Optimal Control of a Delay-Varying Computer Virus Propagation Model

By incorporating the objective of keeping a low number of infected nodes and a high number of recovered nodes at a lower cost into a known computer virus model (the delay-varying SIRC model) extended by introducing quarantine, a novel model is described by means of the optimal control strategy and theoretically analyzed.Through the comparison of simulation results, it is shown that the propagation of computer virus with varying latency period can be suppressed effectively by the optimal control strategy.


Introduction
With the advance of computer software and hardware technology and communication technology, the number and sort of computer viruses have increased dramatically, which causes huge losses to the human society.Therefore, establishing reasonable computer virus propagation models by considering the characteristics of computer virus, by model analysis, and by understanding the spread law of the virus over the network is a currently hot topic of research.
Learning from the epidemic models, the classical SIR (susceptible-infected-recovered) computer virus propagation model [1,2], as well as its extensions [3][4][5][6][7][8][9][10][11][12][13][14][15], is extended to explore the behavior of computer virus propagation in network.For example, by considering the computer virus fixed latent period, Mishra et al. [6,7] proposed delayed SIRS, SEIR computer virus models with a fixed period of temporary immunity, which accounts for the temporary recovery from the infection of virus.Very recently, Ren and Xu [16] introduced an interesting virus propagation model, known as the SIRC model, by considering the fact that when the virus enters into the susceptible computers, their latency periods vary and investigated the dynamics of the model.Once the rule of the virus spread is revealed, it comes to be a major issue how to control the virus spread effectively [17][18][19].
In this paper, by incorporating the objective of keeping a low number of infected nodes and a high number of recovered nodes at the lower cost into a delay-varying computer virus propagation model (SIRC model) extended by introducing the new compartment quarantine, a novel model is described by means of the optimal control strategies associated with measures of quarantine and installing antivirus programs and firewalls and theoretically analyzed.It is comparatively showed that optimal control strategy is much more effective for controlling virus with varying latency period in network.
The remaining materials of this paper are organized this way: Section 2 introduces the mathematical model to be discussed; Section 3 studies the controlled system theoretically.In Section 4, we solve the controlled system numerically using the Runge-Kutta procedure and make numerical comparisons with control and without control.We end the paper with a brief conclusion in Section 5. (

Mathematical Model
Here, it is assumed that all the computers connected to the network in concern are classified into three categories: susceptible, infected, and recovered computers.Let (), (), and () denote their corresponding numbers at time .This model involves some positive parameters:  denotes the rate at which external computers are connected to the network,  denotes the recovery rate of infected computers due to the antivirus ability of the network,  denotes the rate at which one computer is removed from the network, and  denotes the rate at which, when having connection to one infected computer, one susceptible computer can become infected.By appropriate assumptions and extensions in [16], model (1) where () denotes the effect of past infection information in the susceptible computers at time ,  is a positive delay parameter with the initial conditions (0) ≥ 0, (0) ≥ 0, (0) ≥ 0, and the positively invariant set Recently, more research attention has been paid to the combination of virus propagation models and antivirus countermeasures to investigate the prevalence of virus.As an elementary measure, quarantine [20,21] is used to restrain the spread of computer virus.Extending the previous SIRC, a new compartment quarantine has been introduced under which the susceptible, infected computers exhibited suspicious behavior and, consequently, have been quarantined.The model with quarantine can be written as where parameter  denotes the rate at which the susceptible computers are quarantined,  denotes the rate at which the infected computers are quarantined.
For our purpose, first, we introduce two Lebesgue square integrable control functions.
(1)  1 () denotes the cost for installing effective antivirus programs and firewalls on the susceptible computers and infected computers at time .(2)  2 () denotes the cost for quarantining the susceptible and infected computers at time .
Both of the control functions are normalized to fall between 0 and 1, and the admissible set of control functions is given by To obtain the controlled model, the following assumptions are made.
Taking into account the assumptions made above, the model (7) can become the following computer virus propagation model: with the given initial conditions and the positively invariant set.

Optimal Control Problem
During the time period [0,   ], under the above assumptions and extensions, our objective is given by the following.
(1) Minimize the number of infected computers () and maximize the number of recovered computers ().
(2) Minimize the total cost to quarantine the susceptible and infected computers.(3) Minimize the total cost for installing the antivirus programs and firewalls in the susceptible and infected computers.
Thus, our optimal control problem is to minimize the objective functional: where parameter  denotes the weight constants of effect of latent virus,  1 ,  2 are trade-off factors.
To find an optimal solution to (4), consider the Lagrangian Define the Hamiltonian  for the control problem as with the transversality conditions (or boundary conditions)   (  ) = 0,  = 1, 2, 3, 4, 5.
Proof.We use the results in [22,23].It is clear that the set of control and corresponding state variables are nonnegative values and the set  ad is convex and closed.
Proof.By the adjoint equations and optimality conditions, we have which can be obtained from / 1 = 0, / 2 = 0, respectively.Noting a fact that 0 ≤  1 () ≤ 1, 0 ≤  2 () ≤ 1, we obtain that From the previous analysis, to get the optimal point, we have to solve the system with the Hamiltonian

Numerical Simulations
In this section, to find out the optimal control solution, we numerically solve system (13) with ( 14) by a Runge-Kutta procedure and make numerical comparisons.Figures 1-5 plot the numbers of susceptible, infected, recovered, and quarantined computers as well as the effect of past infection information in the susceptible computers with and without control, with the parameters shown in Table 1 and the initial conditions shown in Table 2.
The number of computers under control is marked by solid line, whereas the number of remaining computers is marked by dashed line.One can see that, under control, the number of susceptible computers is sharply low, which is the same as the effect of past infection information in Figure 5.In Figure 2, we can see that the number of infected computers under control is lower than that without control.In Figure 3, the number of recovered computers is very small without control and more recovered computers increase more rapidly.Although the number of quarantined computers with control would slightly grow in Figure 4, we mainly consider tradeoff between the cost and effect of the quarantine.Figures 6 and 7 plot the control variables  1 ,  2 versus time  with associated weight factor  1 ∈ {30, 50, 70, 90} and  2 ∈ {10, 15, 25, 35}, respectively.

Conclusions
By incorporating the objective of keeping a low number of infected nodes and a high number of recovered nodes at the lower cost into a known computer virus model (the delayvarying SIRC model) extended by introducing quarantine, a novel model is described by means of the optimal control strategy and theoretically analyzed.A comparison between optimal control and without control is presented, which demonstrates the effectiveness of our method.The results obtained in the present paper can help understand and control the spread of computer virus over a computer network.

Figure 1 :Figure 2 :
Figure 1: Susceptible computers (with and without control) versus time .

Figure 3 :
Figure 3: Recovered computers (with and without control) versus time .

Figure 6 :
Figure 6: The control variable  1 () versus time  for different weight factors.

Figure 7 :
Figure 7: The control variable  2 () versus time  for different weight factors.