PEMODELAN MATEMATIKA PENYEBARAN VIRUS KOMPUTER MELALUI FLASH DRIVE DENGAN PERLINDUNGAN ANTIVIRUS
Abstract
Peneltian ini membahas tentang model matematika penyebaran virus komputer. Media penyebaran virus yang ditinjau dalam penelitian ini adalah flash drive. Tujuan penelitian adalah menemukan model penyebaran virus dengan melibatkan antivirus untuk melindungi komputer. Model dikembangkan dengan membagi komputer ke dalam empat kompartemen yaitu kompartemen komputer rentan, komputer terinfeksi virus, komputer dengan antivirus, dan komputer tidak aktif. Sedangkan, flash drive dikelompokkan ke dalam dua kompartemen yaitu flash drive rentan dan terinfeksi. Analisis model menghasilkan dua titik ekuilibrium yaitu titik ekuilibrium bebas virus dan endemik virus. Kestabilan titik ekuilibrium bergantung pada bilangan reproduksi dasar . Hasil penelitian menunjukkan bahwa peningkatan laju penggunaan antivirus akan menurunkan nilai . Hasil simulasi numerik memperlihatkan bahwa semakin besar nilai maka semakin banyak pula komputer yang terinfeksi virus. Namun sebaliknya, semakin kecil nilai maka semakin sedikit pula komputer yang terinfeksi virus. Nilai menandakan seluruh komputer bebas dari virus.
Keywords
Full Text:
PDFReferences
S. M. Al-Tuwairqi and W. Bahashwan, “A dynamic model of viruses with the effect of removable media on a computer network with heterogeneous immunity,” Adv. Differ. Equations, vol. 2020, no. 260, pp. 1–20, 2020, doi: 10.1186/s13662-020-02710-0.
L. Esteva and C. Vargas, “Analysis of a dengue disease transmission model,” Math. Biosci., vol. 150, no. 2, pp. 131–151, 1998, doi: https://doi.org/10.1016/S0025-5564(98)10003-2.
L. O. Sabran, I. D. Rianjaya, L. H. Hasibuan, and L. O. Nashar, “Analysis of Covid-19 Fomite Transmission Model With Disinfectant Spray,” BAREKENG J. Ilmu Mat. dan Terap., vol. 16, no. 3, pp. 1021–1030, 2022, doi: 10.30598/barekengvol16iss3pp1021-1030.
A. Coronel, F. Huancas, I. Hess, E. Lozada, and F. Novoa-Muñoz, “Analysis of a SEIR-KS mathematical model for computer virus propagation in a periodic environment,” Mathematics, vol. 8, no. 5, pp. 1–20, 2020, doi: 10.3390/MATH8050761.
F. Cohen, “Computer viruses: Theory and experiments,” Comput. Secur., vol. 6, no. 1, pp. 22–35, 1987, doi: https://doi.org/10.1016/0167-4048(87)90122-2.
W. H. Murray, “The application of epidemiology to computer viruses,” Comput. Secur., vol. 7, no. 2, pp. 139–145, 1988, doi: https://doi.org/10.1016/0167-4048(88)90327-6.
R. K. Upadhyay and P. Singh, “Modeling and control of computer virus attack on a targeted network,” Phys. A Stat. Mech. its Appl., vol. 538, p. 122617, 2020, doi: https://doi.org/10.1016/j.physa.2019.122617.
W. E. Boyce and R. C. Diprima, Elementary Differential Equations and Boundary Value Problems, Ninth Edit. John Wiley & Sons, Inc, 2009.
L. Perko, Differential Equations and Dynamical Systems, Third Edit. New York: Springer, 2012.
S. Wiggins, Introduction to Applied Nonlinear Dynamical Systems and Chaos, Second Edi. New York: Springer, 2006.
O. Diekmann, J. A. P. Heesterbeek, and J. A. J. Metz, “On the definition and the computation of the basic reproduction ratio R0 in models for infectious diseases in heterogeneous populations,” J. Math. Biol., vol. 28, no. 4, pp. 365–382, 1990, doi: 10.1007/BF00178324.
P. van den Driessche and J. Watmough, “Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission,” Math. Biosci., vol. 180, no. 1, pp. 29–48, 2002, doi: https://doi.org/10.1016/S0025-5564(02)00108-6.
T. A. Cahyanto, V. Wahanggara, and D. Ramadana, “Analisis dan deteksi malware menggunakan metode malware analisis dinamis dan malware analisis statis,” JUSTINDO (Jurnal Sist. dan Teknol. Inf. Indones., vol. 2, no. 1, pp. 19–30, 2017, doi: https://doi.org/10.32528/justindo.v2i1.1037.
S. Kramer and J. C. Bradfield, “A general definition of malware,” J. Comput. Virol., vol. 6, no. 2, pp. 105–114, 2010, doi: 10.1007/s11416-009-0137-1.
P. P. Pemungkas, S. Sutrisno, and S. Sunarsih, “Pengembangan Model Epidemik Sira Untuk Penyebaran Virus Pada Jaringan Komputer,” J. Fundam. Math. Appl., vol. 2, no. 1, pp. 13–21, 2019, doi: https://doi.org/10.14710/jfma.v2i1.26.
Y. S. Suci, A. Aryanti, and A. Asriyadi, “Rancang bangun sistem keamanan data komputer pada antivirus vici menggunakan sistem realtime protector dan metode heuristic ganda,” IT J. Res. Dev., vol. 3, no. 1, pp. 84–94, 2018.
DOI: https://doi.org/10.15548/map.v6i1.8791
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.