SI/SIS/SIR models for malware propagation in P2P networks: Numerical analysis and perspectives for fractional-order extensions
Abstract
In this paper, we examined the suitability of epidemic models on networks to assess their potential application for detecting malware propagation patterns in peer-to-peer (P2P) computer networks. We analyzed how the Susceptible-Infected (SI), Susceptible-Infected-Susceptible (SIS), and Susceptible-Infected-Recovered (SIR) models, which were originally developed for biological viruses, can be applied to digital viruses. Using the Gnutella network dataset as a representative topology of P2P networks, we simulated infection scenarios to evaluate how scale-free network properties and the presence of high-degree nodes acting as super-spreaders influence the propagation speed and network saturation. The obtained results show that the examined models can be used and provide valuable insight into epidemic dynamics. However, the existing models are not perfect, and the introduction of additional states, such as L for latency and Q for quarantine, is proposed, since these are relevant for digital devices and digital viruses. More precisely, the absence of latent (L) and quarantine (Q) components leads to an overestimation of infection speed and an inability to model strategic isolation. Accordingly, this study provides empirical evidence that standard biological models are not sufficient for accurate predictions in the field of cybersecurity in P2P environments, and that future modeling efforts should move from basic compartmental models toward more advanced frameworks, such as SEIR and SIQR, to realistically capture malware activation delays and the impact of active defense strategies.
Copyright (c) 2026 Dušan Džamić, Aleksa Marković

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
[1]Cohen F. Computer viruses: theory and experiments. Computers & Security. 1987; 6(1): 22–35.
[2]Kephart JO, White SR. Directed-graph epidemiological models of computer viruses. In: Computation: The Micro and the Macro View. World Scientific; 1991. pp. 71–102.
[3]Kermack WO, McKendrick AG. A contribution to the mathematical theory of epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character. 1927; 115(772): 700–721.
[4]Newman ME. Spread of epidemic disease on networks. Physical review E. 2002; 66(1): 016128.
[5]Martínez Martínez I, Florián Quitián A, Díaz-López D, et al. Malseirs: forecasting malware spread based on compartmental models in epidemiology. Complexity. 2021; 2021(1): 5415724.
[6]Lua EK, Crowcroft J, Pias M, et al. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials. 2005; 7(2): 72–93.
[7]Barabási A-L, Albert R. Emergence of scaling in random networks. Science. 1999; 286(5439): 509–512.
[8]Pastor-Satorras R, Vespignani A. Epidemic spreading in scale-free networks. Physical review letters. 2001; 86(14): 3200.
[9]Ripeanu M, Foster I, Iamnitchi A. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. arXiv preprint. 2002; arXiv:cs/0209028.
[10]Alsubaie AA, Aljoufi MD, Alotaibi AG, et al. Adomian’s method for solving a nonlinear epidemic model. Advances in Differential Equations and Control Processes. 2024; 31(1): 95–107.
[11]Pavlenko EY, Samarin N. Artificial Immunization in Hierarchical and Peer-to-Peer Networks to Protect Against Cyber Threats. Automatic Control and Computer Sciences. 2025; 59(8): 1519–1526.
[12]Kazem H, El Madhoun N, Bouzefrane S, et al. Security challenges and countermeasures in blockchain's peer-to-peer architecture. In: IFIP International Conference on Information Security Theory and Practice. Springer; 2024. pp.
[13]–127.
[14]Adamic LA, Lukose RM, Puniyani AR, et al. Search in power-law networks. Physical Review E. 2001; 64(4): 046135.
[15]Cohen R, Havlin S. Scale-free networks are ultrasmall. Physical Review Letters. 2003; 90(5): 058701.
[16]Miller JC, Ting T. Eon (epidemics on networks): a fast, flexible Python package for simulation, analytic approximation, and analysis of epidemics on networks. arXiv preprint. 2020; arXiv:2001.02436.
[17]Szor P. The Art of Computer Virus Research and Defense. Pearson Education; 2005.
[18]Hosseini S, Azgomi MA, Rahmani AT. Malware propagation modeling considering software diversity and immunization. Journal of Computational Science. 2016; 13: 49–67.
[19]Fahreza FR, Hasan M, Santoso KA. Chaotic Outbreak in Discrete Epidemic Model with Vaccination and Quarantine Interventions and Limited Medical Resources. Majalah Ilmiah Matematika dan Statistika. 2025; 25(1): 22–35.
[20]Piqueira JRC, Batistela CM. Considering quarantine in the SIRA malware propagation model. Mathematical Problems in Engineering. 2019; 2019(1): 6467104.
[21]Nisar KS, Farman M, Abdel-Aty M, et al. A review on epidemic models in sight of fractional calculus. Alexandria Engineering Journal. 2023; 75: 81–113.
[22]Nisar KS, Farman M, Abdel-Aty M, et al. A review of fractional order epidemic models for life sciences problems: Past, present and future. Alexandria Engineering Journal. 2024; 95: 283–305.
[23]Chen Y, Liu F, Yu Q, et al. Review of fractional epidemic models. Applied Mathematical Modelling. 2021; 97: 281–307.
[24]Alshammari NA, Alharthi N, Mohammed Saeed A, et al. Numerical solutions of a fractional order SEIR epidemic model of measles under Caputo fractional derivative. PloS One. 2025; 20(5): e0321089.
[25]Gkrekas N. Applying Laplace transformation on epidemiological models as Caputo derivatives. Mathematical Biology and Bioinformatics. 2024; 19(1): 61–76.
[26]Sene N. SIR epidemic model with Mittag–Leffler fractional derivative. Chaos, Solitons & Fractals. 2020; 137: 109833.
[27]Balzotti C, D’Ovidio M, Lai AC, et al. Effects of fractional derivatives with different orders in SIS epidemic models. Computation. 2021; 9(8): 89.




