Next Article in Journal
MOR-SLAM: A New Visual SLAM System for Indoor Dynamic Environments Based on Mask Restoration
Next Article in Special Issue
Clustering Component Synchronization of Nonlinearly Coupled Complex Networks via Pinning Control
Previous Article in Journal
Adaptive Synthesized Control for Solving the Optimal Control Problem
Previous Article in Special Issue
Recurrent Neural Network with Finite Time Sampling for Dynamics Identification in Rehabilitation Robots
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Control Strategy for SLBRS with Two Control Inputs

Department of Mathematics, Suqian University, Suqian 223800, China
Mathematics 2023, 11(19), 4036; https://doi.org/10.3390/math11194036
Submission received: 8 August 2023 / Revised: 15 September 2023 / Accepted: 21 September 2023 / Published: 22 September 2023
(This article belongs to the Special Issue Control Problem of Nonlinear Systems with Applications, 2nd Edition)

Abstract

:
Computer virus attacks result in significant losses each year, drawing considerable attention from enterprises, governments, academic institutions, and various other sectors. Researchers have proposed various approaches to fight against computer viruses, including antivirus software and internet firewalls. In this paper, we focus on investigating computer virus transmission from the perspective of mathematical modeling. Our main contributions in this paper are threefold: (1) we improve the classical SLBRS model by incorporating cure rates, effectively capturing the dynamics of computer network maintenance; (2) we introduce an optimal control system within the SLBRS framework, with the dual objectives of minimizing network detoxification costs and reducing the proportion of broken-out nodes; and (3) by employing Pontryagin’s Maximum Principle, we establish the existence and uniqueness of an optimal control strategy for the proposed control system. Furthermore, we perform numerical simulations to demonstrate the effectiveness of our theoretical analyses.

1. Introduction

In the era of big data, information exchanges have escalated in our daily lives, thereby amplifying the potential for computer virus propagation within computer networks. Computer virus threats result in substantial losses to enterprises, governments, academic fields, and various sectors worldwide every year (For instance, notable cases like the Stuxnet virus in 2010 and the Ransomware virus in 2017 inflicted tens of billions of dollars within the finance, education, energy, and other sectors). A diverse range of measures must be undertaken to combat computer viruses, including the implementation of firewalls and antivirus software. Nevertheless, delving into the propagation mechanisms of computer viruses is of heightened urgency compared to merely eradicating them from specific networks. Over the past few decades, various ordinary differential equations have been proposed to model the propagation mechanisms of computer viruses. Usually, computers within a network are categorized into distinct compartments: susceptible nodes—S(t), infected nodes—I(t), quarantine nodes—Q(t), recovery nodes—R(t), broken-out nodes—B(t), latent nodes—L(t), etc. In accordance with specific scenarios, certain interdependencies among these compartments are established, leading to the nomenclature of the model based on the compartments involved, i.e., SI, SEIR, SEIRQ, and so on.
In 1991, Kephart, White et al. introduced the SI model, which stands as the pioneering work in the field of applying differential equations to model computer virus transmission [1];
  • In 2007, Mishra, Saini et al. proposed the SEIR model [2];
  • In 2010, Mishra, Jha introduced the SEIQRS model [3];
  • In 2012, Yang, Wen et al. proposed the SLBS model [4].
These early computer virus models are inspired extensively by the results concerning epidemiological virus models, which share a common assumption that an infected computer in a latent state will not transmit a virus to other computers. However, this assumption does not always hold true for computer virus transmission. In fact, when it comes to computer viruses, the following phenomenon occur:
(a)
Once a computer is infected, it immediately gains the ability to spread the infection;
(b)
Recovered computers can acquire temporary immunity.
In 2012, Yang, Zhang, Li et al. modified the classical SLBS model by incorporating a recovery compartment (R(t)) and used the SLBRS to model computer virus transmission, taking into account the observations in (a) and (b) (see Reference [5]). The detailed relationships among the involved compartments are illustrated in Figure 1.
When faced with a computer virus attack, computer users often adopt different protective measures to fight against it(see Reference [6]). The following are some examples:
(c)
Some users promptly execute antivirus software to eliminate the virus once they become aware of the threat. If the damage is extensive and recovery is not feasible, users may resort to reinstalling the operating system. This scenario often occurs in broken-out nodes.
(d)
Other users might attempt to clear the virus proactively, even if they are not certain whether the virus is present on their computers. This behavior is typically observed in latent nodes.
Take (c) and (d) into account, people usually make the assumption that breaking-out computers can be cured with specific cure rates γ 1 and γ 3 (either through executing antivirus software or by reinstalling the system), and similarly, latent computers can be cured with a certain cure rate γ 2 (by using antivirus softwares). The graded cure rates γ 1 , γ 2 ,   a n d   γ 3 are integrated into the SLBRS model, resulting in a SLBRS model with cure rates.
Figure 2 can be represented by a system of differential equations, as follows:
d S ( t ) d t = p β S ( L + B ) + γ 3 B + σ R μ S , d L ( t ) d t = β S ( L + B ) α L γ 2 L μ L , d B ( t ) d t = α L γ 3 B μ B γ 1 B , d R ( t ) d t = γ 2 L σ R μ R + γ 1 B ,
where γ 1 , γ 2 , a n d   γ 3 represent the cure rates (usually γ 1 > γ 2 > γ 3 ); α , β , σ , p , a n d   μ represent the conversion rates (non-negative constants); and S(t), L(t), B(t), and R(t) represent the compartments in the network: susceptible nodes, latent nodes, broken-out nodes, recovery nodes.
The intensity of computer virus attacks fluctuates over time, and the countermeasures adopted by computer users also vary (with computer users bolstering protection during hacking threats and vice versa). Hence, a more realistic approach is to hypothesize that the included cure rates are time-varying. We replace the cure rate γ 1 by a Lebesgue measurable function u 1 ( t ) .
Figure 3 can be represented by the following system of differential equations:
d S ( t ) d t = p β S ( L + B ) + γ 3 B + σ R μ S , d L ( t ) d t = β S ( L + B ) α L γ 2 L μ L , d B ( t ) d t = α L γ 3 B μ B u 1 ( t ) B , d R ( t ) d t = γ 2 L σ R μ R + u 1 ( t ) B .
Naturally, the inclusion of more control inputs gains a heightened level of manipulation over the system. We replace the cure rates γ 1 and γ 2 with Lebesgue measurable functions u 1 ( t ) and u 2 ( t ) (the other cases are similar and, thus, we omit the details in this paper).
Figure 4 can be represented by the following system of differential equations:
d S ( t ) d t = p β S ( L + B ) + γ 3 B + σ R μ S , d L ( t ) d t = β S ( L + B ) α L μ L u 2 ( t ) L , d B ( t ) d t = α L γ 3 B μ B u 1 ( t ) B , d R ( t ) d t = σ R μ R + u 1 ( t ) B + u 2 ( t ) L ,
Research on computer virus models has primarily focused on modeling, stability analysis, and related simulations. As research progresses, various mathematical tools have been applied to the analysis of computer virus models, particularly control theory (see [7,8,9,10,11]). In this paper, we treat the time-varying cure rates u 1 ( t ) and u 2 ( t ) as control input functions and investigate the optimal control problem for SLBRS. The rest of this paper is outlined as below:
In Section 2, we establish the theoretical foundations encompassing the existence and uniqueness of the optimal control strategy, and the necessary conditions for optimal control.
In Section 3, we provide a numerical simulation to demonstrate the effectiveness of the theoretical analyses presented in Section 2.
In Section 4, we draw the conclusion according to the theoretical analyses and the numerical experiment.

2. Optimal Control Strategy for SLBRS

2.1. Optimal Control Problem

Let T be a pre-assigned constant. We define the admissible control set as follows:
U = u = ( u 1 ,   u 2 ) : 0 u i ( t ) 1 ,   t [ 0 ,   T ] ,   for   i = 1 ,   2 ,
To effectively restore a contaminated network, any undertaken measure should aim to minimize the proportion of infected computers (L(t) and B(t)) or reduce the cost of system maintenance. With this objective, we present the optimal control problem as follows:
min J ( u ) = 0 T L ( t ) + B ( t ) + ε u 1 2 ( t ) 2 + τ u 2 2 ( t ) 2 d t ,   u U ,
which is subject to (3).
Corresponding to (5), we define the Lagrangian as follows:
L ( L ,   B ,   u ) = L ( t ) + B ( t ) + ε u 1 2 ( t ) 2 + τ u 2 2 ( t ) 2 ,   u = ( u 1 ,   u 2 )
And we define the Hamiltonian as follows:
H ( L , B , u ) = L ( L , B , u ) + λ 1 p β S ( L + B ) + γ 3 B + σ R μ S + λ 2 [ β S ( L + B )   α L μ L u 2 ( t ) L ] + λ α L γ 3 B μ B u 1 ( t ) B   + λ 4 σ R μ R + u 1 ( t ) B + u 2 ( t ) L .

2.2. Main Results and Their Proofs

Firstly, we demonstrate the existence of an optimal solution for the control system (3)–(5) based on the following theorem:
Theorem 1.
There exists an optimal control input u * = ( u 1 * ,   u 2 * ) such that
min u U   J ( u 1 ,   u 2 ) = J ( u 1 * , u 2 * )
subject to the control system (3)–(5) with initial conditions:
S ( 0 ) = S 0 0 ,   L ( 0 ) = L 0 0 ,   B ( 0 ) = B 0 0 ,   R ( 0 ) = R 0 0 .
Proof.
To establish the existence of an optimal solution for the control system (3)–(5), it suffices to validate the following general conditions (see [12]):
(a)
The set of control and state variables is nonempty.
(b)
The admissible control set U is both closed and convex.
(c)
The right-hand side of the state system can be bounded by a linear function of the state variables.
(d)
The Lagrangian is concave on the admissible control set U, and there exist constants  k > 1 , c 1 > 0 , and c 2 such that
L ( L ,   B ,   u ) c 1 + c 2 ( | u 1 | 2 + | u 2 | 2 ) k / 2 ,   u = ( u 1 ,   u 2 ) ,
Next, by using Pontryagin’s Maximum Principle, we deduce a necessary condition for the optimal control strategy based on the following theorem:
Theorem 2.
Given an optimal control input  u * ( t ) = u 1 * ( t ) ,   u 2 * ( t )  and the corresponding state trajectory  S * ,   L * ,   B * ,   R *  of (3), there exist adjoint variables  λ 1 ,   λ 2 ,   λ 3 ,   λ 4  such that
d λ 1 d t = λ 1 β ( L + B ) + μ λ 2 β ( L + B ) ,
d λ 2 d t = 1 + λ 1 β S λ 2 β S α μ u 2 ( t ) λ 3 α λ 4 u 2 ( t ) ,
d λ 3 d t = 1 + λ 1 ( β S γ 3 ) λ 2 β S + λ 3 γ 3 + μ + u 1 ( t ) λ 4 u 1 ( t ) ,
d λ 4 d t = λ 1 σ + λ 4 ( σ + μ ) ,
with the transversal conditions
λ 1 ( T ) = 0 ,   λ 2 ( T ) = 0 ,   λ 3 ( T ) = 0 ,   λ 4 ( T ) = 0 .
Furthermore, the optimal control inputs were determined by
u 1 * ( t ) = max min λ 3 λ 4 ε B * ,   1 ,   0 , u 2 * ( t ) = max min λ 2 λ 4 τ L * ,   1 ,   0 .
Proof.
By differentiating the Hamiltonian, we obtain the following:
d λ 1 d t = H S * ( t ) ,   d λ 2 d t = H L * ( t ) ,   d λ 3 d t = H B * ( t ) ,   d λ 4 d t = H R * ( t ) .
Consequently, we can reformulate (14) into the co-state Equations (8)–(11). By deducing from the optimal conditions, we derive the control equations as follows:
H u 1 | u 1 ( t ) = u 1 * ( t ) = ε u 1 ( t ) λ 3 B + λ 4 B , H u 2 | u 2 ( t ) = u 2 * ( t ) = τ u 2 ( t ) λ 2 L + λ 4 L .
It follows from (15) and the admissible condition
U = u = ( u 1 ,   u 2 ) : 0 u i ( t ) 1 ,   t [ 0 ,   T ] ,   for   i = 1 ,   2
that
u 1 * ( t ) = max min λ 3 λ 4 ε B * ,   1 ,   0 , u 2 * ( t ) = max min λ 2 λ 4 τ L * ,   1 ,   0 .
Hence, we have successfully derived the state equations:
d S ( t ) d t = p β S ( L + B ) + γ 3 B + σ R μ S , d L ( t ) d t = β S ( L + B ) α L μ L u 2 ( t ) L , d B ( t ) d t = α L γ 3 B μ B u 1 ( t ) B , d R ( t ) d t = σ R μ R + u 1 ( t ) B + u 2 ( t ) L
and the co-state equations:
d λ 1 d t = λ 1 β ( L + B ) + μ λ 2 β ( L + B ) , d λ 2 d t = 1 + λ 1 β S λ 2 β S α μ u 2 ( t ) λ 3 α λ 4 u 2 ( t ) , d λ 3 d t = 1 + λ 1 ( β S γ 3 ) λ 2 β S + λ 3 γ 3 + μ + u 1 ( t ) λ 4 u 1 ( t ) , d λ 4 d t = λ 1 σ + λ 4 ( σ + μ ) ,
with the initial condition
S ( 0 ) = S 0 0 ,   L ( 0 ) = L 0 0 ,   B ( 0 ) = B 0 0 ,   R ( 0 ) = R 0 0 ,
and the transversal condition
λ i ( T ) = 0 ,   i = 1 ,   2 ,   3 ,   4 .

3. Numerical Example

In this section, we conduct numerical simulations to illustrate the influence of optimal control on the SLBRS model.

3.1. Algorithm

We employ an iterative algorithm based on the fourth-order Runge–Kutta method, which involves four distinct steps:
  • Step 1. Set the initial states S ( t 0 ) , L ( t 0 ) , B ( t 0 ) , R ( t 0 ) and control u 0 ( t 0 ) = u 1 ( t 0 ) ,   u 2 ( t 0 ) ;
  • Step 2. Resolve the state Equation (18) using the fourth-order forward Runge–Kutta method;
  • Step 3. Resolve the co-state Equation (19) using the fourth-order backward Runge–Kutta method;
  • Step 4. Calculate the optimal control input u * ( t ) = u 1 * ( t ) ,   u 2 * ( t ) by using Equation (17).

3.2. Simulation

We choose the following initial values:
S ( 0 ) = 0.4 ,   L ( 0 ) = 0.3 ,   B ( 0 ) = 0.2 ,   R ( 0 ) = 0.1 .
To ensure the stability of the system, we use the parameters presented in Table 1.
In the visual representation, the red curves denote the states of SLBRS with constant cure rates, while the blue curves denote the states of SLBRS with control inputs. The results of the numerical experiment reveal the following:
(1)
The asymptotic stability of SLBRS is evident as both the red and blue curves converge towards a specific equilibrium.
(2)
When controls are applied, the restoration of the contaminated network becomes evident: susceptible and recovered computers show an increased trend (Figure 5 and Figure 6), whereas latent and breaking-out computers exhibit a decreased trend (Figure 7 and Figure 8).
The optimal control strategies u 1 * ( t ) and u 2 * ( t ) vary with time: initially, when a significant number of computer viruses exist within the network, substantial efforts are dedicated to virus eradication. As the virus count diminishes, the intensity of these efforts gradually decreases (Figure 9 and Figure 10).

4. Conclusions

In this paper, we investigate the SLBRS model from the perspectives of mathematical modeling and optimal control theory. The main contributions of this study are as follows:
(1)
We improve the SLBRS model by incorporating time-varying cure rates, thereby effectively capturing the dynamics of computer networks.
(2)
We introduce an optimal control system within the SLBRS framework, with the dual objectives of minimizing network detoxification costs and reducing the number of infected computers.
(3)
By employing Pontryagin’s Maximum Principle, we establish the existence and uniqueness of an optimal control strategy for the proposed system.
(4)
We provide numerical demonstrations to highlight the practical effectiveness of our theoretical analyses.
We point out that the control strategies significantly contribute to the restoration of a contaminated network. Taking the same initial condition (22) and using the same parameters (Table 1), we compute the equilibrium points of the aforementioned control systems (1–3). The results are outlined below (Table 2).
We can conclude, based on the results in Table 2, that the nontoxic compartments S* and R* increase while the toxic compartments L* and B* decrease. This implies that our proposed measures are indeed effective in counteracting computer virus attacks.
The more control variables there are, the easier it becomes to achieve the desired control effects. Therefore, it is more challenging to study the optimal control problem associated with SLBRS with fewer control inputs. From the technical perspective, the analysis methods for the scenario with three control inputs are nearly identical to those for the scenario with two control inputs. Therefore, our research methods in this paper can be directly applied to solve the optimal control problem for SLBRS with three control inputs.

Funding

This author is supported partially by the Jiangsu Qin-Lan Project of Fostering Excellent Teaching Team, “University Mathematics Teaching Team”.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Kephart, J.O.; White, S.R. Directed-graph epidemio logical models of com puter viruses. In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 20–22 May 1991; Global Publishing: Jacksonville, FL, USA, 1991; pp. 343–359. [Google Scholar]
  2. Mishra, B.K.; Saini, D.K. SEIRS epidemic model with delay for transmission of malicious objects in computer network. Appl. Math. Comput. 2007, 188, 1476–1482. [Google Scholar] [CrossRef]
  3. Mishra, B.K.; Jha, N. SEIQRS model for the transmission of malicious objects in computer network. Appl. Math. Model. 2010, 34, 710–715. [Google Scholar] [CrossRef]
  4. Yang, L.X.; Yang, X.F.; Wen, L.S.; Liu, J.M. A novel computer virus propagation model and its dynamics. Int. J. Comput. Math. 2012, 89, 2307–2314. [Google Scholar] [CrossRef]
  5. Yang, M.; Zhang, Z.; Li, Q.; Zhang, G. An SLBRS model with vertical trans mission of computer virus over the internet. Discrete Dyn. Nat. Soc. 2012, 2012, 925648. [Google Scholar] [CrossRef]
  6. Yang, L.X.; Yang, X.F.; Zhu, Q.Y.; Wen, L.S. A computer virus model with graded cure rates. Nonlinear Anal. Real World Appl. 2013, 14, 414–422. [Google Scholar] [CrossRef]
  7. Zhang, C.M.; Huang, H.T. Optimal control strategy for a novel computer virus propagation model on scale-free networks. Phys. A Stat. Mech. Its Appl. 2016, 451, 251–265. [Google Scholar] [CrossRef]
  8. Tang, W.; Liu, Y.J.; Chen, Y.L. SLBRS: Network Virus Propagation Model based on Safety Entropy. Appl. Soft Comput. 2020, 97, 106784. [Google Scholar] [CrossRef]
  9. Yu, X.D.; Zeb, A.; Liu, G.Y. Hopf bifurcation and optimal control of a delayed SLBPS virus-patch model. Results Phys. 2022, 22, 105743. [Google Scholar] [CrossRef]
  10. Avcı, D.; Soytürk, F. Optimal control strategies for a computer network under virus threat. J. Comput. Appl. Math. 2023, 419, 114740. [Google Scholar] [CrossRef]
  11. Ravichandrana, C.; Logeswaria, K.; Khan, A.; Abdeljawad, T.; Gómez-Aguilar, J.F. An epidemiological model for computer virus with Atangana–Baleanu fractional derivative. Results Phys. 2023, 51, 106601. [Google Scholar] [CrossRef]
  12. Birkhoff, G.; Rota, G.C. Ordinary Differential Equations, 4th ed.; John Wiley & Sons: New York, NY, USA, 1989. [Google Scholar]
Figure 1. SLBRS model.
Figure 1. SLBRS model.
Mathematics 11 04036 g001
Figure 2. SLBRS with constant cure rates.
Figure 2. SLBRS with constant cure rates.
Mathematics 11 04036 g002
Figure 3. SLBRS with time-varying cure rate u 1 ( t ) .
Figure 3. SLBRS with time-varying cure rate u 1 ( t ) .
Mathematics 11 04036 g003
Figure 4. SLBRS with time-varying cure rates u 1 ( t ) and u 2 ( t ) .
Figure 4. SLBRS with time-varying cure rates u 1 ( t ) and u 2 ( t ) .
Mathematics 11 04036 g004
Figure 5. Evolution of susceptible computers.
Figure 5. Evolution of susceptible computers.
Mathematics 11 04036 g005
Figure 6. Evolution of recovered computers.
Figure 6. Evolution of recovered computers.
Mathematics 11 04036 g006
Figure 7. Evolution of latent computers.
Figure 7. Evolution of latent computers.
Mathematics 11 04036 g007
Figure 8. Evolution of breaking-out computers.
Figure 8. Evolution of breaking-out computers.
Mathematics 11 04036 g008
Figure 9. Optimal control variable u 1 * ( t ) .
Figure 9. Optimal control variable u 1 * ( t ) .
Mathematics 11 04036 g009
Figure 10. Optimal control variable u 2 * ( t ) .
Figure 10. Optimal control variable u 2 * ( t ) .
Mathematics 11 04036 g010
Table 1. Values of parameters in the numerical simulation.
Table 1. Values of parameters in the numerical simulation.
ParametersValueParametersValue
p 0.10β0.90
α 0.60 γ 1 0.15
γ 2 0.10 γ 3 0.05
σ 0.05 μ 0.10
ε 2 τ 2
Table 2. Comparison of stable values of the state variables in each model.
Table 2. Comparison of stable values of the state variables in each model.
ModelS*L*BR*
SLBRS with constant cure rates: System (1)0.300.120.250.33
SLBRS with 1 control input: System (2)0.360.110.170.36
SLBRS with 2 control inputs: System (3)0.390.100.140.37
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, X. Optimal Control Strategy for SLBRS with Two Control Inputs. Mathematics 2023, 11, 4036. https://doi.org/10.3390/math11194036

AMA Style

Zhao X. Optimal Control Strategy for SLBRS with Two Control Inputs. Mathematics. 2023; 11(19):4036. https://doi.org/10.3390/math11194036

Chicago/Turabian Style

Zhao, Xiangqing. 2023. "Optimal Control Strategy for SLBRS with Two Control Inputs" Mathematics 11, no. 19: 4036. https://doi.org/10.3390/math11194036

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop