Next Article in Journal
Power System Operation Mode Calculation Based on Improved Deep Reinforcement Learning
Next Article in Special Issue
Generalized Halanay Inequalities and Asymptotic Behavior of Nonautonomous Neural Networks with Infinite Delays
Previous Article in Journal
Global Non-Existence of a Coupled Parabolic–Hyperbolic System of Thermoelastic Type with History
Previous Article in Special Issue
Discounted Risk-Sensitive Optimal Control of Switching Diffusions: Viscosity Solution and Numerical Approximation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Control of SLBRS with Recovery Rates

1
Department of Mathematics, Suqian University, Suqian 223800, China
2
School of Marxism, Suqian University, Suqian 223800, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(1), 132; https://doi.org/10.3390/math12010132
Submission received: 17 November 2023 / Revised: 26 December 2023 / Accepted: 28 December 2023 / Published: 30 December 2023

Abstract

:
In the information age, frequent information exchange has provided a breeding ground for the spread of computer viruses. The significant losses caused by computer virus attacks have long rung the alarm for information security. From academia to businesses, and even to government, everyone remains highly vigilant about information security. Researchers have put forward various approaches to combat computer viruses, involving innovative efforts in both the hardware and software aspects, as well as theoretical innovation and practical exploration. This article is dedicated to theoretical exploration, specifically investigating the stability of a computer virus model, known as SLBRS, from the perspective of optimal control. Firstly, a control system is introduced with the aim of minimizing the costs related to network detoxification and diminishing the percentage of computers impacted by the virus. Secondly, we employ the Pontryagin maximum principle to analyze the optimality of a control strategy for the proposed system. Thirdly, we validate the effectiveness of our theoretical analysis through numerical simulation. In conclusion, both theoretical analysis and numerical simulation reveal that the utilization of optimal control analysis to stabilize the SLBRS has been demonstrated to be advantageous in restoring contaminated computer network environments.
MSC:
49J15; 93-10; 93C15

1. Introduction

In the information age, frequent information exchange has become an integral part of our daily lives, greatly facilitating the transmission of computer viruses in the cyber environment. The proliferation of network computer viruses has posed significant global information security threats, leading to substantial losses in various sectors, including finance, education, and energy.
From 1987 to 1988, F. Cohen and W. Murray discovered certain similarities between computer viruses and biological infectious diseases [1,2]. Consequently, they suggested applying the principles of infectious disease dynamics and qualitative and quantitative analysis methods to study the patterns of computer virus transmission. Unfortunately, they did not propose specific models for the spread of computer viruses at that time. It was not until 1991 that J. O. Kephart and S. R. White adopted the recommendations of F. Cohen and W. Murray [3]. Based on the similarity between computer viruses and biological viruses, they introduced the SIS (susceptible–infected–susceptible) computer virus propagation model for the first time, pioneering the application of biological virus propagation models to the field of computer viruses. Since then, extensive research has been conducted on computer viruses; a rough summary is provided in the Table 1 below.
The computer virus models described above are based on a common assumption borrowed from epidemiological virus modeling, where an infected computer that remains in latency will not infect other computers. However, in the context of computer viruses, it is a whole different story:
Difference 1: Upon infection, a computer typically gains the immediate capability to propagate the infection.
Difference 2: Computers that have recovered may develop temporary immunity.
Considering the differences between computer viruses and biological viruses (Differences 1–2), Yang and Wen [11] and Yang, Zhang, and Li [12] proposed a mathematical model with characteristics of computer viruses known as SLBRS. They categorize the computers in the system into four groups, namely, S(t), L(t), B(t), and R(t):
S(t)—susceptible computers: computers not yet infected by the virus but susceptible to being infected by latent or outbreak computers, subsequently transitioning into latent computers.
L(t)—latent computers: computers that have been infected by the virus but do not exhibit apparent destructive behavior yet retain the potential to spread the infection.
B(t)—outbreak computers: computers that are infected by the virus, exhibiting apparent destructive effects and having the potential to spread the infection.
R(t)—recovery computers: computers that have been cleared of the virus by third-party security software or firewall products, possessing temporary immunity.
For the convenience of mathematical calculations, we assume that S(t), L(t), B(t), and R(t) represent the proportions of susceptible, latent, outbreak, and recovered computers in the network, respectively. Therefore, S(t), L(t), B(t), and R(t) satisfy the following normalization condition:
S ( t ) + L ( t ) + B ( t ) + R ( t ) = 1 .
The transition relationships among the different states S(t), L(t), B(t), and R(t) are determined by the following assumptions:
Assumption 1: susceptible computers S(t) are infected with a virus at a certain rate β S ( L + B ) and transform into latent computers L(t).
Assumption 2: latent computers L(t) transition into outbreak computers B(t) at an outbreak rate α .
Assumption 3: outbreak computers B(t) are cured at an antivirus software recovery rate γ 1 and transform into recovery computers R(t).
Assumption 4: recovery computers R(t) lose immunity at a certain rate σ and transform back into susceptible computers S(t).
Assumption 5: newly added computers are all susceptible computers S(t) with an access rate p , and each state of computer has an exit rate μ .
Based on the above assumptions (Assumptions 1–5), the state transition relationships among computers in different states of SLBRS are illustrated in Figure 1:
In reality, latent computers L(t) may recover due to users’ virus prevention and control habits. Yang considered this factor in [13] and made the following additional assumption:
Assumption 6: latent computers L(t) are cured and transformed into recovery computers R(t) at a certain rate γ 2 due to third-party protective software or firewalls. Generally speaking, the possibility of clearing the virus by reinstalling the system is lower than using antivirus software, thus
γ 2 < γ 1 .
Based on these assumptions (Assumptions 1–6), the state transition relationships among computers in different states of SLBRS can be illustrated in Figure 2:
In consideration of various virus prevention and control measures that can be taken for outbreak computers B(t) in reality, the following assumption is further proposed:
Assumption 7: apart from using antivirus software, the virus can also be cleared by reinstalling the system, thereby transitioning the infected computer B(t) into a susceptible computer S(t) at a recovery rate of γ 3 . Obviously, due to the numerical advantage of outbreak computers over latent computers, the probability of latent computers transitioning to the recovered state must be lower than the probability of outbreak computers transitioning to the recovered state. Therefore, the following assumption is also reasonable:
γ 3 < γ 2 < γ 1 .
Under these assumptions (Assumptions 1–7), the state transition relationships of SLBRS are illustrated as follows:
Figure 3 can be formulated as:
d S ( t ) d t = p β S ( B + L ) + γ 3 B + σ R μ S , d L ( t ) d t = β S ( B + L ) α L γ 2 L μ L , d B ( t ) d t = α L γ 3 B μ B γ 1 B , d R ( t ) d t = γ 2 L σ R μ R + γ 1 B ,
The fact is that the severity of computer virus attacks varies over time, and protective measures should be flexible and adaptable in response. Therefore, it is more reasonable to consider that recovery rates vary with time [14]. In this paper, as an example, the authors take the recovery rate γ 1 as a continuous function of time μ 1 ( t ) , representing the frequency of running antivirus software on outbreak computers at time t. Consequently, we propose SLBRS with variable recovery rates as follows:
Figure 4 can be reformulated by:
d S ( t ) d t = p β S ( B + L ) + γ 3 B + σ R μ S , d L ( t ) d t = β S ( B + L ) α L γ 2 L μ L , d B ( t ) d t = α L γ 3 B μ B u 1 ( t ) B , d R ( t ) d t = γ 2 L σ R μ R + u 1 ( t ) B .
Following the introduction of the SLBRS model and its variations (1) and (2) in [4,5,6,7,8,9,10,11,12,13], the focus of analysis concerning them has primarily revolved around stability. This paper will delve further into studying the system’s behavior from an optimal control perspective, aiming to explore the mechanisms of computer virus transmission and prevention. The organization of the remaining sections is as follows:
In Section 2, we will utilize the Hurwitz criterion to explore the stability conditions of both non-toxic and toxic equilibria of the SLBRS (1) and prove the stability of these two types of equilibrium.
In Section 3, we will focus on establishing the fundamental theoretical results concerning the optimal control of SLBRS. This will encompass the following key aspects: the existence of an optimal control strategy, the necessary conditions for optimal control, and the uniqueness of the optimal control system.
In Section 4, we will perform simulations to offer a numerical illustration of the practical implications of the theoretical discussions.
In Section 5, we will discuss the advantages of optimal control analysis in this paper and the necessity of multi-control input analysis.
In Section 6, we will conclude the paper by summarizing the progress made in the study of SLBRS.

