Home Download Help Resources Extensions FAQ NetLogo Publications Contact Us Donate Models: Library Community Modeling Commons User Manuals: Web Printable Chinese Czech Farsi / Persian Japanese Spanish

NetLogo Models Library: 
If you download the NetLogo application, this model is included. You can also Try running it in NetLogo Web 
This model demonstrates the spread of a virus through a network. Although the model is somewhat abstract, one interpretation is that each node represents a computer, and we are modeling the progress of a computer virus (or worm) through this network. Each node may be in one of three states: susceptible, infected, or resistant. In the academic literature such a model is sometimes referred to as an SIR model for epidemics.
Each time step (tick), each infected node (colored red) attempts to infect all of its neighbors. Susceptible neighbors (colored green) will be infected with a probability given by the VIRUSSPREADCHANCE slider. This might correspond to the probability that someone on the susceptible system actually executes the infected email attachment. Resistant nodes (colored gray) cannot be infected. This might correspond to uptodate antivirus software and security patches that make a computer immune to this particular virus.
Infected nodes are not immediately aware that they are infected. Only every so often (determined by the VIRUSCHECKFREQUENCY slider) do the nodes check whether they are infected by a virus. This might correspond to a regularly scheduled virusscan procedure, or simply a human noticing something fishy about how the computer is behaving. When the virus has been detected, there is a probability that the virus will be removed (determined by the RECOVERYCHANCE slider).
If a node does recover, there is some probability that it will become resistant to this virus in the future (given by the GAINRESISTANCECHANCE slider).
When a node becomes resistant, the links between it and its neighbors are darkened, since they are no longer possible vectors for spreading the virus.
Using the sliders, choose the NUMBEROFNODES and the AVERAGENODEDEGREE (average number of links coming out of each node).
The network that is created is based on proximity (Euclidean distance) between nodes. A node is randomly chosen and connected to the nearest node that it is not already connected to. This process is repeated until the network has the correct number of links to give the specified average node degree.
The INITIALOUTBREAKSIZE slider determines how many of the nodes will start the simulation infected with the virus.
Then press SETUP to create the network. Press GO to run the model. The model will stop running once the virus has completely died out.
The VIRUSSPREADCHANCE, VIRUSCHECKFREQUENCY, RECOVERYCHANCE, and GAINRESISTANCECHANCE sliders (discussed in "How it Works" above) can be adjusted before pressing GO, or while the model is running.
The NETWORK STATUS plot shows the number of nodes in each state (S, I, R) over time.
At the end of the run, after the virus has died out, some nodes are still susceptible, while others have become immune. What is the ratio of the number of immune nodes to the number of susceptible nodes? How is this affected by changing the AVERAGENODEDEGREE of the network?
Set GAINRESISTANCECHANCE to 0%. Under what conditions will the virus still die out? How long does it take? What conditions are required for the virus to live? If the RECOVERYCHANCE is bigger than 0, even if the VIRUSSPREADCHANCE is high, do you think that if you could run the model forever, the virus could stay alive?
The real computer networks on which viruses spread are generally not based on spatial proximity, like the networks found in this model. Real computer networks are more often found to exhibit a "scalefree" linkdegree distribution, somewhat similar to networks created using the Preferential Attachment model. Try experimenting with various alternative network structures, and see how the behavior of the virus differs.
Suppose the virus is spreading by emailing itself out to everyone in the computer's address book. Since being in someone's address book is not a symmetric relationship, change this model to use directed links instead of undirected links.
Can you model multiple viruses at the same time? How would they interact? Sometimes if a computer has a piece of malware installed, it is more vulnerable to being infected by more malware.
Try making a model similar to this one, but where the virus has the ability to mutate itself. Such selfmodifying viruses are a considerable threat to computer security, since traditional methods of virus signature identification may not work against them. In your model, nodes that become immune may be reinfected if the virus has mutated to become significantly different than the variant that originally infected the node.
Virus, Disease, Preferential Attachment, Diffusion on a Directed Network
Links are used for modeling the network. The layoutspring
primitive is used to position the nodes and links such that the structure of the network is visually clear.
Though it is not used in this model, there exists a network extension for NetLogo that you can download at: https://github.com/NetLogo/NWExtension.
If you mention this model or the NetLogo software in a publication, we ask that you include the citations below.
For the model itself:
Please cite the NetLogo software as:
Copyright 2008 Uri Wilensky.
This work is licensed under the Creative Commons AttributionNonCommercialShareAlike 3.0 License. To view a copy of this license, visit https://creativecommons.org/licenses/byncsa/3.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
Commercial licenses are also available. To inquire about commercial licenses, please contact Uri Wilensky at uri@northwestern.edu.
(back to the NetLogo Models Library)