ,
and if ε 0 , the derivative is reduced to ψ ( t ) ψ ( a ) , thereby bridging fractional and integer-order calculus.
4.
Positivity of the kernel: The kernel E ε ( ε 1 ε ( t τ ) ε ) is positive and decreasing in t, which ensures that the CAB operator preserves non-negativity in dynamical systems.
5.
Memory effect: The non-local structure implies that D t ε CAB ψ ( t ) depends on the entire history of ψ ( τ ) for τ [ a , t ] , capturing hereditary and fading memory effects crucial in modeling biological and digital epidemics.
These properties make the CAB derivative particularly suitable for applications in malware propagation modeling, where memory, latency, and delay phenomena play a central role.

3. Mathematical Model of Fractional-Order for Malware Propagation

We propose a fractional-order mathematical model that captures the transmission dynamics of computer malware within a networked environment. Distinct from classical integer-order approaches, this model incorporates memory-dependent effects via the Caputo–Atangana–Baleanu (CAB) fractional differential operator, characterized by a non-local kernel constructed from the Mittag-Leffler function. The computing network is categorized into four mutually exclusive states: vulnerable devices denoted by S ( t ) , covertly infected devices denoted by L ( t ) , actively contagious devices denoted by I ( t ) , and protected devices equipped with antivirus software denoted by A ( t ) . The classical integer-order model governing the time evolution is given by
d S ( t ) d t = Λ κ S ( t ) L ( t ) + I ( t ) Λ S ( t ) , d L ( t ) d t = κ S ( t ) L ( t ) + I ( t ) ( δ + Λ ) L ( t ) , d I ( t ) d t = δ L ( t ) ( θ + Λ ) I ( t ) , d A ( t ) d t = θ I ( t ) ( ι + Λ ) A ( t ) ,
where each term represents infection, latency, contagion, or protection dynamics.
To incorporate hereditary and fading memory characteristics observed in real-world malware spread and antivirus activation delays, we extend the system by replacing classical derivatives with the CAB fractional derivative of order ε ( 0 , 1 ) . The fractional-order variant is
D t ε CAB S ( t ) = Λ κ S ( t ) L ( t ) + I ( t ) Λ S ( t ) , D t ε CAB L ( t ) = κ S ( t ) L ( t ) + I ( t ) ( δ + Λ ) L ( t ) , D t ε CAB I ( t ) = δ L ( t ) ( θ + Λ ) I ( t ) , D t ε CAB A ( t ) = θ I ( t ) ( ι + Λ ) A ( t ) .
Model variables and parameters:
  • S ( t ) : Number of vulnerable devices at time t.
  • L ( t ) : Number of devices carrying latent (dormant) infections.
  • I ( t ) : Number of actively infected devices spreading malware.
  • A ( t ) : Number of antivirus-protected devices.
  • Λ : Rate of device addition and removal.
  • κ : Malware transmission rate.
  • δ : Transition rate from latent to active infection.
  • θ : Transition rate from infection to antivirus-protected state.
  • ι : Neutralization rate of antivirus-protected devices.
The state variables of the fractional-order system in Equation (1) are defined on the nonnegative real line,
t [ 0 , ) , ( S ( t ) , L ( t ) , I ( t ) , A ( t ) ) R 0 4 .
Thus, the model describes the evolution of the four compartments for all future times starting from the initial instant t = 0 .
To ensure well-posedness of the initial value problem, we prescribe
S ( 0 ) = S 0 0 , L ( 0 ) = L 0 0 , I ( 0 ) = I 0 0 , A ( 0 ) = A 0 0 ,
where ( S 0 , L 0 , I 0 , A 0 ) are the given initial populations of susceptible, latent, infected, and antivirus-protected devices, respectively. These conditions guarantee that the solution trajectory of the system remains in R 0 4 for all t 0 , consistent with the non-negativity property proved in Section 3. This fractional-order formulation accounts for lag effects and memory retention, enabling more realistic modeling of malware spread, delayed antivirus responses, and persistent dormant infections.
Two equilibria are of particular interest:
  • Malware-Free Equilibrium (MFE): Malware is eradicated due to effective defenses.
  • Endemic Malware Equilibrium (EME): Malware persists due to inadequate protection or rapid spread.
Representative parameter values associated with these regimes are listed in Table 2. Fractional calculus enriches the dynamics by capturing delayed peaks, slower recovery rates, and smoother transitions, which are essential for modeling realistic cyberattack scenarios and mitigation strategies.
The mathematical formulation of our malware model is directly inspired by epidemiological models traditionally used in biology. In classical SIR-type epidemic models, the population is divided into compartments such as Susceptible, xposed/Latent, Infectious, and Recovered. Each compartment describes the health status of individuals, and transitions between compartments represent infection, progression of disease, or recovery.
To adapt this framework to computer viruses, we established the following analogies:
  • Susceptible humans → Vulnerable devices: In epidemiology, susceptible individuals can contract a disease; in networks, vulnerable computers without antivirus protection can be infected by malware.
  • Latent (exposed) humans → Covertly infected devices: In biology, exposed individuals carry the pathogen but do not yet show symptoms; similarly, a device may host hidden malware that is not yet spreading but is capable of becoming active later.
  • Infectious humans → Actively contagious devices: An infectious person can spread disease; likewise, an actively infected computer spreads malware through connections, downloads, or shared files.
  • Recovered humans → Antivirus-protected devices: Just as recovery with immunity prevents reinfection, installation of antivirus software protects devices from further infection or neutralizes active threats.
The transition terms were adapted accordingly: the infection rate κ S ( L + I ) models malware transmission through contact between vulnerable and infected devices; the latency-to-active transition δ L corresponds to dormant malware becoming contagious; the transition θ I represents activation of antivirus protection; and removal rates ( Λ , ι ) reflect device turnover and security updates.
This systematic mapping preserves the structure of biological compartmental models while reinterpreting the compartments and parameters in the context of digital epidemiology. It enables us to exploit the rich analytical and numerical tools of epidemic modeling while tailoring the interpretation to computer virus propagation.
Proposition 1
(Equivariance and invariant sets). Consider the ABC fractional system for ( S , L , I , A ) .
1.
(Symmetric infection pressure) The S-equation depends on L and I only through the symmetric combination L + I .
2.
(Invariant cone/simplex) The nonnegative orthant R 0 4 is forward invariant. If the variables are normalized by N ( t ) = S + L + I + A to lie in Δ = { x 0 : x = 1 } , then Δ is forward invariant.
3.
(Equivariance under ( L , I ) -swap) If δ = θ and the linear loss terms of L and I are equal, then the vector field is equivariant under the Z 2 action σ ( L , I ) = ( I , L ) ; i.e., F σ = σ F .
Proof sketch.
(1) follows since S only sees κ S ( L + I ) . (2) follows from the quasi-positivity of the vector field and boundedness of the total population, implying forward invariance of R 0 4 and, after normalization, of Δ . (3) Under δ = θ and equal linear losses, the L- and I-equations become identical upon swapping L and I, and the remaining equations are unchanged under σ , which yields equivariance. □

4. The Solution of the Proposed Mathematical Model

In this section, we establish the existence and uniqueness of solutions to the fractional-order system (1) in the sense of mild solutions, that is, solutions expressed in the equivalent integral form of the Caputo–Atangana–Baleanu derivative. Specifically, we seek functions
( S ( t ) , L ( t ) , I ( t ) , A ( t ) ) C ( [ 0 , T ] , R 0 4 )
satisfying the system of integral equations associated with (1). The proof is carried out using fixed-point theory under Lipschitz and boundedness conditions on the nonlinear operators.

4.1. Positivity and Uniform Boundedness of Solutions

We analyze key qualitative attributes of the CAB fractional-order virus propagation model, notably the positivity and boundedness of the system’s state variables. The Atangana–Baleanu–Caputo (CAB) fractional derivative of a function h ( t ) C 1 ( [ 0 , T ] ) is defined by
D t ε CAB h ( t ) = C ( ε ) 1 ε 0 t h ( u ) M ε ε 1 ε ( t u ) ε d u ,
where 0 < ε < 1 , C ( ε ) is a normalization function normalized so that C ( 0 ) = C ( 1 ) = 1 , and M ε ( · ) denotes the Mittag-Leffler function of order ε .
Theorem 2
(Positivity/Nonnegativity). Assume S ( 0 ) , L ( 0 ) , I ( 0 ) , A ( 0 ) R 0 . Then every solution ( S , L , I , A ) of the CAB fractional system (1) satisfies
S ( t ) , L ( t ) , I ( t ) , A ( t ) 0 for all t 0 .
Proof. 
Step 1 (Integral form and positivity of the kernel). For 0 < ε < 1 , the CAB derivative admits the equivalent Volterra form
X ( t ) = X ( 0 ) + 1 ε N ( ε ) F X ( t , X ( t ) ) + ε N ( ε ) Γ ( ε ) 0 t ( t τ ) ε 1 F X ( τ , X ( τ ) ) d τ ,
for each component X { S , L , I , A } , where X = ( S , L , I , A ) and F = ( F S , F L , F I , F A ) is the right-hand side of (1). Since N ( ε ) > 0 , Γ ( ε ) > 0 , and ( t τ ) ε 1 0 for 0 τ t , the integral kernel is nonnegative and the affine weight ( 1 ε ) / N ( ε ) is also nonnegative.
  • Step 2 (Quasi-positivity of the vector field). Let R 0 4 = { ( x 1 , , x 4 ) : x i 0 } . A vector field F is quasi–positive on R 0 4 if
    F i ( t , x ) 0 whenever x R 0 4 and x i = 0 .
  • For (1), writing explicitly
    F S = Λ κ S ( L + I ) Λ S , F L = κ S ( L + I ) ( δ + Λ ) L , F I = δ L ( θ + Λ ) I , F A = θ I ( ι + Λ ) A ,
    we have, for any ( S , L , I , A ) R 0 4 ,
    F S | S = 0 = Λ 0 , F L | L = 0 = κ S ( L + I ) 0 , F I | I = 0 = δ L 0 , F A | A = 0 = θ I 0 .
  • Hence F is quasi–positive on R 0 4 .
  • Step 3 (First-exit contradiction). Let K = R 0 4 . Assume, for contradiction, that the solution exits K. Define the first exit time
    t : = inf { t > 0 : X ( t ) K } .
    By continuity, X ( t ) K for t [ 0 , t ] and X ( t ) K . Thus, for some component, say X { S , L , I , A } , we have X ( t ) = 0 and X ( t ) 0 on [ 0 , t ] .
Using the integral form at t and the nonnegativity of the kernel weights,
X ( t ) = X ( 0 ) + 1 ε N ( ε ) F X ( t , X ( t ) ) + ε N ( ε ) Γ ( ε ) 0 t ( t τ ) ε 1 F X ( τ , X ( τ ) ) d τ .
On [ 0 , t ] , all components are nonnegative; in particular, at the boundary point X ( t ) K we have F X ( t , X ( t ) ) 0 by quasi-positivity (Step 2). Moreover, by continuity of F and X and the fact that X ( τ ) K for τ [ 0 , t ] , we also have F X ( τ , X ( τ ) ) C X ( τ ) for some C 0 (locally, F is Lipschitz and F X ( · , · ) is at worst linear in X with a nonnegative inhomogeneous part at X = 0 ). In particular, the integral term is bounded below by a nonnegative quantity whenever X ( τ ) = 0 , and cannot generate a negative jump.
Hence
X ( t ) X ( 0 ) 0 + 1 ε N ( ε ) F X ( t , X ( t ) ) 0 + ε N ( ε ) Γ ( ε ) 0 t ( t τ ) ε 1 F X ( τ , X ( τ ) ) d τ 0 0 .
Therefore, X ( t ) 0 , contradicting the assumption that t is a first exit time to negative values. Thus, no exit occurs and X ( t ) K for all t 0 .
  • Step 4 (Component-wise boundary checks, explicit). For completeness, evaluating at the faces of K:
    D t ε CAB S | S = 0 = Λ 0 , D t ε CAB L | L = 0 = κ S ( L + I ) 0 , D t ε CAB I | I = 0 = δ L 0 , D t ε CAB A | A = 0 = θ I 0 , for ( S , L , I , A ) K .
    which is exactly the quasi-positivity used above.
Combining Steps 1–4 yields forward invariance of R 0 4 under the CAB flow, i.e., S ( t ) , L ( t ) , I ( t ) , A ( t ) 0 for all t 0 . □
Theorem 3.
Define the total state sum Ω ( t ) = S ( t ) + L ( t ) + I ( t ) + A ( t ) . Then Ω ( t ) is uniformly bounded on [ 0 , T ] .
Proof. 
Summing the fractional differential equations yields
D t ε CAB Ω ( t ) = Λ κ S ( L + I ) Λ S + κ S ( L + I ) ( δ + Λ ) L + δ L ( θ + Λ ) I + θ I ( ι + Λ ) A .
Simplifying the expression by canceling terms
D t ε CAB Ω ( t ) = Λ Λ S Λ L Λ I Λ A ι A = Λ Λ Ω ( t ) ι A ( t ) Λ Λ Ω ( t ) .
Setting ξ ( t ) : = Ω ( t ) , we have the inequality
D t ε CAB ξ ( t ) Λ Λ ξ ( t ) .
Applying the standard comparison principle for CAB fractional inequalities, solving the associated equality
D t ε CAB ξ ( t ) = Λ Λ ξ ( t ) ,
and using the properties of the Mittag-Leffler function, the solution is bounded by
ξ ( t ) ξ ( 0 ) E ε ( Λ t ε ) + Λ t ε E ε , ε + 1 ( Λ t ε ) ,
where E α , β ( z ) is the two-parameter Mittag-Leffler function. Since the Mittag-Leffler function with a negative argument is bounded and completely monotonic for 0 < ε < 1 , there exists a constant M so that
Ω ( t ) max Ω ( 0 ) , 1 = M , t [ 0 , ) .
Hence, the total population remains uniformly bounded. □

4.2. Existence and Uniqueness of Solutions

In order to prove the existence and uniqueness of solutions for the fractional-order malware propagation model involving the Caputo–Atangana–Baleanu (CAB) derivative, we rewrite the system into an equivalent integral formulation through the CAB fractional integral operator. This reformulation enables the application of fixed-point theorems in an appropriate function space.
Consider the CAB-fractional system describing malware dynamics:
D t ε CAB S ( t ) = Λ κ S ( t ) L ( t ) + I ( t ) Λ S ( t ) , D t ε CAB L ( t ) = κ S ( t ) L ( t ) + I ( t ) ( δ + Λ ) L ( t ) , D t ε CAB I ( t ) = δ L ( t ) ( θ + Λ ) I ( t ) , D t ε CAB A ( t ) = θ I ( t ) ( ι + Λ ) A ( t ) ,
where all variables and parameters are defined appropriately.
Using the integral representation for the CAB derivative, the system is equivalently expressed as
S ( t ) = S 0 + 1 ε C ( ε ) Ψ 1 ( t ) + ε C ( ε ) Γ ( ε ) 0 t Ψ 1 ( t ) d t , L ( t ) = L 0 + 1 ε C ( ε ) Ψ 2 ( t ) + ε C ( ε ) Γ ( ε ) 0 t Ψ 2 ( t ) d t , I ( t ) = I 0 + 1 ε C ( ε ) Ψ 3 ( t ) + ε C ( ε ) Γ ( ε ) 0 t Ψ 3 ( t ) d t , A ( t ) = A 0 + 1 ε C ( ε ) Ψ 4 ( t ) + ε C ( ε ) Γ ( ε ) 0 t Ψ 4 ( t ) d t ,
where the nonlinear terms Ψ i are defined as
Ψ 1 ( t , S , L , I , A ) = Λ κ S ( t ) L ( t ) + I ( t ) Λ S ( t ) , Ψ 2 ( t , S , L , I , A ) = κ S ( t ) L ( t ) + I ( t ) ( δ + Λ ) L ( t ) , Ψ 3 ( t , S , L , I , A ) = d e l t a L ( t ) ( θ + Λ ) I ( t ) , Ψ 4 ( t , S , L , I , A ) = θ I ( t ) ( ι + Λ ) A ( t ) .
Theorem 4.
Suppose the initial data ( S 0 , L 0 , I 0 , A 0 ) R + 4 and the state functions are bounded, i.e., there exist constants M 1 , M 2 , M 3 , M 4 > 0 so that
S M 1 , L M 2 , I M 3 , A M 4 .
Then each nonlinear operator Ψ i satisfies a Lipschitz condition on the Banach space C ( [ 0 , T ] , R 4 ) .
Proof. 
We verify the Lipschitz continuity of each Ψ i .
For Ψ 1 ,
Ψ 1 ( S 1 , S , L , I , A ) Ψ 1 ( S 2 , S , L , I , A ) κ ( 2 M 2 + M 3 ) + Λ S 1 S 2 = : L 1 S 1 S 2 .
For Ψ 2 ,
Ψ 2 ( S , L 1 , I , A ) Ψ 2 ( S , L 2 , I , A ) κ M 1 + δ + Λ L 1 L 2 = : L 2 L 1 L 2 .
For Ψ 3 ,
Ψ 3 ( S , L , I 1 , A ) Ψ 3 ( S , L , I 2 , A ) = ( θ + Λ ) I 1 I 2 = : L 3 I 1 I 2 .
For Ψ 4 ,
Ψ 4 ( S , L , I , A 1 ) Ψ 4 ( S , L , I , A 2 ) = ( ι + Λ ) A 1 A 2 = : L 4 A 1 A 2 .
Hence, each Ψ i is Lipschitz continuous with constants
L 1 = κ ( 2 M 2 + M 3 ) + Λ , L 2 = κ M 1 + δ + Λ , L 3 = θ + Λ , L 4 = ι + Λ .
Theorem 5
(Existence and Uniqueness). Let L i , i = 1 , , 4 , be the Lipschitz constants as defined above. If there exists a time T > 0 so that
max 1 i 4 1 ε C ( ε ) L i + ε C ( ε ) Γ ( ε ) L i T < 1 ,
then the CAB fractional system admits a unique solution ( S , L , I , A , W ) C ( [ 0 , T ] , R + 4 ) .
Proof. 
Define the operator M = ( M 1 , M 2 , M 3 , M 4 ) on C ( [ 0 , T ] , R 4 ) by
M 1 [ S , L , I , A ] ( t ) = S 0 + 1 ε C ( ε ) Ψ 1 ( t ) + ε C ( ε ) Γ ( ε ) 0 t Ψ 1 ( t ) d t ,
and similarly for M 2 , M 3 , M 4 . Given the Lipschitz bounds and condition above, M is a contraction mapping.
By the Banach Fixed Point Theorem, M has a unique fixed point in C ( [ 0 , T ] , R + 4 ) , which corresponds to the unique solution of the fractional system. □

4.3. Hyers–Ulam Stability

Definition 1
([43]). Consider the fractional system defined with the Caputo–Atangana–Baleanu (CAB) derivative:
D t ε CAB S ( t ) = Φ 1 ( t , S , L , I , A ) , D t ε CAB L ( t ) = Φ 2 ( t , S , L , I , A ) , D t ε CAB I ( t ) = Φ 3 ( t , S , L , I , A ) , D t ε CAB A ( t ) = Φ 4 ( t , S , L , I , A ) ,
where t [ 0 , T ] . This system is said to be Hyers–Ulam stable if there exist constants ε i > 0 , i = 1 , 2 , 3 , 4 , so that for all t,
S ( t ) J t ε 0 Φ 1 ( S , L , I , A ε 1 , L ( t ) J t ε 0 Φ 2 ( S , L , I , A ε 2 , I ( t ) J t ε 0 Φ 3 ( S , L , I , A ε 3 , A ( t ) J t ε 0 Φ 4 ( S , L , I , A ε 4 ,
where J t ε 0 denotes the CAB fractional integral operator.
Let S * , L * , I * , W * be an approximate solution satisfying
| S ( t ) S * ( t ) | ρ 1 δ 1 , | L ( t ) L * ( t ) | ρ 2 δ 2 , | I ( t ) I * ( t ) | ρ 3 δ 3 , | A ( t ) W * ( t ) | ρ 4 δ 4 ,
for constants ρ i , δ i > 0 . Then, the system is Hyers–Ulam stable.
Theorem 6
([43,44,45]). If the bounds from the previous definition hold, the CAB fractional system is Hyers–Ulam stable.
Proof. 
Consider the first component S ( t ) and its approximation S * ( t ) . We have
| S ( t ) S * ( t ) | = | J t ε 0 Φ 1 ( S , L , I , A ) J t ε 0 Φ 1 ( S * , L * , I * , A * ) | 1 ε C ( ε ) + ε C ( ε ) Γ ( ε ) κ ( 2 M 2 + M 3 ) + Λ S S * = : ρ 1 δ 1 ,
where C ( ε ) is the CAB normalization constant and Γ ( ε ) is the Euler gamma function. Thus,
ρ 1 = 1 ε C ( ε ) + ε C ( ε ) Γ ( ε ) κ ( 2 M 2 + M 3 ) + Λ .
Analogously, for the remaining components we obtain
| L ( t ) L * ( t ) | 1 ε C ( ε ) + ε C ( ε ) Γ ( ε ) ( κ M 1 + δ + Λ ) δ 2 = : ρ 2 δ 2 , | I ( t ) I * ( t ) | 1 ε C ( ε ) + ε C ( ε ) Γ ( ε ) ( θ + Λ ) δ 3 = : ρ 3 δ 3 , | A ( t ) A * ( t ) | 1 ε C ( ε ) + ε C ( ε ) Γ ( ε ) ( ι + Λ ) δ 4 = : ρ 4 δ 4 .
Therefore, the system is Hyers–Ulam stable with explicit constants
ρ 1 = 1 ε C ( ε ) + ε C ( ε ) Γ ( ε ) κ ( 2 M 2 + M 3 ) + Λ , ρ 2 = 1 ε C ( ε ) + ε C ( ε ) Γ ( ε ) ( κ M 1 + δ + Λ ) , ρ 3 = 1 ε C ( ε ) + ε C ( ε ) Γ ( ε ) ( θ + Λ ) , ρ 4 = 1 ε C ( ε ) + ε C ( ε ) Γ ( ε ) ( ι + Λ ) .
These expressions clearly demonstrate that the stability of each compartment is affected by both the memory effect ( ε ) and the transition rates governing infection and recovery. In particular, as ε 1 , the constants reduce to their classical integer-order counterparts, while for ε < 1 , the memory effect scales the stability bounds, showing slower but more persistent convergence under perturbations. □
Remark 1
(Symmetry in stability constants). When δ = θ and the linear loss rates of L and I coincide, the Lipschitz moduli entering the Hyers–Ulam bounds for L and I match. Consequently, the stability constants ρ 2 and ρ 3 are equal, reflecting the ( L , I ) -equivariance in Proposition 1(3). This explains the near-identical transient envelopes of L ( t ) and I ( t ) in the symmetric parameter regime.

4.4. Analytic Solution of the CAB Fractional Computer Virus Model

Applying the Laplace transform to system (1) and using the identity
L D t ε CAB u ( t ) ( s ) = C ( ε ) 1 ε · s ε u ˜ ( s ) s ε 1 u ( 0 ) s ε + ε 1 ε ,
we obtain, for the first equation,
C ( ε ) 1 ε · s ε S ˜ ( s ) s ε 1 S ( 0 ) s ε + ε 1 ε = Λ s L κ S ( t ) L ( t ) + I ( t ) + Λ S ( t ) .
Solving for S ˜ ( s ) yields
S ˜ ( s ) = S ( 0 ) s + Λ ( 1 ε ) s ε + ε C ( ε ) s ε + 1 ( 1 ε ) s ε + ε C ( ε ) s ε · L κ S ( L + I ) + Λ S .
Taking the inverse Laplace transform, we obtain the analytic representation
S ( t ) = S ( 0 ) + Λ C ( ε ) ( 1 ε ) + ε t ε Γ ( ε + 1 ) L 1 ( 1 ε ) s ε + ε C ( ε ) s ε · L κ S ( L + I ) + Λ S .
Similarly, for the remaining components, we have
L ( t ) = L ( 0 ) + L 1 ( 1 ε ) s ε + ε C ( ε ) s ε · L κ S ( L + I ) ( δ + Λ ) L , I ( t ) = I ( 0 ) + L 1 ( 1 ε ) s ε + ε C ( ε ) s ε · L δ L ( θ + Λ ) I , A ( t ) = A ( 0 ) + L 1 ( 1 ε ) s ε + ε C ( ε ) s ε · L θ I ( ι + Λ ) A .
We now define the linear operator
F [ u ( t ) ] = L [ u ( t ) ] , with property F ( c ) = 0 c R .
The nonlinear operator corresponding to S ( t ) is
N [ ϕ S ( t ; q ) ] = L [ ϕ S ( t ; q ) ] S ( 0 ) Λ C ( ε ) ( 1 ε ) + ε t ε Γ ( ε + 1 ) + ( 1 ε ) s ε + ε C ( ε ) s ε · L κ ϕ S ( ϕ L + ϕ I ) + Λ ϕ S .
The zeroth-order deformation equation is then constructed as
( 1 q ) F ϕ j ( t ; q ) u j , 0 ( t ) = q N [ ϕ j ( t ; q ) ] , j { S , L , I , A } ,
where q [ 0 , 1 ] is the embedding parameter and is the convergence-control parameter.
The m-th order deformation equation is written as
L u j , m ( t ) χ m u j , m 1 ( t ) = R m ( u j , m 1 , t ) ,
which, upon inversion, gives
u j , m ( t ) = χ m u j , m 1 ( t ) + R m ( u j , m 1 , t ) .
For each compartment, the final series solutions are as follows:
S ( t ) = m = 0 S m ( t ) , L ( t ) = m = 0 L m ( t ) , I ( t ) = m = 0 I m ( t ) , A ( t ) = m = 0 A m ( t ) .

4.5. Iterative Variation-of-Parameters Technique

The Iterative Variation-of-Parameters Technique (IVPT) is a robust and effective method for obtaining approximate solutions to nonlinear fractional differential systems. Especially suitable for fractional models involving Caputo–Atangana–Baleanu (CAB) derivatives, it incorporates memory effects and manages nonsingular kernels naturally. Consider the CAB-fractional system given by
D t ε CAB S ( t ) = Λ κ S ( t ) L ( t ) + I ( t ) Λ S ( t ) , D t ε CAB L ( t ) = κ S ( t ) L ( t ) + I ( t ) ( δ + Λ ) L ( t ) , D t ε CAB I ( t ) = δ L ( t ) ( θ + Λ ) I ( t ) , D t ε CAB A ( t ) = θ I ( t ) ( ι + Λ ) A ( t ) ,
subject to the initial conditions
S ( 0 ) = S 0 , L ( 0 ) = L 0 , I ( 0 ) = I 0 , A ( 0 ) = A 0 .
CAB fractional integral operator:
J ε f ( t ) : = 1 Γ ( ε ) 0 t ( t s ) ε 1 f ( s ) d s , 0 < ε < 1 .
Let { S n ( t ) , L n ( t ) , I n ( t ) , A n ( t ) } n = 0 be the sequence of successive approximations generated by the IVPT. The iterative scheme is given by
S n + 1 ( t ) = S 0 + J ε Λ κ S n ( t ) L n ( t ) + I n ( t ) Λ S n ( t ) , L n + 1 ( t ) = L 0 + J ε κ S n ( t ) L n ( t ) + I n ( t ) ( δ + Λ ) L n ( t ) , I n + 1 ( t ) = I 0 + J ε δ L n ( t ) ( θ + Λ ) I n ( t ) , A n + 1 ( t ) = A 0 + J ε θ I n ( t ) ( ι + Λ ) A n ( t ) .
The initial approximations are chosen as constants from the initial data:
S 0 ( t ) = S 0 , L 0 ( t ) = L 0 , I 0 ( t ) = I 0 , A 0 ( t ) = A 0 .
With each iteration, the approximations are refined and higher-order approximations are obtained. This process leads to fractional power series expansions
S ( t ) S 0 + t ε Γ ( ε + 1 ) + t 2 ε Γ ( 2 ε + 1 ) + t 3 ε Γ ( 3 ε + 1 ) + t 4 ε Γ ( 4 ε + 1 ) + , L ( t ) L 0 + t ε Γ ( ε + 1 ) + t 2 ε Γ ( 2 ε + 1 ) + t 3 ε Γ ( 3 ε + 1 ) + t 4 ε Γ ( 4 ε + 1 ) + , I ( t ) I 0 + t ε Γ ( ε + 1 ) + t 2 ε Γ ( 2 ε + 1 ) + t 3 ε Γ ( 3 ε + 1 ) + t 4 ε Γ ( 4 ε + 1 ) + , A ( t ) A 0 + t ε Γ ( ε + 1 ) + t 2 ε Γ ( 2 ε + 1 ) + t 3 ε Γ ( 3 ε + 1 ) + t 4 ε Γ ( 4 ε + 1 ) + .
A memory-sensitive approximation framework captures the hereditary and dynamic features of computer malware spread using this iterative method. Under mild regularity conditions, the iterations converge rapidly and can be effectively implemented with computational software such as MATLAB or Python.

5. Numerical Approximation Scheme

To numerically approximate fractional differential equations defined via the Caputo–Atangana–Baleanu (CAB) derivative, we recast the general integral form into one involving Mittag-Leffler kernels combined with discrete interpolation. Building on recent methodologies [10,18], consider the fractional problem
D t ε CAB ψ ( t ) = Ξ ( t , ψ ( t ) ) , 0 < ε < 1 ,
which admits the following integral equivalent:
ψ ( t ) = ψ 0 + 1 ε N ( ε ) Ξ ( t , ψ ( t ) ) + ε Γ ( ε ) N ( ε ) 0 t Ξ ( τ , ψ ( τ ) ) ( t τ ) ε 1 d τ ,
where N ( ε ) is the normalization constant related to the CAB operator, and Γ ( · ) is the classical Gamma function.
At the discrete temporal nodes t m + 1 = ( m + 1 ) h , the approximation scheme reads
ψ ( t m + 1 ) ψ 0 + ϖ 0 Ξ ( t m , ψ ( t m ) ) + ϖ 1 = 0 m t t + 1 Ξ ( τ , ψ ( τ ) ) ( t m + 1 τ ) ε 1 d τ ,
with weights defined as
ϖ 0 = Γ ( ε ) ( 1 ε ) Γ ( ε ) ( 1 ε ) + ε , ϖ 1 = ε Γ ( ε ) + ε ( 1 Γ ( ε ) ) .
Approximating Ξ ( τ , ψ ( τ ) ) in [ t , t + 1 ] using linear interpolation, we obtain the iterative scheme
ψ m + 1 = ψ 0 + ϖ 0 Ξ ( t m , ψ m ) + 1 ( ε + 1 ) N ( ε ) = 0 m h ε Ξ ( t , ψ ) A ε , , 1 h ε Ξ ( t 1 , ψ 1 ) A ε , , 2 ,
where Ξ ( t 1 , ψ 1 ) 0 , and
A ε , , 1 = h ε + 1 ( m + 1 ) ε ( m + 2 + ε ) ( m ) ε ( m + 2 + 2 ε ) ε ( ε + 1 ) , A ε , , 2 = h ε + 1 ( m + 1 ) ε + 1 ( m ) ε ( m + 1 + ε ) ε ( ε + 1 ) .
For the vector-valued system
D t ε CAB Y ( t ) = Ψ ( t , Y ) , Y = S ( t ) L ( t ) I ( t ) A ( t ) ,
the scheme applies component-wise, yielding for example
S m + 1 = S 0 + ϖ 0 Λ κ S m ( L m + I m ) Λ S m + 1 ( ε + 1 ) N ( ε ) = 0 m { h ε Λ κ S ( L + I ) Λ S A ε , , 1 h ε Λ κ S 1 ( L 1 + I 1 ) Λ S 1 A ε , , 2 } ,
and similarly for L m + 1 , I m + 1 , A m + 1 .
Remark 2.
In the original draft, the fractional order was denoted inconsistently as θ or ϑ in this section. These have now been corrected to ε, ensuring uniform notation across all analysis, proofs, and numerical schemes.

5.1. Numerical Experiments with Varying Initial Conditions

To complement the order-sweep experiments, we investigate how the system responds to different initial conditions while keeping parameters fixed. Unless otherwise stated, we use ε { 0.7 , 0.9 } , step size h = 10 2 , and time horizon T = 100 . The CAB scheme described earlier is used for all runs.
For each scenario in Table 1, we simulate the system (1) with the same parameter vector ( Λ , κ , δ , θ , ι ) as in the baseline experiment. We summarize qualitative observations below; quantitative peak measures can be tabulated alongside the figures.
  • Qualitative findings (consistent across parameters used).
  • Peak size and timing (in I ( t ) ). Increasing I 0 (LS → MOD → HS) monotonically increases the early growth rate and advances the time-to-peak. For the same parameters, the HS scenario reaches a larger peak earlier than LS.
  • Latency reservoir ( L ( t ) ). Larger I 0 seeds a larger latent pool via κ S ( L + I ) , producing a broader L ( t ) shoulder before decay. This effect is more pronounced for smaller ε due to stronger memory.
  • Protected devices ( A ( t ) ). Since A grows through θ I , scenarios with larger I 0 accumulate protection more rapidly and saturate earlier; small ε slows the relaxation, yielding longer tails in A ( t ) .
  • Effect of fractional order. For fixed initial data, smaller ε delays peaks and lengthens transients (consistent with the order-sweep results), but the ordering across initial-condition scenarios (HS > MOD > LS in early growth and peak size) is preserved.

5.2. Strategy for Choosing Parameters

The choice of parameter values in Table 2 was guided by two main considerations: biological analogy to epidemic models and realistic representation of digital networks. The strategy can be summarized as follows:
  • Turnover rate Λ . This was fixed at 0.5 to represent moderate addition and removal of devices within the network. The value was chosen to balance the inflow of susceptible devices with the natural loss of old or offline systems, ensuring that the system does not trivially collapse to zero population.
  • Transmission rate κ . We considered two scenarios: κ = 0.5 for a baseline “safe state’’ with limited malware spread, and κ = 0.8 for a more aggressive “infectious state.’’ These values were selected to span the range of moderate-to-high transmission observed in analogous epidemic models, and to test how the system transitions between malware-free and endemic states.
  • Latency-to-activation rate δ . The small value δ = 0.001 was chosen to capture the realistic property of modern malware, which often remains dormant for extended periods before becoming active. This reflects the hidden threat of stealth infections.
  • Antivirus activation rate θ . We set θ = 0.2 to model an intermediate level of antivirus responsiveness: not instantaneous but not negligible. This allows us to test the influence of delayed security deployment on system stability.
  • Protected-device removal rate ι . The value ι = 0.4 was selected to represent moderate loss of antivirus protection, such as through outdated signatures or unpatched software. A higher value would lead to rapid reinfection, while a lower value would imply unrealistically permanent immunity.
This selection strategy ensures that the parameters lie in a range where both malware-free and endemic behaviors can be observed. By combining slow latency activation, moderate antivirus response, and different infection rates, the examples demonstrate the effect of fractional-order memory on delaying infection peaks, prolonging latency, and slowing recovery.
Table 2 lists the parameters explicitly defined and used in system (1). The chosen values represent typical rates for device turnover, malware transmission, infection progression, and antivirus protection.
The initial conditions are given by
S ( 0 ) = 0.4 , L ( 0 ) = 0.3 , I ( 0 ) = 0.2 , A ( 0 ) = 0.1 ,
representing a network where 40 % of devices are initially susceptible, 30 % latent carriers, 20 % actively infected, and 10 % already antivirus-protected.

5.3. Numerical Study

To investigate the effect of the fractional order ε , we perform simulations of the system for several values of ε { 1 , 0.98 , 0.95 , 0.9 } . The numerical scheme described in Section 6 is employed with a step size h = 0.01 over a simulation horizon T = 100 .
Figure 1 shows the individual trajectories of S ( t ) , L ( t ) , I ( t ) , and A ( t ) . As ε decreases, the infection spreads more slowly: susceptible devices decline at a slower rate, latency persists longer, and both infection and recovery are delayed. Figure 2 presents the full system for ε = 1.0 , 0.95 , 0.9 , 0.85 . With stronger memory (smaller ε ), the system evolves more gradually, confirming the key role of fractional order in shaping malware dynamics. These results demonstrate that the CAB fractional derivative successfully captures realistic non-local memory effects, which are absent in classical integer-order models.

6. Discussion

We summarize the outcomes of the proposed CAB fractional-order computer virus model using the parameters in Table 2 and initial conditions ( S 0 , L 0 , I 0 , A 0 ) = ( 0.4 , 0.3 , 0.2 , 0.1 ) .
Figure 1 and Figure 2 display the dynamics for ε { 1 , 0.98 , 0.95 , 0.9 , 0.85 } . As ε decreases, non-local memory strengthens and slows transitions: S ( t ) declines more gradually, L ( t ) persists longer, I ( t ) peaks later with smaller magnitude, and A ( t ) accumulates more slowly. At ε = 1 , the model recovers the classical (faster) integer-order behavior. This shows that the CAB operator captures latency, delayed contagion, and delayed protection in digital environments.
  • Low seed ( I 0 = 10 4 ). The outbreak onset is slow and antivirus activation is delayed.
  • Moderate seed ( I 0 = 0.05 ). The peak occurs earlier and is higher, and protection ramps up sooner.
  • High seed ( I 0 = 0.2 ). A rapid early peak is followed by faster growth of A ( t ) ; memory still prolongs recovery relative to ε = 1 .
For each run we report the peak infection level I max and its timing t peak , as well as the final protection A ( t ) at the horizon T = 100 .
Figure 1 (component-wise). Smaller ε delays susceptibility loss, enlarges the latent reservoir, reduces and postpones the infection peak, and slows protection buildup.
Figure 2 (system-level). Decreasing ε acts as a control knob that stretches transients and prolongs virus persistence before stabilization.
  • Device turnover Λ . This term injects and removes devices, sustaining susceptibility when large.
  • Transmission κ . It governs infection pressure; higher values push the system toward endemicity.
  • Latency activation δ . Small δ yields long dormant phases before devices become infectious.
  • Antivirus activation θ . Larger θ shortens infectious periods and accelerates protection.
  • Protection loss ι . Larger ι erodes immunity and raises reinfection risk.
The CAB framework reproduces integer-order dynamics at ε = 1 , introduces tunable memory that delays peaks and lengthens transients for ε < 1 , and aligns with the cybersecurity realities of latent malware, delayed detection, and gradual deployment of defenses. These properties make ε a meaningful policy/design parameter for timing updates and countermeasures, while highlighting the sensitivity to κ , θ , and ι .

7. Conclusions

In this study, we developed and analyzed a novel fractional-order model for computer virus spread using the Atangana–Baleanu–Caputo (ABC) derivative. The model incorporates the Mittag-Leffler kernel, enabling the memory effects and non-local dynamics often present in digital environments. Key mathematical properties such as non-negativity, boundedness, existence, uniqueness, and Hyers–Ulam stability were established. Laplace transform, the homotopy series method, and the Variation-of-Parameters Method (VPM) were used to derive analytical and approximate solutions. A numerical scheme tailored to the ABC derivative was also constructed to visualize system dynamics.
The simulation results confirmed the critical impact of fractional order ϵ on infection dynamics. Lower values of ϵ correspond to stronger memory effects, leading to slower infection and recovery processes. This highlights the importance of fractional-order calculus in modeling and simulating real-world cybersecurity problems. Overall, the proposed model provides a powerful framework for understanding, predicting, and ultimately mitigating computer virus spread in complex networked systems. Future work may include optimal control strategies and machine learning integration for enhanced predictive and protective capabilities.
The model’s symmetric infection pressure, invariant feasible region, and ( L , I ) -equivariance on a natural parameter submanifold provide a symmetry-based lens on existence, Hyers–Ulam stability, and the qualitative ordering of transients under fractional memory.

Author Contributions

S.S. conceived the study, developed the theory, and wrote the manuscript. E.S. and M.A. contributed to the development of the theory, provided feedback, and reviewed the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported and funded by the Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University (IMSIU) (grant number IMSIU-DDRSP2501).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Okaka, F.O.; Ojeh, V.N. Mathematical model of pneumonia misdiagnosed as malaria. IOSR J. Math. 2013, 6, 24–28. [Google Scholar]
  2. Okaka, F.O.; Chukwuocha, E.O. Modeling concurrent malaria-typhoid infection. Open J. Model. Simul. 2015, 3, 153–162. [Google Scholar]
  3. Steady, A.M.; Nwafor, G.I. Deterministic model of typhoid fever in malaria endemic areas. Int. J. Math. Anal. 2014, 8, 553–564. [Google Scholar]
  4. Adeboye, A.D.; Omame, A. Modeling co-infection of malaria and typhoid. J. Adv. Math. Comput. Sci. 2015, 7, 1–12. [Google Scholar]
  5. Podlubny, I. Fractional Differential Equations; Academic Press: Cambridge, MA, USA, 1999. [Google Scholar]
  6. Kilbas, A.A.; Srivastava, H.M.; Trujillo, J.J. Theory and Applications of Fractional Differential Equations; Elsevier: Amsterdam, The Netherlands, 2006. [Google Scholar]
  7. Mainardi, F. Fractional Calculus and Waves in Linear Viscoelasticity; World Scientific: Singapore, 2010. [Google Scholar]
  8. Samko, S.G.; Kilbas, A.A.; Marichev, O.I. Fractional Integrals and Derivatives: Theory and Applications; CRC Press: Boca Raton, FL, USA, 1993. [Google Scholar]
  9. Caputo, M.; Fabrizio, M. A new definition of fractional derivative without singular kernel. Progr. Fract. Differ. Appl. 2015, 1, 73–85. [Google Scholar]
  10. Atangana, A.; Baleanu, D. New fractional derivatives with nonlocal and non-singular kernel. Chaos Solitons Fractals 2016, 89, 85–91. [Google Scholar]
  11. Baleanu, D.; Jajarmi, A.; Hajipour, M. On nonlinear dynamical systems with generalized fractional derivatives. Nonlinear Dyn. 2018, 94, 397–414. [Google Scholar] [CrossRef]
  12. Jarad, F.; Abdeljawad, T.; Baleanu, D. On the generalized Caputo fractional derivative. Chaos Solitons Fractals 2019, 123, 275–280. [Google Scholar]
  13. Gorenflo, R.; Loutchko, J.; Luchko, Y. Computation of the Mittag-Leffler function. Fract. Calc. Appl. Anal. 2002, 5, 491–518. [Google Scholar]
  14. Almeida, R.; Bastos, N.R.O.; Torres, D.F.M. A Caputo fractional derivative of variable order with applications. Comput. Math. Appl. 2017, 66, 876–889. [Google Scholar]
  15. Losada, J.; Nieto, J.J. Properties of a new fractional derivative without singular kernel. Progr. Fract. Differ. Appl. 2015, 1, 87–92. [Google Scholar]
  16. El-Sayed, A.M.A.; El-Mesiry, A.; El-Saka, H. Fractional logistic equation. Appl. Math. Lett. 2007, 20, 817–823. [Google Scholar] [CrossRef]
  17. Ahmed, E.; Elgazzar, A. On fractional order differential equations model for nonlocal epidemics. Physica A 2007, 379, 607–614. [Google Scholar] [CrossRef] [PubMed]
  18. Abboubakar, H.; Kumar, P.; Erturk, V.S.; Kumar, A. A mathematical study of a tuberculosis model with fractional derivatives. Int. J. Model. Simul. Sci. Comput. 2021, 12, 2150037. [Google Scholar] [CrossRef]
  19. Choi, S.K.; Kang, B.; Koo, N. Stability for Caputo fractional differential systems. Abstr. Appl. Anal. 2014, 2014, 631419. [Google Scholar] [CrossRef]
  20. Althubyani, M.; Saber, S. Hyers–Ulam stability of fractal–fractional computer virus models with the Atangana–Baleanu operator. Fractal Fract. 2025, 9, 158. [Google Scholar] [CrossRef]
  21. Mishra, B.K.; Saini, D. Mathematical models on computer viruses. Appl. Math. Comput. 2007, 187, 929–936. [Google Scholar] [CrossRef]
  22. Saber, S.; Alahmari, A. Impact of Fractal-Fractional Dynamics on Pneumonia Transmission Modeling. Eur. J. Pure Appl. Math. 2025, 18, 5901. [Google Scholar] [CrossRef]
  23. Althubyani, M.; Taha, N.E.; Taha, K.O.; Alharb, R.A.; Saber, S. Epidemiological Modeling of Pneumococcal Pneumonia: Insights from ABC Fractal-Fractional Derivatives. CMES-Comput. Model. Eng. Sci. 2025, 143, 3491–3521. [Google Scholar] [CrossRef]
  24. Peter, O.J.; Yusuf, A.; Oshinubi, K.; Oguntolu, F.A.; Lawal, J.O.; Abioye, A.I.; Ayoola, T.A. Fractional order of pneumococcal pneumonia infection model with Caputo–Fabrizio operator. Results Phys. 2021, 29, 104581. [Google Scholar] [CrossRef]
  25. Abouelregal, A.E.; Askar, S.S.; Marin, M.; Mohamed, B. The theory of thermoelasticity with a memory-dependent dynamic response for a thermo-piezoelectric functionally graded rotating rod. Sci. Rep. 2023, 13, 9052. [Google Scholar] [CrossRef] [PubMed]
  26. Hobiny, A.; Abbas, I.; Marin, M. The Influences of the Hyperbolic Two-Temperatures Theory on Waves Propagation in a Semiconductor Material Containing Spherical Cavity. Mathematics 2022, 10, 121. [Google Scholar] [CrossRef]
  27. Zeeshan, A.; Khan, M.I.; Ellahi, R.; Marin, M. Computational Intelligence Approach for Optimising MHD Casson Ternary Hybrid Nanofluid over the Shrinking Sheet with the Effects of Radiation. Appl. Sci. 2023, 13, 9510. [Google Scholar] [CrossRef]
  28. Marin, M.; Hobiny, A.; Abbas, I. The Effects of Fractional Time Derivatives in Porothermoelastic Materials Using Finite Element Method. Mathematics 2021, 9, 1606. [Google Scholar] [CrossRef]
  29. Saeed, T.; Abbas, I.; Marin, M. A GL Model on Thermo-Elastic Interaction in a Poroelastic Material Using Finite Element Method. Symmetry 2020, 12, 488. [Google Scholar] [CrossRef]
  30. Saber, S.; Solouma, E. Advanced fractional modeling of diabetes: Bifurcation analysis, chaos control, and a comparative study of numerical methods adams-bashforth-moulton and laplace-adomian-padé method. Indian J. Phys. 2025. [Google Scholar] [CrossRef]
  31. Saber, S.; Mirgani, S.M. Numerical solutions, stability, and chaos control of Atangana-Baleanu variable-order derivatives in glucose-insulin dynamics. J. Appl. Math. Comput. Mech. 2025, 24, 44–55. [Google Scholar] [CrossRef]
  32. Saber, S.; Mirgani, S. Analyzing fractional glucose-insulin dynamics using Laplace residual power series methods via the Caputo operator: Stability and chaotic behavior. Beni-Suef Univ. J. Basic Appl. Sci. 2025, 14, 28. [Google Scholar] [CrossRef]
  33. Alhazmi, M.; Aljohani, A.F.; Taha, N.E.; Abdel-Khalek, S.; Bayram, M.; Saber, S. Application of a fractal fractional operator to nonlinear glucose-insulin systems: Adomian decomposition solutions. Comput. Biol. Med. 2025, 196, 110453. [Google Scholar] [CrossRef] [PubMed]
  34. Alhazmi, M.; Saber, S. Application of a fractal fractional derivative with a power-law kernel to the glucose-insulin interaction system based on Newton’s interpolation polynomials. Fractals 2025, 25402017. [Google Scholar]
  35. Saber, S.; Dridi, B.; Alahmari, A.; Messaoudi, M. Application of Jumarie-Stancu Collocation Series Method and Multi-Step Generalized Differential Transform Method to fractional glucose-insulin. Int. J. Optim. Control Theor. Appl. 2025, 15, 464–482. [Google Scholar] [CrossRef]
  36. Saber, S.; Dridi, B.; Alahmari, A.; Messaoudi, M. Hyers-Ulam Stability and Control of Fractional Glucose-Insulin Systems. Eur. J. Pure Appl. Math. 2025, 18, 6152. [Google Scholar]
  37. Althubyani, M.; Adam, H.D.; Alalyani, A.; Taha, N.E.; Taha, K.O.; Alharbi, R.A.; Saber, S. Understanding zoonotic disease spread with a fractional order epidemic model. Sci. Rep. 2025, 15, 13921. [Google Scholar] [CrossRef]
  38. Adam, H.D.; Althubyani, M.; Mirgani, S.M.; Saber, S. An application of Newton’s interpolation polynomials to the zoonotic disease transmission between humans and baboons system based on a time-fractal fractional derivative with a power-law kernel. AIP Adv. 2025, 15, 045217. [Google Scholar]
  39. Saber, S.; Solouma, E. The Generalized Euler Method for Analyzing Zoonotic Disease Dynamics in Baboon-Human Populations. Symmetry 2025, 17, 541. [Google Scholar] [CrossRef]
  40. Saber, S.; Solouma, E.; Althubyani, M.; Messaoudi, M. Statistical insights into zoonotic disease dynamics: Simulation and control strategy evaluation. Symmetry 2025, 17, 733. [Google Scholar] [CrossRef]
  41. Saber, S.; Alahmari, A. Mathematical insights into zoonotic disease spread: Application of the Milstein method. Eur. J. Pure Appl. Math. 2025, 18, 58–81. [Google Scholar] [CrossRef]
  42. Mechee, M.S.; Salman, Z.I.; Alkufi, S.Y. Novel Definitions of α-Fractional Integral and Derivative of the Functions. Iraqi J. Sci. 2023, 64, 5866–5877. [Google Scholar] [CrossRef]
  43. Ulam, S.M. A Collection of Mathematical Problems; Interscience Publ.: Geneva, Switzerland, 1960. [Google Scholar]
  44. Jajarmi, A.; Baleanu, D.; Sayevand, K. A new fractional optimal control model for biological systems. Commun. Nonlinear Sci. Numer. Simul. 2019, 69, 431–448. [Google Scholar]
  45. Vargas-De-León, C. Volterra-type Lyapunov functions for fractional-order epidemic systems. Commun. Nonlinear Sci. Numer. Simul. 2015, 24, 75–85. [Google Scholar] [CrossRef]
  46. Li, C.; Zeng, F. The Finite Difference Methods for Fractional Ordinary Differential Equations. Numer. Funct. Anal. Optim. 2013, 34, 149–179. [Google Scholar] [CrossRef]
  47. Wang, L.; Chen, N. The predictor-corrector solution for fractional order differential algebraic equation. In Proceedings of the ICFDA’14 International Conference on Fractional Differentiation and Its Applications 2014, Catania, Italy, 23–25 June 2014; pp. 1–6. [Google Scholar] [CrossRef]
  48. Alhazmi, M.; Dawalbait, F.M.; Aljohani, A.; Taha, K.O.; Adam, H.D.; Saber, S. Numerical approximation method and chaos for a chaotic system in sense of Caputo-Fabrizio operator. Therm. Sci. 2024, 28, 5161–5168. [Google Scholar] [CrossRef]
  49. Yan, T.; Alhazmi, M.; Youssif, M.Y.; Elhag, A.E.; Aljohani, A.F.; Saber, S. Analysis of a Lorenz model using Adomian decomposition and fractal-fractional operators. Therm. Sci. 2024, 28, 5001–5009. [Google Scholar] [CrossRef]
  50. Alsulami, A.; Alharb, R.A.; Albogami, T.M.; Eljaneid, N.H.; Adam, H.D.; Saber, S.F. Controlled chaos of a fractal–fractional Newton-Leipnik system. Therm. Sci. 2024, 28, 5153–5160. [Google Scholar] [CrossRef]
  51. Ahmed, K.I.A.; Mirgani, S.M.; Seadawy, A.; Saber, S. A comprehensive investigation of fractional glucose-insulin dynamics: Existence, stability, and numerical comparisons using residual power series and generalized Runge-Kutta methods. J. Taibah Univ. Sci. 2025, 19, 2460280. [Google Scholar] [CrossRef]
  52. Wiman, A. Über den Fundamentalsatz in der Theorie der Funktionen Eα(x). Acta Math. 1905, 29, 191–201. [Google Scholar] [CrossRef]
  53. Gorenflo, R.; Kilbas, A.A.; Mainardi, F.; Rogosin, S.V. Mittag-Leffler Functions, Related Topics and Applications; Springer Monographs in Mathematics; Springer: Berlin, Germany, 2014. [Google Scholar] [CrossRef]
  54. Mittag-Leffler, G.M. Sur la nouvelle fonction E(x). Comptes Rendus De L’academie Des Sci. Paris 1903, 137, 554–558. [Google Scholar]
Figure 1. Component-wise behavior of the system under ε = 1 , 0.98 , 0.95 , 0.9 . Decreasing ε slows down transitions across all compartments due to memory effects.
Figure 1. Component-wise behavior of the system under ε = 1 , 0.98 , 0.95 , 0.9 . Decreasing ε slows down transitions across all compartments due to memory effects.
Symmetry 17 01891 g001
Figure 2. Overall system dynamics for different fractional orders. Lower ε introduces stronger memory effects, delaying infection peaks and antivirus activation.
Figure 2. Overall system dynamics for different fractional orders. Lower ε introduces stronger memory effects, delaying infection peaks and antivirus activation.
Symmetry 17 01891 g002
Table 1. Initial conditions used in the experiments. Total population is N 0 = S 0 + L 0 + I 0 + A 0 .
Table 1. Initial conditions used in the experiments. Total population is N 0 = S 0 + L 0 + I 0 + A 0 .
Scenario S 0 L 0 I 0 A 0
Low-seed (LS) 0.99 0.00 10 4 0.01
Moderate (MOD) 0.90 0.05 0.05 0.00
High-seed (HS) 0.70 0.10 0.20 0.00
Table 2. Parameter settings for the computer virus propagation model [20].
Table 2. Parameter settings for the computer virus propagation model [20].
ParameterDescriptionValue
Λ Rate of network device addition/removal 0.5
κ Malware transmission rate 0.5 (safe), 0.8 (infectious)
δ Transition from latent to active infection 0.001
θ Transition from infection to antivirus-protected state 0.2
ι Removal/neutralization rate of protected devices 0.4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Saber, S.; Solouma, E.; Alsulami, M. Modeling Computer Virus Spread Using ABC Fractional Derivatives with Mittag-Leffler Kernels: Symmetry, Invariance, and Memory Effects in a Four-Compartment Network Model. Symmetry 2025, 17, 1891. https://doi.org/10.3390/sym17111891

AMA Style

Saber S, Solouma E, Alsulami M. Modeling Computer Virus Spread Using ABC Fractional Derivatives with Mittag-Leffler Kernels: Symmetry, Invariance, and Memory Effects in a Four-Compartment Network Model. Symmetry. 2025; 17(11):1891. https://doi.org/10.3390/sym17111891

Chicago/Turabian Style

Saber, Sayed, Emad Solouma, and Mansoor Alsulami. 2025. "Modeling Computer Virus Spread Using ABC Fractional Derivatives with Mittag-Leffler Kernels: Symmetry, Invariance, and Memory Effects in a Four-Compartment Network Model" Symmetry 17, no. 11: 1891. https://doi.org/10.3390/sym17111891

APA Style

Saber, S., Solouma, E., & Alsulami, M. (2025). Modeling Computer Virus Spread Using ABC Fractional Derivatives with Mittag-Leffler Kernels: Symmetry, Invariance, and Memory Effects in a Four-Compartment Network Model. Symmetry, 17(11), 1891. https://doi.org/10.3390/sym17111891

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop