Academia.eduAcademia.edu

Modeling of Computer Virus Propagation with Fuzzy Parameters

Computers, Materials & Continua

Computers, Materials & Continua DOI: 10.32604/cmc.2023.033319 Tech Science Press Article Modeling of Computer Virus Propagation with Fuzzy Parameters Reemah M. Alhebshi1 , Nauman Ahmed2 , Dumitru Baleanu3,4,5 , Umbreen Fatima6, *, Fazal Dayan7 , Muhammad Rafiq8,9 , Ali Raza10 , Muhammad Ozair Ahmad2 and Emad E. Mahmoud11 1 Computer Science Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia 2 Department of Mathematics and Statistics, University of Lahore, Lahore, 54590, Pakistan 3 Department of Mathematics, Cankaya University, Balgat, Ankara, 06530, Turkey 4 Department of Medical Research, China Medical University, Taichung, 406040, Taiwan 5 Institute of Space Sciences, Magurele-Bucharest, 077125, Romania 6 Department of Computer Science, University of Lahore, Lahore, 54590, Pakistan 7 Department of Mathematics, School of Science, University of Management and Technology, Lahore, 54000, Pakistan 8 Department of Mathematics, Faculty of Science and Technology, University of Central Punjab, Lahore, 54000, Pakistan 9 Department of Mathematics, Near East University TRNC, Mersin, 10, Turkey 10 Department of Mathematics, Government Maulana Zafar Ali Khan Graduate College Wazirabad, Punjab Higher Education Department (PHED), Lahore, 5400, Pakistan 11 Department of Mathematics and Statistics, College of Science, Taif University, P O Box, 11099, Taif, 21944, Saudi Arabia *Corresponding Author: Umbreen Fatima. Email: [email protected] Received: 14 June 2022; Accepted: 15 September 2022 Abstract: Typically, a computer has infectivity as soon as it is infected. It is a reality that no antivirus programming can identify and eliminate all kinds of viruses, suggesting that infections would persevere on the Internet. To understand the dynamics of the virus propagation in a better way, a computer virus spread model with fuzzy parameters is presented in this work. It is assumed that all infected computers do not have the same contribution to the virus transmission process and each computer has a different degree of infectivity, which depends on the quantity of virus. Considering this, the parameters β and γ being functions of the computer virus load, are considered fuzzy numbers. Using fuzzy theory helps us understand the spread of computer viruses more realistically as these parameters have fixed values in classical models. The essential features of the model, like reproduction number and equilibrium analysis, are discussed in fuzzy senses. Moreover, with fuzziness, two numerical methods, the forward Euler technique, and a nonstandard finite difference (NSFD) scheme, respectively, are developed and analyzed. In the evidence of the numerical simulations, the proposed NSFD method preserves the main features of the dynamic system. It can be considered a reliable tool to predict such types of solutions. Keywords: SIR model; fuzzy parameters; computer virus; NSFD scheme; stability This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 5664 CMC, 2023, vol.74, no.3 1 Introduction A type of malicious program that, once executed, duplicates itself by modifying several sensitive products and inserting them into its specific code is called a computer virus. Boot sector virus, multipart virus, macro virus, program virus, polymorphic virus, etc., are some common types of computer viruses. The thought processes behind creating viruses are monetary gain, sending public messages, making someone happy, and showing that some flaws are there in the framework. A common virus, therefore, fulfills two functions. Firstly, it duplicates itself in uninfected projects, files, or programs. Then, it carries out other vengeful instructions given by the virus designer. Virus scientists use strategies such as padding, pressing, and encrypting spaces to avoid detection. At the same time, antivirus projects use other static and dynamic approaches to identify the virus. Some widespread computer viruses are program downloads, pirated or decrypted software, email connections, the web, obscure Compact Disk (CD) boot information, unpatched applications, and Bluetooth. Symptoms, for example, the partition disappears completely, there is no reaction from the programs that are used to run it because some files are missing, the windows do not start, error messages appear with the records missing without the process uninstall, a program disappears from the Personal Computer (PC), new symbols appear by themselves in the work area, the PC does not allow the reintroduction of antivirus programming, an opaque explanation means that antivirus programming is blocked and cannot be restarted, a strange connection is made via an e-mail Message established, the PC cannot update the antivirus programming, then, the email account sends infected messages to our contacts, we cannot open documents and reports, problems in reopening destroyed data whose design has been changed, it is difficult to draw the best of an application, music or unusual noises on the speakers and activities crashes and the PC shows annoying messages when it keeps booting apart from undetected errors your PC is taking a long time to start making it easier to run, etc. cannot be seen on an infected PC [1]. The “Creeper System” was the first computer virus discovered in 1971. BBN Innovations caused an infection in the United States. In 1982, a virus known as “Elk Cloner” was found. In 1986, the first MS-DOS “Brain” computer virus was discovered, which had the utility to prevent the PC from booting and overwriting the bootable area on the floppy disk. “The Morris” appeared and infected countless populations of personal computers in 1988. The virus, discovered in Australia in 1991 without precedent, has been named “Michelangelo”. Two years after Windows 3.0, in April 1992, we learned that a virus was attacking MS Windows. “Melissa” was released in 1999. In 2000, the “I love you” infection returned and emailed itself to all contacts. A latently infected computer that cannot infect other computers simultaneously is called an exposed computer. However, there is a possibility of infection. Yang et al. proposed the Susceptible, Latent and Breaking out (SLB) computer model and the Susceptible, Latent and Breaking out, Susceptible (SLBS) computer model [2]. The computer was considered infectious during the latency period. Mishra et al. studied a Susceptible–Exposed–Infectious–Quarantined–Recovered (SEIQR) computer virus model [3]. Many other authors have also investigated the spread of computer viruses in the past by creating mathematical models [4–11]. SLBS computer model was developed by Yang et al. to study virus propagation [2]. Ahmed et al. proposed a Spatio-temporal computer virus model [12]. Ali et al. studied virus propagation through padé approximation [13]. Ebenezer et al. studied a fractional model of a computer virus by developing interaction between computers and removable devices [14]. Lanz et al. presented a virus model with the strategy of quarantine [15]. Xu et al. proposed a new model with a limited ability of the antivirus [16]. Parsaei et al. developed a new mathematical model of computer viruses [17]. Deng et al. presented a Susceptible, Infected, Recovered, Dead (SIRD) CMC, 2023, vol.74, no.3 5665 computer virus model and examined the transmission mechanisms of the virus [18]. Tuwairqi et al. has proposed two computer virus-propagation isolation strategies [19]. The fuzzy theory was introduced by Zadeh in 1965 [20]. Barros et al. [21] and Mondal et al. [22] examined epidemic models with fuzzy transmission coefficients. A fuzzy Susceptible–Infected– Recovered (SIR) model was proposed by Abdy et al. [23]. Ortega et al. [24] used fuzzy logic to predict the epidemiological problems associated with infectious diseases. The transmission of worms in computer networks was studied by Mishra et al. through a fuzzy Susceptible–Infectious––Recovered– Susceptible (SIRS) and a fuzzy Susceptible–Exposed–Infectious–Quarantined–Recovered–Susceptible (SEIQRS) model [25,26]. The low, medium, and high cases of outbreak control of worms on the computer network have been analyzed to understand better the worm attack, which can also control them. NSFD theory introduced by Mickens [27] is extensively used in the mathematical and numerical modeling of diseases. Allehiany et al. studied the COVID-19 dynamics using NSFD in fuzzy senses [28]. Dayan et al. developed an NSFD scheme to observe the spread of rumors and coronavirus dynamics [29,30]. Fuzzy theory is being applied in many other fields very frequently. Khokhar et al. presented a fuzzy logic controller to improve the performance and accuracy of the system, which also improved the efficiency of the cost and energy [31,32], for example. As with many other research questions on the spread of the virus, a reliable assessment of transmission dynamics is an essential part of the investigation. Collecting numerical data as a fixed value is a challenging task in many situations in daily life. Different degrees of infectivity and recovery from the infection among the considered PCs may raise uncertainties. Various sizes, models, spare parts, the surrounding environments of these PCs, and many other factors, like the resistance capacity of the individual PC against the virus, are some of the reasons for these uncertainties. Each personal PC has a different degree of infectivity and resistance against infection. In this scenario, the fuzzy model has richer dynamics than its classical counterpart in epidemiology. Keeping this in mind, a computer virus model with fuzzy parameters is developed in this study. The current work is an extension of the computer virus propagation model studied by Arif et al. by introducing fuzzy parameters, which makes it possible to explain the spread of viruses in computers in more detail. The novelty of the developed technique is the construction, execution, and mathematical analysis of the explicit first-order scheme in fuzzy environments with NSFD settings, particularly with fuzzy parameters. To our knowledge, the studied model has not been analyzed before in a fuzzy sense in the literature, and this is the first study of this model in this regard. The rest of this study is designed as some definitions and formulations of the fuzzy model are presented in Section 2. Numerical modeling is carried out in Section 3. Section 4 contains the resulting numerical solution and simulation results. Conclusions and future directions are presented in Section 5. 2 Computer Virus Propagation Model with Fuzzy Parameters 2.1 Definition 1 [33] A subset S of the set U denoted by µS (u) : U → [0, 1], where µS (u) shows the membership degree of u in S, is called a fuzzy subset. 2.2 Definition 2 [33] The number A = (ω1 , ω2 , ω3 ) is a triangular fuzzy number (TFN) if it is given by 5666 ⎧ 0, ⎪ ⎪ ⎪ ⎪ t − ω1 ⎪ ⎪ ⎪ ⎨ω − ω , 2 1 µA (t) = ω3 − t ⎪ ⎪ ⎪ , ⎪ ⎪ ω ⎪ 3 − ω2 ⎪ ⎩ 0, CMC, 2023, vol.74, no.3 t < ω1 ω 1 ≤ t ≤ ω2 ω 2 ≤ t ≤ ω3 t > ω3 . where ω1 ≤ ω2 ≤ ω3 . 2.3 Definition 3 [34] The expected value of a TFN A is given by a + 2b + c . E [A] = 4 2.4 Definition 4 The fuzzy basic reproductive number R0 f is defined as R0 f = E [R0 (v)] . We considered the computer virus propagation model that has been talked about by Arif et al. ′ S = δ − βS (L + B) + γ B − δS, (1) L′ = βS (L + B) − αL − δL, (2) B′ = αL − γ B − δB. (3) The corresponding SLB model with fuzzy parameters is ′ S = δ − β (a) S (L + B) + γ (a) B − δS, (4) L′ = β (a) S (L + B) − αL − δL, (5) B′ = αL − γ (a) B − δB. (6) The parameters S denotes susceptible, L means latent, and B denotes breaking out computers. α is the number of break-out latent PCs, β is the speed at which an infected PC damages a virus-free PC, γ is the rate of recovery of breaking-out PCs, and the speed with which systems connect to the Internet and internal systems connected are separated from the global network is indicated by δ. The presence or absence of the virus in computer virus propagation models is essential to distinguish breaking-out PCs from susceptible PCs. We consider the model’s heterogeneity by considering the infection in each PC as a function of the virus load. We assume that all infected PCs do not have the same contribution to the virus transmission process. Each PC has a different degree of infectivity, depending on the virus’s quantity. The parameters β(a) and γ (a) can be displayed as a function of the computer virus load a. The greatest chance of virus transmission is when the virus load is at its highest. The graphical representation of the parameter β(a) is defined as CMC, 2023, vol.74, no.3 5667 ⎧ 0, a < am ⎪ ⎪ ⎪ ⎨a−a m , am ≤ a ≤ a0 β (a) = ⎪ a − a 0 m ⎪ ⎪ ⎩ 1, a0 < a. The recovery rate γ = γ (a) given below is also assumed to be a fuzzy number. ⎧ ⎨(γ0 − 1) a + 1, 0 ≤ a ≤ a0 a0 γ (a) = ⎩γ , a ≤ a. 0 (7) (8) 0 γ0 > 0 is the minimum recovery rate. The membership function of β(a) and γ (a) are shown in Fig. 1. Figure 1: The membership function of (a) β (a) and (b) γ (a) 2.5 The Fuzzy Basic Reproductive Number Rc f β(a) . α + γ (a) Rc being a function of virus load is examined for various amounts of the virus as Rc is calculated using next-generation matrix theory and given by Rc = Case 1: If a < amin , β (a) = 0, then Rc (a) = 0. a − amin a − amin and Rc (a) = . Case 2: If amin < a ≤ aM , β (a) = aM − amin (α + γ (a)) (aM − amin ) 1 . Case 3: If aM < a < amax , β (a) = 1 and Rc (a) = α + γ (a) Rc (a) can be expressed as a TFN as:   1 β (a) . , Rc (a) = 0, α + γ (a) α + γ (a) Now we find Rc f as follows: 2β (a) + 1 . Rc f = E [Rc (a)] = 4 (α + γ (a)) 5668 CMC, 2023, vol.74, no.3 2.6 Fuzzy Equilibrium Analysis Case 1: If a < amin and β (a) = 0, we get S = 1, L = 0 and B = 0. Therefore, we obtain  E = S0 , L0 , B0 = (1, 0, 0) , 0 which is the virus-free equilibrium point. It is the situation when no virus exists in the computer. a − amin Case 2: If amin < a ≤ aM , then β (a) = , and we get E ∗ = (S∗ , L∗, B∗ ), where, aM − amin δ (α + δ)2 + δγ (a) (2δ + α + γ (a)) + α (δ − α) + αγ (a) , S∗ = β(a) (δ + γ (a)) (δ + γ (a) + 2α) L∗ = (α + δ + γ (a)) (β (a) − δ) − αγ (a) β(a) (δ + γ (a) + 2α) and B∗ = α [αβ (a) − δ (α + δ) + γ (a) (β (a) − 1)] . β(a) (δ + γ (a)) (δ + γ (a) + 2α) Case 3: If aM < a < amax , then β (a) = 1 and we obtain E ∗∗ = (S∗∗ , L∗ , B∗∗ ), where, S∗∗ = δ (α + δ)2 + δγ (a) (2δ + α + γ (a)) + α (δ − α) + αγ (a) , (δ + γ (a)) (δ + γ (a) + 2α) L∗∗ = (α + δ + γ (a)) (1 − δ) − αγ (a) (δ + γ (a) + 2α) and B∗∗ = α [α − δ (α + δ)] . + γ (δ (a)) (δ + γ (a) + 2α) 3 Numerical Modeling 3.1 Forward Euler Scheme Forward Euler scheme for the system (4–6) can be written as sn+1 = sn + h [δ − β(a)sn (l n + bn ) + γ (a)bn − δsn ] , (9) l n+1 = l n + h [β(a)sn (l n + bn ) − αl n − δl n ] , (10) bn+1 = bn + h [l n − γ (a)bn − δbn ] . (11) Here we focus on the model in a fuzzy environment of a specific group of PCs with a triangular membership function. We examine it for different amounts of viruses. Case 1: If a < amin , then β (a) = 0, and the above system becomes s n+1 = sn + h [δ + γ (a) bn − δsn ] , l n+1 = l n − h [αl n + δl n ] , bn+1 = bn + h [l n − γ (a) bn − δbn ] . CMC, 2023, vol.74, no.3 5669 a − amin , and the above system becomes aM − amin = sn + h [δ − β (a) sn (l n + bn ) + γ (a) bn − δsn ] , Case 2: If amin < a ≤ aM , then β (a) = sn+1 l n+1 = l n + h [β (a) sn (l n + bn ) − αl n − δl n ] , bn+1 = bn + h [l n − γ (a) bn − δbn ] . Case 3: If aM < a < amax , then β (a) = 1, and the above system becomes s n+1 = sn + h [δ − sn (l n + bn ) + γ (a) bn − δsn ] , l n+1 = l n + h [sn (l n + bn ) − αl n − δl n ] , bn+1 = bn + h [l n − γ (a) bn − δbn ] . 3.2 Nonstandard Finite Difference (NSFD) Scheme sn+1 NSFD scheme for the system (4–6) can be written as sn + hδ + hγ (a) bn = , 1 + hβ (a) (l n + bn ) + hδ l n+1 = l n + hβ (a) sn+1 (l n + bn ) , 1 + h (α + δ) bn+1 = bn + hαl n+1 . 1 + h (γ (a) + δ) Again, we examine the above scheme for different amounts of viruses as we focus on the model in a fuzzy environment of a specific group of PCs with a triangular membership function. sn+1 Case 1: If a < amin , then β (a) = 0, and the above system becomes sn + hδ + hγ (a) bn = , 1 + hδ l n+1 = ln , 1 + h (α + δ) bn+1 = bn + hαl n+1 . 1 + h (γ (a) + δ) Case 2: If amin < a ≤ aM then β (a) = sn+1 = sn + hδ + hγ (a) bn , 1 + hβ (a) (l n + bn ) + hδ a − amin and the above system becomes aM − amin 5670 CMC, 2023, vol.74, no.3 l n+1 = l n + hβ (a) sn+1 (l n + bn ) , 1 + h (α + δ) bn+1 = bn + hαl n+1 . 1 + h (γ (a) + δ) sn+1 Case 3: If aM < a < amax , then β (a) = 1, and the above system becomes sn + hδ + hγ (a) bn = , 1 + h (l n + bn ) + hδ l n+1 = l n + hsn+1 (l n + bn ) , 1 + h (α + δ) bn+1 = bn + hαl n+1 . 1 + h (γ (a) + δ) 3.3 Stability of the NSFD Scheme Let sn + hδ + hγ (a) bn M1 = , 1 + hβ (l n + bn ) + hδ M2 = l n + hβsn+1 (l n + bn ) , 1 + h (α + δ) M3 = bn + hαl n+1 . 1 + h (γ (a) + δ) Jacobian of the above equations can be written as ⎡ 1 −hβ (a) (s + hδ + hγ (a) b) ⎢ 1 + hβ (a) (l + b) + hδ [1 + hβ (a) (l + b) + hδ]2 ⎢ ⎢ ⎢ 1 + hβ (a) s hβ (a) (l + b) J=⎢ ⎢ 1 + h (α + δ) 1 + h (α + δ) ⎢ ⎢ ⎣ hα 0 1 + h (γ (a) + δ) The above Jacobian at the VFE becomes, ⎤ ⎡ 1 hγ (a) − h2 δ 0 2 ⎥ ⎢ 1 + hδ (1 + hδ) ⎥ ⎢ ⎥ ⎢ 1 ⎥ J1 = ⎢ 0 ⎥ ⎢ 0 1 + h (α + δ) ⎥ ⎢ ⎦ ⎣ 1 hα 0 1 + h (γ (a) + δ) 1 + h (γ (a) + δ) ⎤ h (γ (a) + hδlβ (a) − hδ) [1 + hβ (a) (l + b) + hδ]2 ⎥ ⎥ ⎥ ⎥ hβ (a) s ⎥ ⎥ 1 + h (α + δ) ⎥ ⎥ ⎦ 1 1 + h (γ (a) + δ) CMC, 2023, vol.74, no.3 5671 The above numerical scheme will be unconditionally convergent if and only if the absolute eigenvalues of the above Jacobian matrix are less than unity, i.e., |λi | < 1, i = 1, 2, 3.We obtain the 1 1 1 < 1, λ2 = < 1 and λ3 = < 1 from the Eigen values λ1 = 1 + hδ 1 + h (γ (a) + δ) 1 + h (α + δ) Jacobian matrix J1 . All eigenvalues are less than unity which is the desired result. 4 Numerical Simulations Numerical simulations for the above schemes are presented below. The behavior of the fuzzy SLB model can be examined in these graphs. In Fig. 2, the portions of susceptible computers are represented using Euler and NSFD schemes at different step sizes at the VFE point. The results indicate that the Euler method converges for a small value of the time step size h = 1. It oscillates in a nonphysical manner as we increase the value of the step size to h = 1.8. The NSFD method remains convergent and reflects a positive behavior at all step size values. Figure 2: Portion of susceptible computers using Euler and NSFD schemes at (a) h = 1, (b) h = 2.2 The portions of latent computers are shown in Fig. 3 using Euler and NSFD schemes at different step sizes at the VFE point. It can be seen in the graphs that the Euler scheme converges initially for a small value of the step size and creates negative values by increasing the value of h. The method also starts nonphysical oscillations at the increased step size. On the other hand side, the NSFD method converges to the steady-state despite changing the step sizes. Fig. 4 shows the solution results of the breaking out computers at two different values of the step size h. The Euler method behaves well at a smaller value of h, but oscillations get started with a slight increase in the value of h, and the technique produces negative results as well. The NSFD approach, on the other hand, side is independent of the importance of h and gives the same convergent results in all cases. The simulation results of compartment S for case 2 are depicted in Fig. 5. The behavior of Euler’s scheme at the start looks well for a smaller value. Still, it makes vast oscillations as we increase the step size and fails to converge smoothly. The NSFD still shows its converging behavior. 5672 CMC, 2023, vol.74, no.3 Figure 3: Portion of latent computers using Euler and NSFD schemes at (a) h = 1, (b) h = 1.8 Figure 4: Portion of computer breaking using Euler and NSFD schemes at (a) h = 1, (b) h = 1.82 Figure 5: Portion of susceptible computers using Euler and NSFD schemes at (a) h = 1, (b) h = 2.2 CMC, 2023, vol.74, no.3 5673 In Fig. 6, the numerical experiments of compartment L are represented at the first endemic equilibrium point. Again, we observe the positivity and convergence solutions of the NSFD method at both step sizes. Euler’s method remains positive and convergent for the smaller value and fails to produce positive and convergent solutions at increased step size. Figure 6: Portion of latent computers using Euler and NSFD schemes at (a) h = 1, (b) h = 1.38 Positive and convergent solutions of Euler’s scheme at a small value representing compartment B for case 2 can be seen in Fig. 7. The change in step size makes Euler’s method fail to converge. Figure 7: Portion of computer breaking using Euler and NSFD schemes at (a) h = 0.1, (b) h = 10 In Figs. 8–10, the portions of all model compartments are represented at the second endemic equilibrium point. The positivity and convergence solutions of the developed method are reflected again. The non-convergence behavior of Euler’s approach at a slightly higher value remains the same. One of the most exciting features of the above graphs is the consistency of the NSFD method across 5674 CMC, 2023, vol.74, no.3 all step sizes, as many other classical methods such as Euler Maruyama, Euler’s Stochastic, and RK-4 do not preserve it at large step sizes, as discussed in [35–49]. Standard finite difference schemes and stochastic techniques violate dynamical properties and produce negative and unbounded solutions that have no physical meaning, as discussed by Arif et al. Finite difference techniques with fuzziness exhibit similar behavior. Figure 8: Portion of susceptible computers using Euler and NSFD schemes at (a) h = 1, (b) h = 2.2 Figure 9: Portion of latent computers using Euler and NSFD schemes at (a) h = 1, (b) h = 1.82 On the other hand, the NSFD with fuzziness preserves the essential features of the epidemic model. Maintaining the dynamic constraints results in a model exhibiting good dynamic behavior even over large increments. This also gives a great implementation and computational advantage. CMC, 2023, vol.74, no.3 5675 Figure 10: Portion of computer breaking using Euler and NSFD schemes at (a) h = 1, (b) h = 1.8 5 Conclusion The numerical analysis of the computer virus propagation model with fuzzy parameters by introducing forward Euler and NSFD techniques is presented in this study with the assumption that the virus transmission and the recovery of the infected computers are not the same for all PC’s under consideration. These are treated as fuzzy numbers depending on the amount of the virus on the single individual PC. In classical models, each parameter is assigned a fixed value independent of the virus load. In this context, the model with fuzziness is more valuable and reliable. A comparison of both methods is presented, which shows the dynamical consistency of our proposed NSFD numerical scheme for the studied model. Euler’s approach could not produce convergent solutions at slightly significant time steps. The newly proposed technique is found to be positivity preserving and convergent through simulation results. The NSFD technique is, therefore, easy to implement, which shows stable behavior numerically and demonstrates a good agreement with analytic results possessed by the continuous model. Thus, the NSFD technique is easy to implement, exhibits normal numerical behavior, and shows a good deal with the analytical results of the continuous model. The current study is unique because it is the first attempt to analyze a computer virus model using Euler’s method and the NSFD scheme with fuzziness. The results obtained are new for the model. The proposed NSFD method preserves stability, equilibrium convergence, and positivity at all step sizes. In comparison, most other standard procedures do not preserve these essential characteristics of the epidemic system. The biggest strength of the proposed approach is that it performs well for all parameter options and initial and step size values, which can also be seen in the graphs discussed in the article. In this work, we analyze the epidemic model of propagation of computer viruses for a general class of parameters taken from the scientific literature. We plan to apply these results to real-time data. The current work mainly focuses on including fuzzy triangular numbers as membership functions. The trapezoidal, pentagonal, and other fuzzy numbers can also be used as membership functions which may also be our future directions. Stochastic, delayed, and fractional dynamics with the fuzziness of the studied model can also be considered as a future direction. 5676 CMC, 2023, vol.74, no.3 Acknowledgement: The authors are thankful to the Govt. of Pakistan for providing the facility to conduct the research. All Authors are grateful for the suggestions of anonymous referees to improve the quality of the manuscript. Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare they have no conflicts of interest to report regarding the present study. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] M. S. Arif, A. Raza, M. Rafiq, M. Bibi, J. N. Abbasi et al., “Numerical simulations for stochastic computer virus propagation model,” Computers, Materials and Continua, vol. 62, no. 1, pp. 61–77, 2020. L. X. Yang, X. Yang, L. Wen and J. Liu, “A novel computer virus propagationmodel and its dynamics,” International Journal of Computer Mathematics, vol. 89, no. 17, pp. 2307–2314, 2012. B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in computer network,” Applied Mathematical Modelling, vol. 34, no. 3, pp. 710–715, 2010. L. Billings, W. M. Spears and I. B. Schwartz, “A unified prediction of computer virus spread in connected networks,” Physics Letters A, vol. 297, no. 3, pp. 261–266, 2002. J. R. C. Piqueira, A. A. D. Vasconcelos, C. E. C. J. Gabriel and V. O. Araujo, “Dynamic models for computer viruses,” Computers and Security, vol. 27, no. 7, pp. 355–359, 2008. X. Han and Q. Tan, “Dynamical behavior of computer virus on internet,” Applied Mathematics and Computation, vol. 2, no. 17, pp. 2520–2526, 2010. Q. Zhu, X. Yang and J. Ren, “Modeling and analysis of the spread of computer virus,” Communication in Nonlinear Science and Numerical Simulation, vol. 17, no. 12, pp. 5117–5124, 2012. T. Dong, X. Liao and H. Li, “Stability and Hopf bifurcation in a computer virus model with multistate antivirus,” Abstract and Applied Analysis, vol. 1, no. 4, pp. 1–16, 2012. L. Feng, X. Liao, H. Li and Q. Han, “Hopf bifurcation analysis of a delayed viral infection model in computer networks,” Mathematical and Computer Modelling, vol. 56, no. 8, pp. 167–179, 2012. C. Gan, X. Yang and Q. Zhu, “Propagation of computer virus under the influences of infected external computers and removable storage media: Modeling and analysis,” Nonlinear Dynamics, vol. 78, no. 2, pp. 1349–1356, 2014. J. R. C. Piqueira and V. O. Araujo, “A modified epidemiological model for computer viruses,” Applied Mathematics and Computation, vol. 2, no. 13, pp. 355–360, 2009. N. Ahmed, U. Fatima, S. Iqbal, A. Raza, M. Rafiq et al., “Spatio-temporal dynamics and structurepreserving algorithm for computer virus model,” Computers, Materials & Continua, vol. 68, no. 1, pp. 201– 212, 2021. J. Ali, M. Saeed, M. Rafiq and S. Iqbal, “Numerical treatment of nonlinear model of virus propagation in computer networks: An innovative evolutionary padé approximation scheme,” Advances in Difference Equations, vol. 18, no. 1, pp. 214–228, 2018. B. Ebenezer, N. Farai and A. S. Kwesi, “Fractional dynamics of computer virus propagation,” Science Journal of Applied Mathematics and Statistics, vol. 3, no. 3, pp. 63–69, 2015. A. Lanz, D. Rogers and T. L. Alford, “An epidemic model of malware virus with quarantine,” Journal of Advances in Mathematics and Computer Science, vol. 33, no. 4, pp. 1–10, 2019. Y. H. Xu, J. G. Ren and G. Q. Sun, “Propagation effect of a virus outbreak on a network with limited antivirus ability,” PloS One, vol. 11, no. 10, pp. 1–18, 2016. M. R. Parsaei, R. Javidan, N. S. Kargar and H. S. Nik, “On the global stability of an epidemic model of computer viruses,” Theory in Biosciences, vol. 136, no. 3, pp. 169–178, 2017. Y. Deng, Y. Pei and C. Li, “Parameter estimation of a susceptible–infected–recovered–dead computer worm model,” Simulation, vol. 98, no. 3, pp. 209–220, 2022. CMC, 2023, vol.74, no.3 5677 [19] S. M. A. Tuwairqi and W. S. Bahashwan, “The impact of quarantine strategies on malware dynamics in a network with heterogeneous immunity,” Mathematical Modelling and Analysis, vol. 27, no. 2, pp. 282–302, 2022. [20] L. A. Zadeh, “Fuzzy sets,” Information Control, vol. 8, no. 1, pp. 338–353, 1965. [21] L. C. Barros, M. B. F. Leite and R. C. Bassanezi, “The SI epidemiological models with a fuzzy transmission parameter,” Computers & Mathematics with Applications, vol. 45, no. 11, pp. 1619–1628, 2003. [22] P. K. Mondal, S. Jana, P. Haldar and T. K. Kar, “Dynamical behavior of an epidemic model in a fuzzy transmission,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 23, no. 5, pp. 651–665, 2015. [23] M. Abdy, S. Side, S. Annas, W. Nur and W. Sanusi, “An SIR epidemic model for COVID-19 spread with fuzzy parameter: The case of Indonesia,” Advances in Difference Equations, vol. 105, no. 1, pp. 1–17, 2021. [24] N. R. S. Ortega, P. C. Sallum and E. Massad, “Fuzzy dynamical systems in epidemic modeling,” Kybernetes, vol. 29, no. 1, pp. 201–218, 2000. [25] B. K. Mishra and S. K. Pandey, “Fuzzy epidemic model for the transmission of worms in computer network,” Nonlinear Analysis: Real World Applications, vol. 11, no. 5, pp. 4335–4341, 2010. [26] B. K. Mishra and A. Prajapati, “Spread of malicious objects in computer network: A fuzzy approach,” Applications and Applied Mathematics: An International Journal, vol. 8, no. 2, pp. 684–700, 2013. [27] R. E. Mickens, “A fundamental principle for constructing nonstandard finite difference schemes for differential equations,” Journal of Difference Equations and Applications, vol. 11, no. 2, pp. 645–653, 2005. [28] F. M. Allehiany, F. Dayan, F. F. Al-Harbi, N. Althobaiti, N. Ahmed et al., “Bio-inspired numerical analysis of COVID-19 with fuzzy parameters,” Computers, Materials & Continua, vol. 72, no. 2, pp. 3213–3229, 2022. [29] F. Dayan, M. Rafiq, N. Ahmed, D. Baleanu, A. Raza et al., “Design and numerical analysis of fuzzy nonstandard computational methods for the solution of rumor-base fuzzy epidemic model,” Physica A: Statistical Mechanics and Its Applications, vol. 600, no. 1, pp. 1–19, 2022. [30] F. Dayan, N. Ahmed, M. Rafiq, A. Akgül, A. Raza et al., “Construction and numerical analysis of a fuzzy nonstandard computational method for the solution of an SEIQR model of COVID-19 dynamics,” AIMS Mathematics, vol. 7, no. 5, pp. 8449–8470, 2022. [31] S. U. D. Khokhar, Q. Peng, A. Asif, M. Y. Noor and A. Inam, “A simple tuning algorithm of augmented fuzzy membership functions,” IEEE Access, vol. 8, pp. 35805–35814, 2020. https://doi.org/10.1109/ ACCESS.2020.2974533. [32] S. U. D. Khokhar and Q. Peng, “Utilizing enhanced membership functions to improve the accuracy of a multi-inputs and single-output fuzzy system,” Applied Intelligence, vol. 8, no. 3, pp. 1–15, 2022. https://doi. org/10.1007/s10489-022-03799-4. [33] L. C. Barros, R. C. Bassanezi and W. A. Lodwick, “The extension principle of Zadeh and fuzzy numbers,” in A First Course in Fuzzy Logic, Fuzzy Dynamical Systems, and Biomathematics, Berlin, Germany: Springer International Publishing, pp. 23–41, 2017. [Online]. Available: https://doi. org/10.1007/978-3-662-53324-6_2. [34] Y. T. Mangongo, J. D. K. Bukweli and J. D. B. Kampempe, “Fuzzy global stability analysis of the dynamics of malaria with fuzzy transmission and recovery rates,” American Journal of Operations Research, vol. 11, no. 6, pp. 257–282, 2021. [35] A. Raza, M. S. Arif, M. Rafiq, M. Bibi, M. Naveed et al., “Numerical treatment for stochastic computer virus,” Computer Modeling in Engineering & Sciences, vol. 120, no. 2, pp. 445–465, 2019. [36] A. Raza, M. Rafiq, D. Baleanu, M. S. Arif, M. Naveed et al., “Competitive numerical analysis for stochastic HIV/AIDS epidemic model in a two-sex population,” IET Systems Biology, vol. 13, no. 6, pp. 305–315, 2019. [37] M. Jawaz, N. Ahmed, D. Baleanu, M. Rafiq and M. A. Rehman, “Positivity preserving technique for the solution of HIV/AIDS reaction-diffusion model with time delay,” Frontiers in Physics, vol. 7, no. 1, pp. 01–10, 2020. 5678 CMC, 2023, vol.74, no.3 [38] N. Ahmed, M. Rafiq, W. Adel, H. Rezazadeh, I. Khan et al., “Structure preserving numerical analysis of HIV and CD4+ T-cells reaction-diffusion model in two space dimensions,” Chaos Solitons & Fractals, vol. 139, no. 1, pp. 01–18, 2020. [39] A. Raza, A. Ahmadian, M. Rafiq, S. Salashour, M. Naveed et al., “Modeling the effect of delay strategy on transmission dynamics of HIV/AIDS disease,” Advances in Difference Equations, vol. 663, no. 1, pp. 1–19, 2020. [40] A. Raza, A. Ahmadian, M. Rafiq, S. Salahshour and R. I. Laganà, “An analysis of a nonlinear susceptibleexposed-infected-quarantine-recovered pandemic model of a novel coronavirus with delay effect,” Results in Physics, vol. 21, no. 1, pp. 01–07, 2021. [41] M. S. Arif, A. Raza, K. Abodayeh, M. Rafiq and A. Nazeer, “A numerical efficient technique for the solution of susceptible infected recovered epidemic model,” Computer Modeling in Engineering and Sciences, vol. 124, no. 2, pp. 477–491, 2020. [42] W. Shatanawi, A. Raza, M. S. Arif, M. Rafiq, M. Bibi et al., “Essential features preserving dynamics of stochastic dengue model,” Computer Modeling in Engineering and Sciences, vol. 126, no. 1, pp. 201–215, 2021. [43] M. A. Noor, A. Raza, M. S. Arif, M. Rafiq, K. S. Nisar et al., “Nonstandard computational analysis of the stochastic COVID-19 pandemic model: An application of computational biology,” Alexandria Engineering Journal, vol. 61, no. 1, pp. 619–630, 2021. [44] K. Abodayeh, A. Raza, M. S. Arif, M. Rafiq, M. Bibi et al., “Numerical analysis of stochastic vector-borne plant disease model,” Computers, Materials and Continua, vol. 63, no. 1, pp. 65–83, 2020. [45] K. Abodayeh, A. Raza, M. S. Arif, M. Rafiq, M. Bibi et al., “Stochastic numerical analysis for impact of heavy alcohol consumption on transmission dynamics of gonorrhoea epidemic,” Computers, Materials and Continua, vol. 62, no. 3, pp. 1125–1142, 2020. [46] A. Raza, J. Awrejcewicz, M. Rafiq, N. Ahmed, M. S. Ahsan et al., “Dynamical analysis and design of computational methods for nonlinear stochastic leprosy epidemic model,” Alexandria Engineering Journal, vol. 61, no. 10, pp. 8097–8111, 2022. [47] A. Raza, M. Rafiq, J. Awrejcewicz, N. Ahmed and M. Mohsin, “Stochastic analysis of nonlinear cancer disease model through virotherapy and computational methods,” Mathematics, vol. 10, no. 3, pp. 01–18, 2022. [48] A. Raza, M. Rafiq, J. Awrejcewicz, N. Ahmed and M. Mohsin, “Dynamical analysis of coronavirus disease with crowding effect, and vaccination: A study of third strain,” Nonlinear Dynamics, vol. 107, no. 4, pp. 3963–3982, 2022. [49] A. Raza, J. Awrejcewicz, M. Rafiq and M. Mohsin, “Breakdown of a nonlinear stochastic Nipah virus epidemic model through efficient numerical methods,” Entropy, vol. 23, no. 12, pp. 01–20, 2021.