2. The Stability of SLBRS

Before investigating the optimal control of SLBRS, let us first conduct a brief analysis of its stability. For the sake of convenience, under the normalization condition
S ( t ) + L ( t ) + B ( t ) + R ( t ) = 1 ,
the system of Equation (1) is transformed into:
d L ( t ) d t = β ( 1 L B R ) ( L + B ) α L γ 2 L μ L , d B ( t ) d t = α L γ 1 B γ 3 B μ B , d R ( t ) d t = γ 1 B + γ 2 L σ R μ R ,

2.1. Stability of the Non-Toxic Equilibrium

According to the definition of a non-toxic equilibrium, there are no infected computers in the system. By (3), we deduced that L = 0, B = 0, and R = 0. Furthermore, utilizing the normalization condition, we obtain the non-toxic equilibrium E 0 = ( 1 ,   0 ,   0 ,   0 ) . We define the basic reproduction number as follows:
R 0 = ( α + γ 2 + μ β ) ( γ 1 + γ 3 + μ ) β α ( σ + μ ) ( α + γ 1 + γ 2 + γ 3 + σ + 3 μ β ) ( α + γ 1 + γ 2 + γ 3 + 2 μ β ) ( σ + μ ) + ( α + γ 2 + μ β ) ( γ 1 + γ 3 + μ ) β α
Theorem 1.
For system (1), when R0 < 1, the non-toxic equilibrium E0 is locally asymptotically stable; when R0 > 1, the non-toxic equilibrium E0 is unstable.
Proof of Theorem 1.
The Hurwitz criterion is as follows: If the coefficients of characteristic equation
D ( s ) = a 0 s 3 + a 1 s 2 + a 2 s + a 1 = 0 ,   a 0 > 0 .
of the Jacobian matrix of the linearized system are positive, and a 1 a 2 a 0 a 3 > 0 then the linearized system is asymptotic stable. First, we linearize (3) at E0. The Jacobian matrix of functions of the right-hand side of (3) is:
J ( E 0 ) = β 2 β L 2 β B β R α γ 2 μ β 2 β L 2 β B β R β L β B α γ 1 γ 3 μ 0 γ 2 γ 1 σ μ ( E 0 ) = β α γ 2 μ β 0 α γ 1 γ 3 μ 0 γ 2 γ 1 σ μ ,
Then, the linearized equations of (3) at E0 are as follows:
d L ( t ) d t = ( β α γ 2 μ ) L + β B , d B ( t ) d t = α L ( γ 1 + γ 3 + μ ) B , d R ( t ) d t = γ 2 L + γ 1 B ( σ + μ ) R ,
The characteristic equation of the Jacobian matrix J ( E 0 ) is:
λ β + α + γ 2 + μ β 0 α λ + γ 1 + γ 3 + μ 0 γ 2 γ 1 λ + σ + μ = 0 ,
Expressed as a polynomial, it is:
p 1 ( λ ) = a 0 λ 3 + a 1 λ 2 + a 2 λ + a 3 = 0 ,
where
a 0 = 1 ,
a 1 = α + γ 1 + γ 2 + γ 3 + σ + 3 μ β ,
a 2 = ( α + γ 1 + γ 2 + γ 3 + 2 μ β ) ( σ + μ ) + ( α + γ 2 + μ β ) ( γ 1 + γ 3 + μ ) β α ,
a 3 = ( α + γ 2 + μ β ) ( γ 1 + γ 3 + μ ) β α ( σ + μ ) .
when R 0 < 1 , we have a 1 > 0 ,   a 2 > 0 ,   a 3 > 0 and a 1 a 2 a 0 a 3 > 0 . By the Hurwitz criterion, E 0 is locally asymptotically stable.
The proof is finished. □

2.2. Stability of the Toxic Equilibrium

According to the definition of a toxic equilibrium, there exist infected computers in the system. By (3), we deduced the toxic equilibrium
E 1 = ( L * ,   B * ,   R * ) ,
where
L * = ( γ 1 + γ 3 + μ ) ( σ + μ ) ( μ S * p ) σ γ 2 ( γ 1 + γ 3 + μ ) + α [ ( σ + μ ) γ 3 + σ γ 1 ] β S * ( γ 1 + γ 3 + α + μ ) ( σ + μ ) ,
B * = α L * ( γ 1 + γ 3 + μ ) ,
R * = [ α γ 1 + ( γ 1 + γ 3 + μ ) γ 2 ] L * ( γ 1 + γ 3 + μ ) ( σ + μ ) .
Furthermore, by (1), we obtain
S * = ( γ 1 + γ 3 + μ ) ( α + γ 2 + μ ) β ( γ 1 + γ 3 + μ + α ) .
We define the basic reproduction number as follows:
R 1 = β α ( L * + B * ) L * B * ( σ + μ ) + γ 1 + γ 2 L * B * + ( σ + μ ) β ( L * + B * + S * B * L * ) + ( γ 1 + γ 3 + σ + 2 μ ) ( β ( L * + B * + S * B * L * ) + α L * B * ) ( σ + μ ) + β ( L * + B * ) ( α L * B * + γ 2 + α )
Theorem 2.
For system (1), when R1 < 1, the toxic equilibrium E1 is locally asymptotically stable; when R1 > 1, the toxic equilibrium is unstable.
Proof of Theorem 2.
First, we linearize (3) at E1. Then, the Jacobian matrix linearized system is
J ( E 0 ) = β 2 β L 2 β B β R α γ 2 μ β 2 β L 2 β B β R β L β B α γ 1 γ 3 μ 0 γ 2 γ 1 σ μ ( E 1 )
= β ( L * + B * S * ) α γ 2 μ β ( L * + B * S * ) β ( L * + B * ) α γ 1 γ 3 μ 0 γ 2 γ 1 σ μ ,
We simplify the characteristic equation λ E J = 0 to obtain
p 2 ( λ ) = a 0 λ 3 + a 1 λ 2 + a 2 λ + a 3 = 0 ,
where
a 0 = 1 ,
a 1 = β ( L * + B * + S * B * L * ) + ( γ 1 + γ 3 + σ + 2 μ ) ,
a 2 = β L * + B * + S * B * L * + α L * B * ( σ + μ ) + β ( L * + B * ) α L * B * + γ 2 + α ,
a 3 = β α ( L * + B * ) L * B * ( σ + μ ) + γ 1 + γ 2 L * B * + ( σ + μ ) .
When R 1 < 1 ,
R 1 = β α ( L * + B * ) L * B * ( σ + μ ) + γ 1 + γ 2 L * B * + ( σ + μ ) β ( L * + B * + S * B * L * ) + ( γ 1 + γ 3 + σ + 2 μ ) ( β ( L * + B * + S * B * L * ) + α L * B * ) ( σ + μ ) + β ( L * + B * ) ( α L * B * + γ 2 + α ) = a 3 a 1 a 2 < 1 ,
We have a 1 > 0 ,   a 2 > 0 ,   a 3 > 0 and a 1 a 2 a 0 a 3 > 0 . By the Hurwitz criterion, E 1 is locally asymptotically stable.
The proof is finished. □

3. Optimal Control of SLBRS

In the past, significant emphasis has been placed on mathematically modeling computer viruses and analyzing the stability of these models [3,4,5,6,7,8,9,10,11,12,13]. Comparatively, fewer studies have delved into the control strategies of computer virus models, as is evident in [14,15,16,17]. Nevertheless, these limited investigations have offered valuable insights to our understanding of restoration strategies of virus containment networks.
The focal point of this paper is to investigate the optimal control problem of SLBRS, aiming at diminishing the percentage of infected computers within a network and reducing network maintenance expenses.

3.1. The Formulation of the Optimal Control Problem

Now, let us establish an optimal control model based on SLBRS. Firstly, in Section 1, we transformed the constant recovery rate γ 1 into a time-varying function u 1 ( t ) . The state transition relationships of S(t), L(t), B(t), and R(t) are illustrated in Figure 4, and the relevant mathematical model can be found in (2). Secondly, we will select an appropriate control set. Thirdly, we will choose a suitable objective function based on the intention of control.
Let us assume T is a predefined time. We stipulate the allowable control set as follows:
U = u 1 ( t ) L 2 ( 0 ,   T ) :   0 u 1 ( t ) 1 ,   0 t T .
Our goal is to reduce the prevalence of virus-infected computers within the network while minimizing the system’s maintenance expenses. Therefore, the objective function could be formulated as follows:
J ( u 1 ) = 0 T B ( t ) + ε u 1 2 ( t ) 2 d t ,
where ε is a positive constant.
Thus, the optimal control problem can be formulated as:
min u 1 U J ( u 1 )
Subject to the differential equations in (2).
In order to facilitate subsequent analysis of the problem and corresponding to the objective function, we introduce the following Lagrangian function:
L ( B ,   u 1 ) = B ( t ) + ε u 1 2 ( t ) 2
and the following Hamiltonian function:
H ( t ) = L ( B ,   u 1 ) + λ 1 p β S ( L + B ) + γ 3 B + σ R μ S + λ 2 β S ( L + B ) α L γ 2 L μ L + λ 3 [ α L γ 3 B μ B u 1 ( t ) B ] + λ 4 γ 2 L σ R μ R + u 1 ( t ) B .

3.2. Optimal Control Results and Their Proofs

In this section, we will establish the existence of an optimal control strategy, the necessary conditions for the existence of optimal control, and the uniqueness of the optimal control system. This will serve as the foundation for numerical simulations.
Theorem 3.
An optimal control input, denoted as  u 1 * ( t ) , exists for the control system (5) with the given initial data:
S ( 0 ) = S 0 0 ,   L ( 0 ) = L 0 0 ,   B ( 0 ) = B 0 0 ,   R ( 0 ) = R 0 0 ,
such that
min u 1 U J ( u 1 ) = J ( u 1 * )
Proof of Theorem 3.
According to [18], it is sufficient to verify the following four conditions:
Condition 1.  U = u 1 ( t ) L 2 ( 0 ,   T ) :   0 u 1 ( t ) 1 ,   0 t T Φ ;
Condition 2.  U = u 1 ( t ) L 2 ( 0 ,   T ) :   0 u 1 ( t ) 1 ,   0 t T is closed and convex set;
Condition 3. The right-hand side of state equations
d S ( t ) d t = p β S ( B + L ) + γ 3 B + σ R μ S , d L ( t ) d t = β S ( B + L ) α L γ 2 L μ L , d B ( t ) d t = α L γ 3 B μ B u 1 ( t ) B , d R ( t ) d t = γ 2 L σ R μ R + u 1 ( t ) B .
are restricted by linear functions in terms of S ,   L ,   B ,   R . We need only to show the condition for the first equation (the second is similar). Indeed, by the normalization condition
S ( t ) + L ( t ) + B ( t ) + R ( t ) = 1
we have 0 B 1 . Thus,
p β S ( B + L ) + γ 3 B + σ R μ S p β ( L + B ) + γ 3 B + σ R μ S = p β L + ( γ 3 β ) B + σ R μ S .
Condition 4. The Lagrangian function L ( B ,   u 1 ) exhibits concavity over the set U, and there exists ρ > 1 , η 1 > 0 , and η 2 such that
L ( B ,   u 1 ) η 1 ( | u | ) ρ + η 2 .
The proof is completed. □
Next, through the utilization of the Pontryagin maximum principle, we will derive the essential condition for the optimal control input:
Theorem 4.
For the given optimal control input  u 1 * ( t )  and the related states  S * ,   L * ,   B * ,   R *  of state Equation (2), there exist co-states  λ 1 λ 2 λ 3 , and  λ 4  such that
d λ 1 d t = λ 1 β ( L + B ) + μ λ 2 β ( L + B ) ,
d λ 2 d t = λ 1 β S λ 2 ( β S α γ 2 μ ) λ 3 α λ 4 γ 2 ,
d λ 3 d t = 1 + λ 1 ( β S γ 3 ) λ 2 β S + λ 3 γ 3 + μ + u 1 ( t ) λ 4 u 1 ( t ) ,
d λ 4 d t = λ 1 σ + λ 4 ( σ + μ ) ,
with the transversal conditions
λ 1 ( T ) = λ 2 ( T ) = λ 3 ( T ) = λ 4 ( T ) = 0 .
The optimal control is as follows:
u 1 * ( t ) = m a x m i n λ 3 λ 4 ε B * ,   1 ,   0 .
Proof of Theorem 4.
We differentiate the Hamiltonian function (6), and we obtain the following co-state system:
d λ 1 d t = H S * ( t ) , d λ 2 d t = H L * ( t ) , d λ 3 d t = H B * ( t ) , d λ 4 d t = H R * ( t ) ,
which implies (7)–(10).
We deduce from the optimal conditions
H u 1 | u 1 ( t ) = u 1 * ( t ) = ε u 1 ( t ) λ 3 B + λ 4 B .
and the admissible condition
U = u 1 ( t ) L 2 ( 0 ,   T ) :   0 u 1 ( t ) 1 ,   0 t T
that
u 1 * ( t ) = m a x min λ 3 λ 4 ε B * ,   1 ,   0 .
By assembling the state equations of (2), co-state Equations (7)–(10), and the transversal conditions of (11), we derive the optimal system as follows:
d S ( t ) d t = p β S ( B + L ) + γ 3 B + σ R μ S , d L ( t ) d t = β S ( B + L ) α L γ 2 L μ L , d B ( t ) d t = α L γ 3 B μ B u 1 ( t ) B , d R ( t ) d t = γ 2 L σ R μ R + u 1 ( t ) B ,
and
d λ 1 d t = λ 1 β ( L + B ) + μ λ 2 β ( L + B ) , d λ 2 d t = λ 1 β S λ 2 ( β S α γ 2 μ ) λ 3 α λ 4 γ 2 , d λ 3 d t = 1 + λ 1 ( β S γ 3 ) λ 2 β S + λ 3 γ 3 + μ + u 1 ( t ) λ 4 u 1 ( t ) , d λ 4 d t = λ 1 σ + λ 4 ( σ + μ ) ,
with initial values
S 0 0 ,   L 0 0 ,   B 0 0 ,   R 0 0
and the transversal conditions
λ 1 ( T ) = λ 2 ( T ) = λ 3 ( T ) = λ 4 ( T ) = 0 .
The proof is completed. □
Finally, we show the uniqueness of the optimal system (12)–(15):
Theorem 5.
Given control time T, the solution of the optimal system (12)–(15) is unique.
Proof of Theorem 5.
Assume that both ( S ,   L ,   B ,   R ;   λ 1 ,   λ 2 ,   λ 3 ,   λ 4 ) and ( S ¯ ,   L ¯ ,   B ¯ ,   R ¯ ;     λ ¯ 1 ,   λ ¯ 2 ,   λ ¯ 3 ,   λ ¯ 4 ) are solutions of (12)–(15). Let
S = e λ t a ,   L = e λ t b ,   B = e λ t c ,   R = e λ t d ;
λ 1 = e λ t w ,   λ 2 = e λ t x ,   λ 3 = e λ t y ,   λ 4 = e λ t z
and
S ¯ = e λ t a ¯ ,   L ¯ = e λ t b ¯ ,   B ¯ = e λ t c ¯ ,   R ¯ = e λ t d ¯ ;
λ ¯ 1 = e λ t w ¯ ,   λ ¯ 2 = e λ t x ¯ , λ ¯ 3 = e λ t y ¯ ,   λ ¯ 4 = e λ t z ¯ ,
where λ is a constant that will be determined later.
From (11), we obtain
u 1 ( t ) = max min ( y z ) c ε ,   1 ,   0 ,
u ¯ 1 ( t ) = max min ( y ¯ z ¯ ) d ¯ ε ,   1 ,   0 .
From (12), we obtain
λ e λ t a + e λ t a = p β e 2 λ t a ( b + c ) + γ 3 e λ t c + σ e λ t d μ e λ t a
and
λ e λ t a ¯ + e λ t a ¯ = p β e 2 λ t a ¯ ( b ¯ + c ¯ ) + γ 3 e λ t c ¯ + σ e λ t d ¯ μ e λ t a ¯ .
From (13), we obtain
w λ w = ( w + x ) β e λ t ( b + c ) + w μ ,
and
w ¯ λ w ¯ = ( w ¯ + x ¯ ) β e λ t ( b ¯ + c ) + w ¯ μ ,
From (16) and (17), we obtain
λ ( a a ¯ ) + ( a a ¯ ) = β e λ t [ a ( b + c ) a ¯ ( b ¯ + c ¯ ) ] + γ 3 ( γ γ ¯ ) + σ ( d d ¯ ) μ ( a a ¯ ) ,
We then integrate from 0 to T, and we obtain
1 2 ( a ( T ) a ¯ ( T ) ) 2 + λ 0 T ( a a ¯ ) 2 d t    = β 0 T e λ t [ a ( b + c ) a ¯ ( b ¯ + c ¯ ) ] ( a a ¯ ) d t + γ 3 0 T ( γ γ ¯ ) ( a a ¯ ) d t + σ 0 T ( d d ¯ ) ( a a ¯ ) d t μ 0 T ( a a ¯ ) 2 d t    = β 0 T e λ t ( a ¯ b ¯ a b + a ¯ c a c ) ( a ¯ a ) d t + γ 3 0 T ( γ ¯ γ ) ( a ¯ a ) d t      + σ 0 T ( d ¯ d ) ( a ¯ a ) d t μ 0 T ( a ¯ a ) 2 d t    C 1 e λ t 0 T ( a ¯ a ) 2 + ( b ¯ b ) 2 + ( d c ) 2 d t + C 2 0 T ( a ¯ a ) 2 + ( b ¯ b ) 2 + ( c ¯ c ) 2 + ( d ¯ d ) 2      + ( w w ¯ ) 2 + ( x x ¯ ) 2 + ( y y ¯ ) 2 + ( z z ¯ ) 2 d t
where C 1 and C 2 are constants.
Similarly, we estimate the following:
1 2 ( b b ¯ ) 2 ( T ) ,   1 2 ( c c ¯ ) 2 ( T ) ,   1 2 ( d d ¯ ) 2 ( T ) .
Finally, we obtain
1 2 ( a ¯ a ) 2 ( T ) + 1 2 ( b ¯ b ) 2 ( T ) + 1 2 ( c ¯ c ) 2 ( T ) + 1 2 ( d ¯ d ) 2 ( T ) + 1 2 ( w ¯ w ) 2 ( 0 ) + 1 2 ( x ¯ x ) 2 ( 0 ) + 1 2 ( y ¯ y ) 2 ( 0 ) + 1 2 ( z z ¯ ) 2 ( 0 ) + λ 0 T ( a ¯ a ) 2 + ( b ¯ b ) 2 + ( c ¯ c ) 2 + ( d ¯ d ) 2 d t + λ 0 T ( x ¯ x ) 2 + ( y ¯ y ) 2 + ( z ¯ z ) 2 + ( w ¯ w ) 2 d t ( C 3 + C 4 3 λ t ) 0 T ( a ¯ a ) 2 + ( b ¯ b ) 2 + ( c ¯ c ) 2 + ( d ¯ d ) 2 d t + ( C 3 + C 4 3 λ t ) 0 T ( w ¯ w ) 2 + ( x ¯ x ) 2 + ( y ¯ y ) 2 + ( z ¯ z ) 2 d t .
Taking λ such that
λ > ( C 3 + C 4 e 3 λ T )
and
T < 1 3 λ ln ( λ C 3 C 4 )
then
( λ ( C 3 + C 4 e 3 λ T ) ) 0 T ( a ¯ a ) 2 + ( b ¯ b ) 2 + ( c d ¯ ) 2 + ( d ¯ d ) 2 d t + ( λ ( C 3 + C 4 e 3 λ T ) ) 0 T ( x ¯ x ) 2 + ( y ¯ y ) 2 + ( z ¯ z ) 2 + ( w ¯ w ) 2 d t 0 ,
which implies that
a = a ¯ , b = b ¯ , c = c ¯ , d = d ¯ ;
and
x = x ¯ , y = y ¯ , z = z ¯ , w = w ¯ .
Thus,
S = S ¯ , L = L ¯ , B = B ¯ , R = R ¯ ;
λ 1 = λ ¯ 1 ,   λ 2 = λ ¯ 2 ,   λ 3 = λ ¯ 3 ,   λ 4 = λ ¯ 4 .
The proof is completed. □
Remark 1.
The benefit of employing Pontryagin’s maximum principle to prove Theorem 2 is that, alongside completing the proof, it sets the stage for our subsequent numerical simulations. In fact, the state equation, co-state equation, transversality condition, and initial values generated during the proof process serve as the very foundation for our upcoming numerical simulations.

4. Numerical Simulation

In this section, we will conduct numerical simulations to examine the stability of (1) and the controllability of (2) separately. To facilitate a comparative analysis, we will use common initial values and parameter values for models (1) and (2) in the following section.
We take the initial value as follows:
S 0 = 0.4 ,   L 0 = 0.3 ,   B 0 = 0.2 ,   R 0 = 0.1 .
The parameter selection principle abides by the conditions specified in Theorems 1 and 2, ensuring that the basic reproduction number is less than 1. For detailed parameter selection, refer to Table 2.

4.1. Stability of SLBRS

Stability simulation is a relatively straightforward process. By utilizing the provided parameters and initial values, we write a simple code employing ODE45 and execute it. The outcomes of the simulation are illustrated in Figure 5 and Figure 6.
Figure 5 demonstrates that all the states S(t), L(t), B(t), and R(t) asymptotically stabilize to the non-toxic equilibrium, in line with the conclusion of Theorem 1. Similarly, from Figure 6, it is evident that all the states S(t), L(t), B(t), and R(t) asymptotically stabilize to the toxic equilibrium, consistent with the conclusion of Theorem 2.

4.2. Controllability of SLBRS

The simulation of optimal control is quite complex. On one hand, there are many equations that need to be solved (in fact, the optimal controllability simulation algorithm involves solving the state equations, co-state equations, and control input equation). On the other hand, for ensuring simulation accuracy, it is not only necessary to employ high-order differences but also to utilize a combination of forward and backward differences.
For clarity, let us briefly outline the algorithm:
Step 1. Initialization: determine the time step, set iteration termination conditions, and initialize the state, co-state, and control variables.
Step 2. Iteration Process: we solve the state equations using forward differences and the co-state equations using backward differences.
Step 2.1. State Equation Solution: use fourth-order forward Runge-Kutta difference to solve the state equation based on known control and initial value conditions.
Step 2.2. Co-state Equation Solution: employ fourth-order backward Runge-Kutta difference, solving the co-state equation backward from the final time.
Step 2.3. Control Update: update control variables based on the results of the state and co-state equations.
Step 2.4. Iterative Update: based on the updated control, repeat the solution of state and co-state equations until the termination conditions are met.
Step 3. Simulation Results: obtain the optimal control strategy, state trajectory, and other necessary numerical results.
The evolution trends of types S(t), L(t), B(t), and R(t) are presented in Figure 7, Figure 8, Figure 9 and Figure 10. The simulation results align well with the theoretical analysis results (Theorems 3–5).
Figure 7 and Figure 9 demonstrate that, under the effect of control, the proportion of uninfected computers (S(t) and R(t)) gradually increases and stabilizes. This indicates the restoration of the virus-contaminated network environment.
Figure 8 and Figure 10 reveal that, under the influence of control, the proportion of infected computers (L(t) and B(t)) gradually decreases and stabilizes. This, from another perspective, reflects the ongoing restoration of the virus-infected network environment.
The evolution of control input is as follows.
The trend of the optimal control curve is consistent with reality (see Figure 11): Initially, the computer virus attack intensity is high, and the level of protection is correspondingly strong. However, as time passes, the intensity of the attack weakens, and the level of protection decreases in parallel.
Remark 2.
We use the forward Runge-Kutta method to solve the state equations and the backward Runge-Kutta method to solve the co-state equations, and the simulation results are superior to simply using either forward or backward Runge-Kutta methods for solving them.

5. Discussion

At this point in the paper, let us address a few issues for discussion.
Firstly, is it necessary to introduce control to SLBRS?
To address this question, we directly compare the stable values of SLBRS with and without control input (Equations (1) and (2)). Utilizing the same parameters and initial states, we calculate the stable values of each state variable in (1) and (2) (see Table 3 for details).
Table 2 illustrates that toxicity-free nodes (S*, R*) increase, and toxic nodes (L*, B*) decrease. This observation strongly suggests that optimal control is beneficial for the restoration of a contaminated network.
Secondly, there are several issues regarding the selection of the optimal control input function:
(1)
What if the recovery rate ( γ 2 or γ 3 ) is used as the control input? It is similar to γ 1 , so we omit the details.
(2)
What if more than one recovery rate is utilized in the control inputs? The fact is that the more control inputs are employed, the greater the ability to control the system.
Thirdly, there are questions regarding model improvement.
The selected model in this paper does not account for time-delay factors. However, in reality, the transformation from latent to active computers and the recovery of virus-infected computers both take a certain amount of time. Therefore, in future work, consideration of time-delay factors can be introduced to establish an optimal computer virus control model with time-delay factors. This is expected to yield results that are more practically meaningful. Please refer to [15] for further details.
This paper employs optimal control theory to study the SLBRS model and has obtained research conclusions that align with expectations. Introducing current popular research directions such as stochastic control and adaptive control into the study of SLBRS would undoubtedly open up new possibilities. For more details, please refer to the latest literature [19,20,21,22,23,24].

6. Conclusions

In this paper, we have introduced the SLBRS computer virus model with triple recovery rates. Subsequently, we have investigated its stability through both linearization and optimal control. The primary findings are as follows.
Firstly, using the Hurwitz criterion, we have demonstrated the stability of both the non-toxic equilibrium point and the toxic equilibrium point. Furthermore, we have validated these findings through simulation.
Secondly, the existence and uniqueness of the optimal solution have been rigorously established and confirmed through the application of the Pontryagin maximum principle.
Thirdly, for numerical simulations, we have employed an iterative algorithm. The results of these simulations illustrate that the optimal control strategy can effectively minimize the outbreak of a virus in the network, all the while reducing network maintenance costs.

Author Contributions

Conceptualization, methodology, X.Z.; Simulation, W.H. All authors have read and agreed to the published version of the manuscript.

Funding

The authors are sponsored by the Qing-Lan Project of Jiangsu Province.

Data Availability Statement

Data are contained within the article.

Acknowledgments

Both authors would like to thank the referees for their suggestions which helped us to improve the quality of this paper greatly.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cohen, F. Computer viruses: Theory and experiments. Comput. Secur. 1987, 6, 22–35. [Google Scholar] [CrossRef]
  2. Murray, W. The application of epidemiology to computer viruses. Comput. Secur. 1988, 7, 139–150. [Google Scholar] [CrossRef]
  3. Kephart, J.O.; White, S.R. Directed-graph Epidemiological Models of Computer Viruse. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 20–22 May 1991; pp. 343–359. [Google Scholar]
  4. Tian, C.; Zheng, S.R. The study of computer virus computational models. J. Comput. Sci. 2001, 24, 158–163. (In Chinese) [Google Scholar]
  5. Chen, L.C.; Carley, K.M. The impact of countermeasure propagation on the prevalence of computer viruses. IEEE Trans. Syst. Man Cybern. Part B 2004, 34, 823–833. [Google Scholar] [CrossRef] [PubMed]
  6. Yuan, H.; Chen, G.Q. Network virus-epidemic model with the point-to-group information propagation. Appl. Math. Comput. 2008, 206, 357–367. [Google Scholar] [CrossRef]
  7. Mishra, B.K.; Saini, D.K. SEIRS epidemic model with delay for transmission of malicious objects in computer network. Appl. Math. Comput. 2007, 1881476, 1482. [Google Scholar] [CrossRef]
  8. Piqueira, J.R.C.; de Vasconcelos, A.A. Dynamic models for computers viruses. Comput. Secur. 2008, 27, 355–359. [Google Scholar] [CrossRef]
  9. Piqueira, J.R.C.; Araujo, V.O. A modified epidemiological model for computer viruses. Appl. Math. Comput. 2009, 213, 55–360. [Google Scholar] [CrossRef]
  10. Mishra, B.K.; Jha, N. SEIQRS model for the transmission of malicious objects in computer network. Appl. Math. Model. 2010, 34, 710–715. [Google Scholar] [CrossRef]
  11. Yang, L.X.; Yang, X.F.; Wen, L.S. A novel computer virus propagation model and its dynamics. Int. J. Comput. Math. 2012, 89, 2307–2314. [Google Scholar] [CrossRef]
  12. Yang, M.; Yang, X.; Yang, L.-X.; Zhu, Q. A model of computer virus with recovery compartment. J. Inf. Comput. Sci. 2012, 18, 359–378. [Google Scholar]
  13. Yang, L.X.; Yang, X.F.; Zhu, Q.Y.; Wen, L.S. A computer virus model with graded recovery rates. Nonlinear Anal. Real World Appl. 2013, 14, 414–422. [Google Scholar] [CrossRef]
  14. Zhao, X.Q. Optimal Control of SLBRS with Two Control Inputs. Mathematics 2023, 11, 4036. [Google Scholar] [CrossRef]
  15. Chen, L.; Hattaf, K.; Sun, J. Optimal control of a delayed SLBS computer virus model. Phys. A. Stat. Mech. Its Appl. 2015, 42, 244–250. [Google Scholar] [CrossRef]
  16. Zhang, C.M.; Huang, H.T. Optimal control strategy for a novel computer virus propagation model on scale-free networks. Phys. A. Stat. Mech. Its Appl. 2016, 451, 251–265. [Google Scholar] [CrossRef]
  17. Avcı, D.; Soytürk, F. Optimal control strategies for a computer network under virus threat. J. Comput. Appl. Math. 2023, 419, 114740. [Google Scholar] [CrossRef]
  18. Birkhoff, G.; Rota, G.C. Ordinary Differential Equations, 4th ed.; John Wiley & Sons: New York, NY, USA, 1989. [Google Scholar]
  19. Yang, X.; Wang, H.; Zhu, Q. Event-triggered predictive control of nonlinear stochastic systems with output delay. Automatica 2022, 140, 110230. [Google Scholar] [CrossRef]
  20. Xue, Y.; Han, J.; Tu, Z.; Chen, X. Stability analysis and design of cooperative control for linear delta operator system. AIMS Math. 2023, 8, 12671–12693. [Google Scholar] [CrossRef]
  21. Tang, Y.; Zhou, L.; Tang, J.; Rao, Y.; Fan, H.; Zhu, J. Hybrid impulsive pinning control for mean square synchronization of uncertain multi-link complex networks with stochastic characteristics and hybrid delays. Mathematics 2023, 11, 1697. [Google Scholar] [CrossRef]
  22. Xiao, H.; Li, Z.; Lin, H.; Zhao, Y. A dual rumor spreading model with consideration of fans versus ordinary people. Mathematics 2023, 11, 2958. [Google Scholar] [CrossRef]
  23. Fan, L.N.; Zhu, Q.X.; Zheng, W.X. Stability analysis of switched stochastic nonlinear systems with state-dependent delay. IEEE Trans. Autom. Control. 2023. [Google Scholar] [CrossRef]
  24. Xu, H.F.; Zhu, Q.X.; Zheng, W.X. Exponential stability of stochastic nonlinear delay systems subject to multiple periodic impulses. IEEE Trans. Autom. Control. 2023. [Google Scholar] [CrossRef]
Figure 1. State transition diagram of SLBRS.
Figure 1. State transition diagram of SLBRS.
Mathematics 12 00132 g001
Figure 2. State transition diagram of SLBRS with graded recovery rates.
Figure 2. State transition diagram of SLBRS with graded recovery rates.
Mathematics 12 00132 g002
Figure 3. State transition diagram of SLBRS with constant recovery rates.
Figure 3. State transition diagram of SLBRS with constant recovery rates.
Mathematics 12 00132 g003
Figure 4. State transition diagram of SLBRS with time-variable recovery rate.
Figure 4. State transition diagram of SLBRS with time-variable recovery rate.
Mathematics 12 00132 g004
Figure 5. Stability of non-toxic equilibrium.
Figure 5. Stability of non-toxic equilibrium.
Mathematics 12 00132 g005
Figure 6. Stability of toxic equilibrium.
Figure 6. Stability of toxic equilibrium.
Mathematics 12 00132 g006
Figure 7. Evolution of susceptible computer S(t).
Figure 7. Evolution of susceptible computer S(t).
Mathematics 12 00132 g007
Figure 8. Evolution of outbreak computer B(t).
Figure 8. Evolution of outbreak computer B(t).
Mathematics 12 00132 g008
Figure 9. Evolution of latent computer L(t).
Figure 9. Evolution of latent computer L(t).
Mathematics 12 00132 g009
Figure 10. Evolution of recovered computer R(t).
Figure 10. Evolution of recovered computer R(t).
Mathematics 12 00132 g010
Figure 11. Optimal control function u 1 * ( t ) .
Figure 11. Optimal control function u 1 * ( t ) .
Mathematics 12 00132 g011
Table 1. Early computer virus transmission models.
Table 1. Early computer virus transmission models.
ModelYearAuthorsCharacterReference
SIS1991Kephart, WhiteSusceptible, infected computers involved[3]
SIR2001Tian, ZhengComputers with permanent immunity[4]
SIRS2004Chen, CarleyComputers with temporary immunity[5]
SEIR2006Yuan, ChenComputers in a dormant state[6]
SEIRS2007Mishra, SainiComputers with temporary immunity or in dormant state[7]
SAIC2008Piqueira, VasconcelosThe infected computers exhibit logarithmic growth[8]
SAIR2009Piqueira, AraujoCoexistence of multiple viruses[9]
SEIQRS2010Mishra, JhaInfected computers are isolated[10]
Table 2. Values of parameters.
Table 2. Values of parameters.
ParametersValuesParametersValues
p 0.10 ε 2.00
α 0.60β0.90
γ 2 0.10 γ 1 0.15
σ 0.05 γ 3 0.05
μ 0.10
Table 3. The comparison of Equations (1) and (2).
Table 3. The comparison of Equations (1) and (2).
ModelS*L*B*
Equation (1)0.300.120.25
Equation (2)0.360.110.17
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, X.; Hou, W. Optimal Control of SLBRS with Recovery Rates. Mathematics 2024, 12, 132. https://doi.org/10.3390/math12010132

AMA Style

Zhao X, Hou W. Optimal Control of SLBRS with Recovery Rates. Mathematics. 2024; 12(1):132. https://doi.org/10.3390/math12010132

Chicago/Turabian Style

Zhao, Xiangqing, and Wanmei Hou. 2024. "Optimal Control of SLBRS with Recovery Rates" Mathematics 12, no. 1: 132. https://doi.org/10.3390/math12010132

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop