Next Article in Journal
Vibration of the Biomass Boiler Tube Excited with Impact of the Cleaning Device
Next Article in Special Issue
Secret Sharing, Zero Sum Sets, and Hamming Codes
Previous Article in Journal
Two-Agent Preemptive Pareto-Scheduling to Minimize Late Work and Other Criteria
Previous Article in Special Issue
Lanchester Models for Irregular Warfare
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Optimal Control of a Malware Propagation Model

by
Jose Diamantino Hernández Guillén
1,
Ángel Martín del Rey
2,* and
Roberto Casado Vara
3
1
Department of Applied Mathematics, University of Salamanca, 37008 Salamanca, Spain
2
Department of Applied Mathematics, Institute of Fundamental Physics and Mathematics, University of Salamanca, 37008 Salamanca, Spain
3
BISITE Research Group, University of Salamanca, 37008 Salamanca, Spain
*
Author to whom correspondence should be addressed.
Mathematics 2020, 8(9), 1518; https://doi.org/10.3390/math8091518
Submission received: 24 July 2020 / Revised: 31 August 2020 / Accepted: 2 September 2020 / Published: 5 September 2020

Abstract

:
An important way considered to control malware epidemic processes is to take into account security measures that are associated to the systems of ordinary differential equations that governs the dynamics of such systems. We can observe two types of control measures: the analysis of the basic reproductive number and the study of control measure functions. The first one is taken at the beginning of the epidemic process and, therefore, we can consider this to be a prevention measure. The second one is taken during the epidemic process. In this work, we use the theory of optimal control that is associated to systems of ordinary equations in order to find a new function to control malware epidemic through time. Specifically, this approach is evaluate on a particular compartmental malware model that considers carrier devices.

1. Introduction

Nowadays, malware is one of the most important threats to security of information. The study and analysis of mathematical models to simulate malware propagation is an important task. In this sense, several mathematical models to study malware propagation have appeared in the scientific literature (see, for example, [1,2,3,4,5,6,7,8,9,10,11]). These are compartmental models that, in most cases, are based in differential ordinary equations (as a consequence, they are deterministic and global models). Usually, each model exhibits two equilibrium points: a disease free-equilibrium point and an epidemic equilibrium point. The qualitative study of the systems shows that the basic reproductive number R 0 plays a fundamental role in the analysis of the convergence of the system to one of these equilibrium points. Therefore, by analyzing the R 0 , one could consider control measures at the beginning of the malware epidemic outbreak in order to determinate the evolution of the solutions and the final equilibrium reached. On the other hand, using control theory, we can find a suitable function to control the epidemic process. This function is part of the system and we can observe its influence through time (that is, we are able to control the epidemic during the time t).
The theory of the optimal control is a classical theory [12,13] that has several applications in Economy, Epidemiology, etc. [14]. This theory allows for one to obtain the solutions of a system of ordinary differential equations under some conditions by finding the minimum cost of some parameters and variables that are controlled. Therefore less control measures can be used considering this method. This problem is tackled by means of the maximum Pontryagin Principle. In this principle, several hypothesis and formulations are introduced with the aim to calculate a function to simulate these control measures. Moreover, it is possible to define the equations of the new control model taking this optimal function into account.
This approach is also used when malware propagation models are studied. Usually, compartmental models are proposed and analyzed; that is, the devices are classified into different compartments depending on their status with respect to malware -susceptible S, infectious I, exposed E, recovered R, etc. The dynamics between different compartments are ruled by means of epidemiological coefficients and, in this sense, several types of models can be proposed while taking into account the evolution of such compartments: SIR (Susceptible-Infectious-Recovered), etc. For example, in [15], a vaccination strategy to determine the optimal control is presented. In [8], two types of compartments are considered to construct the functional objective: the latent devices and breaking out devices. In [5] an analysis in order to minimize the infectious and dead devices through a optimal control is introduced. In [9], it is used the infectious devices and a delitescent strategy to remove the malware. In [1,4,6,7,10,13], the optimal control is calculated based on a S I R model. In [11], the theory of control is used in a S I 1 I 2 R model. In [3], it is presented the optimal control of a S A I model. In [2], it is studied a control strategy of a S S ˜ I I ˜ R R ˜ D model.
Furthermore, there exists several malware environments where this theory is used: in [1], this theory is used to simulate malware in mobile ad hoc networks. In [2,5,6], it is used to simulate malware propagation in wireless sensor networks. In [3], it is presented a model taking into account an alert system. In [8], it is considered scale-free networks. In [10], it presented a information network to simulate malware.
In [16], a compartmental S C I R S model for malware propagation was proposed and analyzed from a qualitative perspective. Furthermore, some control measures based in the analysis of the basic reproductive number were proposed. In this article, we focus on the use of control measures that are developed over the time t. We use the theory of optimal control to do this work in this article. This control measure is different in this occasion due to it affects the system over all time t. This permits to have a new control tool to combat malware epidemics and improve the security of computers.
In Section 2, the model compartmental model is reviewed. In Section 3, the basis of the control functions is shown. The optimization problem and its analysis are presented in Section 4. Section 5 is devoted to illustrate the theory with some simulations. Finally, Section 6 presents the conclusions.

2. Relations between the Equations to Prevention and the Equations to Control

2.1. Autonomous Model for Malware Propagation

In this section, we review the deterministic and global mathematical model that simulates malware propagation using carrier compartment presented in [16]. This model consider four compartments: susceptible devices S ( t ) , carrier devices C ( t ) , infectious devices I ( t ) , and recovered devices, R ( t ) . Constant population is considered: S ( t ) + I ( t ) + C ( t ) + R ( t ) = N > 0 , with t > 0 . Carrier are those devices that can be infected by malware, but the malicious code is not able to perform its payload due to some reasons—for example, the device is not running on the targeted OS—although they can serve as transmission vectors.
In this model, it is supposed that carrier and infectious devices can both infect susceptible devices by malware at rate a. The fraction of vulnerable susceptible devices endowed with the targeted operative systems that the malware can infect is given by δ and they become infected. Because of security countermeasures, susceptible devices can be temporally immunized at vaccination rate v. Carriers and infectious devices can recover due to the security measures: the rates b C and b I represent these rates, respectively. Recovered devices can lose their temporal immunity at rate ϵ (in Table 1 these coefficients are illustrated). As a consequence, the dynamic of the epidemic model is governed by the following system of ordinary differential equations:
S ˙ ( t ) = a S ( t ) I ( t ) + C ( t ) v S ( t ) + ϵ R ( t ) , C ˙ ( t ) = a ( 1 δ ) S ( t ) I ( t ) + C ( t ) b C C ( t ) , I ˙ ( t ) = a δ S ( t ) I ( t ) + C ( t ) b I I ( t ) , R ˙ ( t ) = v S ( t ) + b C C ( t ) + b I I ( t ) ϵ R ( t ) ,
Figure 1 shows the compartmental transition diagram of the dynamic model.
As S ( t ) + I ( t ) + C ( t ) + R ( t ) = N , we can simplify the system of ordinary differential equations, as follows:
S ˙ ( t ) = a S ( t ) I ( t ) + C ( t ) v S ( t ) + ϵ ( N S ( t ) C ( t ) I ( t ) , C ˙ ( t ) = a ( 1 δ ) S ( t ) I ( t ) + C ( t ) b C C ( t ) , I ˙ ( t ) = a δ S ( t ) I ( t ) + C ( t ) b I I ( t ) ,
where the feasible region is Ω = { S , C , I R 3 + : 0 S + C + I N } , with x ( t ) = S ( t ) , C ( t ) , I ( t ) .
This model has two equilibrium points: the disease free equilibrium point P 0 and the epidemic equilibrium point P :
P 0 = ϵ N v + ϵ , 0 , 0 ,
P = b C b I Z , b I ( 1 δ ) D Z Y , b C δ D Z Y ,
where:
Z = a b I + a b C δ a b I δ ,
Y = b I ( 1 δ ) ϵ + b C ( b I + δ ϵ ) ,
D = a b I N ( 1 δ ) ϵ + b C ( a N δ ϵ b I ( b I + ϵ ) ) .
The system converges to a equilibrium point, depending on the basic reproductive number:
R 0 = a N ( b I + b C δ b I δ ) ϵ b C b I ( v + ϵ ) .
as is stated in the following [16]:
Theorem 1.
The following results holds:
1. 
The solutions of the system of equations exists and are unique in Ω.
2. 
There exits a disease-free equilibrium P 0 , which is global asymtotically stable for R 0 1 .
3. 
The disease-free equilibrium P 0 is unstable for R 0 > 0 .
4. 
There exits an epidemic equilibrium P , which is locally asymptotically stable for R 0 > 1 .
5. 
The epidemic equilibrium P is globally asymptotically stable for R 0 > 1 , initiating in Ω under the following two conditions:
v a ( 1 δ ) c 2 N 2 a c + a δ N v + ϵ ( δ + 2 ) + ϵ < 0 ,
b I a ( 1 δ ) c 2 N + a δ N ϵ v + ϵ + a ( 2 N 4 c ) max { ( 1 δ ) , δ } < 0 .
where c is the constant of persistence.

2.2. Variables of the Control Model

We have to difference two types of variables in our optimization problem: state variables and control variables. The state variables are those that represent the general situation of the phenomenon that we want to study; in our case, they correspond with the variables of the distinct compartments of malware. We refer to these variables using the following notation:
  • State variables: x 1 ( t ) , x 2 ( t ) , , x n ( t ) R . These describe the situation of each variable through time t.
  • State vectors: x ( t ) = x 1 ( t ) , x 2 ( t ) , , x n ( t ) R n which describes the general situation of the system.
The control variables are those variables that we can control:
  • Control variables: u 1 ( t ) , u 2 ( t ) , , u m ( t ) . These variables control the the system of ordinary differential equations along the time t.
  • Control vectors: u ( t ) = u 1 ( t ) , u 2 ( t ) , , u m ( t ) R m . These describe the situation of control in general.
In our case, there exist three types of devices while taking into account their epidemiological status: S-susceptibles-, C-carriers-, and I-infected-. Therefore, n = 4 with x 1 ( t ) = S ( t ) , x 2 ( t ) = C ( t ) , x 3 ( t ) = I ( t ) , and m = 1 with u 1 ( t ) = u . Moreover, we consider that the state and control variables are defined in some feasible regions M R n y U R m , respectively. In fact, in the next section, we will consider both the recovery rate b I and the vaccination coefficient v as control variables.
However, the system totally changes its structure due to the consideration of new control variables. In this case, we consider u as a function u ( t ) . Subsequently, the equations that describe the system are detonated by movement equations:
x ˙ ( t ) = f ( x ( t ) ) x ˙ ( t ) = f ( x ( t ) , u ( t ) , t ) .
where x ( t ) = S ( t ) , C ( t ) , I ( t ) . This new situation leads to a different system because of variables of control. Moreover, the measures that we can obtain allows for controlling the evolution of the system through time. Moreover, we consider the region of control, as follows:
U = { u k   measurable , 0 < u <   with   t [ 0 , T ] } .

3. Strategy of Control

The methods employed to apply the control theory are similar in several papers. The main difference is based on the definition of the functional objective that uses the control strategy to eliminate the malware. We can distinguish two types of expressions: the compartments and parameters we can control. In this work, we have considered the infectious devices in the functional objective, since we want to maintain the number of devices as low as possible. Some works have also considered the infectious devices in this function (see, for example, [9,15]). However, other deal with more than one type of compartment to define this function (see, for example, [3,8,11]). Moreover we will consider two independent strategies of control, recovery strategy and vaccination strategy, to make a comparison between these. Other works take into account the vaccination strategy [15] or several parameters together [3,8,11], where the recovery coefficient is also used among others. These parameters are part of this function, since our purpose is to take the smallest number of measures against the epidemic to remove it.
In this new problem, we can find a new objective that is different to the control measure based on considering the basic reproductive number under a numerical threshold that usually is R 0 1 , which depends on taking measures of prevention and control. This objective is used to control the evolution of the system in each step of the time by the control variables. Subsequently, we can consider an objective in each instant of time t. We use the Lagrangian function L to define that objective:
L : M × U × R R
x ( t ) , u ( t ) , t L x ( t ) , u ( t ) , t
These functions determinate the best form of obtained the final objective. Moreover, we define an intertemporal objective by the integral of L in the interval [ t 0 , T ] , obtaining the functional objective J ( t ) . Therefore, J ( t ) represents the cost of taking control measures through time. The minimization of the functional J is used to optimize the problem and it is denoted by V:
J ( u ) = t 0 T L ( x ( s ) , u ( s ) , s ) d s ,
V = min u { J ( u ) } .
The objective is to optimize the control measures and, in this sense, we can consider the equations of movement as a restriction. This restriction shows the influence of the state variables and supposes a price to our problem. The Hamiltonian represents this idea:
H : M × U × R × R + × R n R
x , u , t , λ 0 , λ λ 0 L x ( t ) , u ( t ) , t + λ ( t ) f x ( t ) , u ( t ) , t
where λ 0 R + and λ : [ t 0 , T ] R n . In this way, λ ( t ) is denoted as the multipliers vector, and this marks the price of the restriction of the movements equations.
In our case, we consider two strategies to remove the malware:
  • Recovery strategy: u = b I .
  • Vaccination strategy: u = v .
In both cases, the Lagrangian function has the same form:
L = I + α u 2 ( t ) 2 .
The associated functional objective J ( u ) = t 0 T I + α u 2 ( t ) 2 is interpreted, as follows (see [15]):
  • Keep the number of infect devices as low as possible to reduce the epidemic outbreak.
  • Use the control measures as low as possible.
Moreover, we can consider the following Hamiltonian in each strategy:
  • Vaccination strategy:
    H 1 = I ( t ) + α u 2 ( t ) 2 + λ 1 [ a S ( t ) I ( t ) + C ( t ) u S ( t ) + ε N S ( t ) C ( t ) I ( t ) ] + λ 2 [ a ( 1 δ ) S ( t ) I ( t ) + C ( t ) b C C ( t ) ] + λ 3 [ a δ S ( t ) I ( t ) + C ( t ) b I I ( t ) ]
  • Recovery strategy:
    H 2 = I ( t ) + α u 2 ( t ) 2 + λ 4 [ a S ( t ) I ( t ) + C ( t ) v S ( t ) + ε N S ( t ) C ( t ) I ( t ) ] + λ 5 [ a ( 1 δ ) S ( t ) I ( t ) + C ( t ) b C C ( t ) ] + λ 6 [ a δ S ( t ) I ( t ) + C ( t ) u I ( t ) ]
where λ 1 , λ 2 , λ 3 , λ 4 , λ 5 , and λ 6 are the adjoins functions.

4. Optimization Problem

In this section we introduce the optimization problem P which considers the following conditions:
  • Some border conditions: x ( t 0 ) = x 0 and N.
  • A restriction: x ˙ ( t ) = f ( x ( t ) , u ( t ) , t ) with t [ t 0 , T ] .
  • A function to optimize: V.
A solution of this problem has an optimal control u ( t ) and an optimum trajectory x * ( t ) . When we find the optimal control, there exists an unique optimum trajectory. The existence of such solution is given by the following result:
Theorem 2.
A solution of the problem P exists if the following statements hold:
1. 
The set of controls and their state variables exist.
2. 
The admissible control set is closed and convex.
3. 
Every right hand side of the ordinary differential equations is continuous and bounded above by a sum of the bounded control and state. Moreover, this has to be written as a linear function of u with time and state coefficients.
4. 
The Lagrangian function is concave.
5. 
There exists a constant > 1 and two positive numbers 1 y 2 , such that:
L I ( t ) , u ( t ) 1 + 2 ( | u ( t ) | ) / 2 .
Proof. 
It’s easy to check that a set of controls and state variables exists. Moreover, the solutions are bounded, which implies that the admissible control set is closed and convex. Assume f ( x , u , t ) = A X + F ( X ) , where:
X = ( S , C , I ) ,
A = v ϵ ϵ ϵ 0 b C 0 0 0 b I ,
F ( X ) = a S ( I + C ) + ϵ N a ( 1 δ ) S ( I + C ) a δ S ( I + C ) .
Subsequently, if we consider x 1 = ( S 1 , C 1 , I 1 ) and x 2 = ( S 2 , C 2 , I 2 ) , the following is satisfied:
| F ( x 1 ) F ( x 2 ) | q ( | S 1 S 2 | + | I 1 I 2 | + | C 1 C 2 | ) ,
where q R is a constant. Thus:
| f ( x 1 , u , t ) f ( x 2 , u , t ) | P | x 1 x 2 |
where P = max { | | A | | , q } < . This is satisfied in both strategies, u = b I and u = v .
If we consider the constant p ( 0 , 1 ) and the functions r ( t ) , s ( t ) U , we have:
L t , z ( t ) , ( 1 p ) r ( t ) + p s ( t ) ( 1 p ) L ( t , z ( t ) , r ( t ) ) p L ( t , z ( t ) , s ( t ) = 1 2 ( 1 p ) 2 r 2 ( t ) + p 2 s 2 ( t ) + 2 p ( 1 p ) r ( t ) s ( t ) 1 2 r 2 ( t ) 1 2 s 2 ( t ) = 1 2 ( p 2 p ) ( r ( t ) s ( t ) ) 2 < 0
As a consequence, the Lagrangian is concave. Furthermore, the following holds:
I ( t ) + α u 2 ( t ) 2 1 + 2 ( | u | ) / 2 ,
considering = 4 and 1 and 2 small enough. Thus, a solution of our problem exists. □
Taking into account the maximum Pontryagin Principle (see [12]), we have a solution of the system with some conditions. These solutions verify the following:
λ 1 ˙ = H 1 S ,
λ 2 ˙ = H 1 I ,
λ 3 ˙ = H 1 C ,
λ 4 ˙ = H 2 S ,
λ 5 ˙ = H 2 I ,
λ 6 ˙ = H 2 C ,
where
(1)
Vaccination strategy:
λ 1 ˙ = λ 1 a ( I + C ) + λ 1 u + λ 1 ϵ λ 2 ( a ( 1 δ ) ( I + C ) ) λ 3 ( a δ ( I + C ) ) , λ 2 ˙ = λ 1 a S + λ 1 ϵ λ 2 ( a ( 1 δ ) S b C ) λ 3 ( a δ S ) , λ 3 ˙ = 1 + λ 1 ( a S + ϵ ) λ 2 ( a ( 1 δ ) S ) λ 3 ( a δ S b I ) ,
(2)
Recovery strategy:
λ 4 ˙ = λ 4 a ( I + C ) + λ 4 v + λ 4 ϵ λ 5 ( a ( 1 δ ) ( I + C ) ) λ 6 ( a δ ( I + C ) ) , λ 5 ˙ = λ 4 a S + λ 4 ϵ λ 5 ( a ( 1 δ ) S b C ) λ 6 ( a δ S ) , λ 6 ˙ = 1 + λ 4 ( a S + ϵ ) λ 5 ( a ( 1 δ ) S ) λ 6 ( a δ S u ) .
Moreover, if we consider the minimum condition of the Pontryagin Maximum Principle, we have:
  • Vaccination strategy:
    H 1 u = α u λ 1 S = 0 .
  • Recovery strategy:
    H 2 u = α u λ 6 I = 0 .
Subsequently,
  • Vaccination strategy:
    u 1 * ( t ) = 0 if λ 1 S α 0 , 0 u * ( t ) Δ if 0 < λ 1 S α < Δ , u 2 * ( t ) = Δ if λ 1 S α Δ .
  • Recovery strategy:
    u 1 * ( t ) = 0 if λ 6 I α 0 , 0 u * ( t ) Δ if 0 < λ 6 I α < Δ , u 2 * ( t ) = Δ if λ 6 I α Δ .
We can reformulate this, as follows:
  • Vaccination strategy:
    u 1 * ( t ) = min { max { λ 1 S α , 0 } , Δ } .
  • Recovery strategy:
    u 2 * ( t ) = min { max } λ 6 I α , 0 { , Δ } .
Afterwards, we obtain the following optimal systems:
  • Vaccination strategy:
    S ˙ * = a S ( I + C ) min { max { λ 1 S α , 0 } , Δ } S + ε ( N S C I ) , C ˙ * = a ( 1 δ ) S ( I + C ) b C C , I ˙ * = a δ S ( I + C ) b I I .
  • Recovery strategy:
    S ˙ * = a S ( I + C ) v S + ε ( N S C I ) , C ˙ * = a ( 1 δ ) S ( I + C ) b C C , I ˙ * = a δ S ( I + C ) min { max { λ 6 I α , 0 } , Δ } I .

5. Representations of the Models

In this section, we analyze some simulations with our control measures, when considering the derivatives of the adjoin functions and the movement equations as an unique system ordinary differential equations with the optimal control. Moreover, the following numerical values of the parameters are considered: T = 50 , Δ = 0.2 , α = 100 , a = 0.0002 , ϵ = 0.004 , δ = 0.9 , v = 0.1 , b I = 0.03 , b C = 0.004 , S ( 0 ) = 1000 , I ( 0 ) = 1 , C ( 0 ) = 0 and N = 1001 . The solutions of the system are shown in Figure 2, Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10. The simulations have been obtained using the computer algebra system Mathematica and, specifically, the function NDSolve used to solve in a numerical way the systems of ordinary differential equations.
In Figure 2, Figure 3 and Figure 4, we can observe the evolution of the susceptible devices. The number of susceptible devices S decreases through time with the exception of the vaccination strategy, where the susceptible devices increase in the end. The evolution of S when considering optimal control strategies is very similar to those without control strategies.
Figure 5, Figure 6 and Figure 7 show the evolution of carrier devices. When recovery strategies are considered, the graphic first increases and then decreases. However, in the case of considering vaccination strategies and no optimal control measures, the carrier devices increase a bit less than 0.5 .
Finally, in Figure 8, Figure 9 and Figure 10, the evolution of infectious devices is shown. In both cases, with vaccination strategy and without control measures, the infectious devices increase first and then decrease. Nevertheless the infectious devices only decrease with recovery strategy. The increase is fewer than three devices. Therefore both strategies are efficient to remove the malware.
On the other hand, the evolution of the optimal control is illustrated in Figure 11 and Figure 12. We can observe how the function is constant and then it decreases considering both control strategies. This permits consider less recovery and vaccination rates through time and eliminate the epidemic. Therefore, the measures to control the epidemic are high at the beginning and we can then consider lower measures. This can help to save control measures to eliminate the epidemic without consider the same value during all the epidemic for b C or v, like taking into account prevention measures.
To sum up, both of the strategies are efficient in this example. However, the propagation of the adjoins functions is different in both models, as it is shown in Figure 13, Figure 14, Figure 15, Figure 16, Figure 17 and Figure 18. This indicates that the cost of the state variables is different in both control strategies. Moreover the adjoin functions satisfy the final condition λ i ( T ) = 0 for all i = 1 , 2 , , 6 , as illustrated in Figure 13, Figure 14, Figure 15, Figure 16, Figure 17 and Figure 18.

6. Conclusions

In this work, a control analysis of a model (that considers carrier devices) to simulate malware spreading is done. This permits to control the measures of recovery and vaccination; that is, we have obtained a control function that help us to decrease the number of infectious with the minimum control measures of recovery and vaccination strategies.
Note that, in this model, all of the epidemiological parameters are constant during the whole evolution. However, during the epidemic, we can apply different measures to modify some of them, while considering the control of some of this parameters. Therefore, we do not need to maintain high prevention measures in order to eliminate the malware outbreak, but we might only apply high levels at the beginning of the epidemic process. However, this kind of models are not autonomous and are more difficult to trait.
Taking into account the simulations, we can observe the behavior of the evolution of the system and the control function. Additionally, we have obtained very similar control measures with both strategies (vaccination strategy and recovery strategy). Therefore, both strategies seem to be efficient.

Author Contributions

J.D.H.G. and Á.M.d.R. conceived and designed the study, J.D.H.G. and R.C.V. performed the computational implementations, the paper has been written, edited and revised by all authors. These authors contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Funding

This research has been partially supported by Ministerio de Ciencia, Innovación y Universidades (MCIU, Spain), Agencia Estatal de Investigación (AEI, Spain), and Fondo Europeo de Desarrollo Regional (FEDER, UE) under project with reference TIN2017-84844-C2-2-R (MAGERAN) and the project with reference SA054G18 (MASEDECID) supported by Consejería de Educación (Junta de Castilla y León, Spain). J.D. Hernández Guillén is supported by University of Salamanca (Spain) and Banco Santander under a doctoral grant.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, P.; Chen, K. Optimal control of epidemic information dissemination in mobile ad hoc networks. In Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM, Houston, TX, USA, 5–9 December 2011; pp. 1–5. [Google Scholar]
  2. Shen, S.; Li, H.; Han, R.; Vasilakos, A.V.; Wang, Y.; Cao, Q. Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1962–1973. [Google Scholar] [CrossRef]
  3. Zhang, T.; Yang, L.X.; Yang, X.; Wu, Y.; Tang, Y.Y. Dynamic malware containment under an epidemic model with alert. Phys. A Stat. Mech. Its Appl. 2017, 470, 249–260. [Google Scholar] [CrossRef]
  4. Karnik, A.; Dayama, P. Optimal control of information epidemics. In Proceedings of the 2012 IEEE Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), Bangalore, India, 3–7 January 2012; pp. 1–7. [Google Scholar]
  5. Khouzani, M.H.R.; Sarkar, S.; Altman, E. Maximum damage malware attack in mobile wireless networks. IEEE/ACM Trans. Netw. 2012, 20, 1347–1360. [Google Scholar] [CrossRef] [Green Version]
  6. Khouzani, M.H.R.; Altman, E.; Sarkar, S. Optimal quarantining of wireless malware through reception gain control. IEEE Trans. Autom. Control. 2011, 57, 49–61. [Google Scholar] [CrossRef] [Green Version]
  7. Chen, P.; Cheng, S.; Chen, K. Optimal control of epidemic information dissemination over networks. IEEE Trans. Cybern. 2014, 44, 2316–2328. [Google Scholar] [CrossRef]
  8. Zhang, C.; Huang, H. Optimal control strategy for a novel computer virus propagation model on scale-free networks. Phys. A Stat. Mech. Its Appl. 2016, 451, 251–265. [Google Scholar] [CrossRef]
  9. Liu, W.; Zhong, S. Web malware spread modelling and optimal control strategies. Sci. Rep. 2017, 7, 42308. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Zhu, L.; Zhao, H. Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 2015, 149, 1370–1386. [Google Scholar] [CrossRef]
  11. Taynitskiy, V.; Gubar, E.; Zhu, Q. Optimal impulsive control of epidemic spreading of heterogeneous malware. IFAC-PapersOnLine 2017, 50, 15038–15043. [Google Scholar] [CrossRef]
  12. Schattler, H.; Ledzewicz, U. Geometric Optimal Control: Theory, Methods and Examples, 1st ed.; Springer: New York, NY, USA, 2012. [Google Scholar]
  13. Zaman, G.; Kang, Y.H.; Jung, I.H. Stability analysis and optimal vaccination of an SIR epidemic model. BioSystems 2008, 93, 240–249. [Google Scholar] [CrossRef] [PubMed]
  14. Anita, S.; Capasso, V.; Arnautu, V. An Introduction to Optimal Control Problems in Life Sciences and Economics, 1st ed.; Birkhäuser: Basel, Switzerland, 2011. [Google Scholar]
  15. Pang, L.; Ruan, S.; Liu, S.; Zhao, Z.; Zhang, X. Transmission dynamics and optimal control of measles epidemics. Appl. Math. Comput. 2015, 256, 131–147. [Google Scholar] [CrossRef]
  16. Hernández Guillén, J.D.; Martín Del Rey, A. Modeling malware propagation using a carrier compartment. Commun. Nonlinear Sci. Numer. Simul. 2018, 56, 217–226. [Google Scholar] [CrossRef]
Figure 1. Transition diagram corresponding to the dynamic model.
Figure 1. Transition diagram corresponding to the dynamic model.
Mathematics 08 01518 g001
Figure 2. Evolution of S without optimal control.
Figure 2. Evolution of S without optimal control.
Mathematics 08 01518 g002
Figure 3. Evolution of S with vaccination strategy.
Figure 3. Evolution of S with vaccination strategy.
Mathematics 08 01518 g003
Figure 4. Evolution of S with recovery strategy.
Figure 4. Evolution of S with recovery strategy.
Mathematics 08 01518 g004
Figure 5. Evolution of C without optimal control.
Figure 5. Evolution of C without optimal control.
Mathematics 08 01518 g005
Figure 6. Evolution of C with vaccination strategy.
Figure 6. Evolution of C with vaccination strategy.
Mathematics 08 01518 g006
Figure 7. Evolution of C with recovery strategy.
Figure 7. Evolution of C with recovery strategy.
Mathematics 08 01518 g007
Figure 8. Evolution of I without optimal control.
Figure 8. Evolution of I without optimal control.
Mathematics 08 01518 g008
Figure 9. Evolution of I with vaccination strategy.
Figure 9. Evolution of I with vaccination strategy.
Mathematics 08 01518 g009
Figure 10. Evolution of I with recovery strategy.
Figure 10. Evolution of I with recovery strategy.
Mathematics 08 01518 g010
Figure 11. Evolution of u 1 * with vaccination strategy.
Figure 11. Evolution of u 1 * with vaccination strategy.
Mathematics 08 01518 g011
Figure 12. Evolution of u 2 * with recovery strategy.
Figure 12. Evolution of u 2 * with recovery strategy.
Mathematics 08 01518 g012
Figure 13. Evolution of λ 1 .
Figure 13. Evolution of λ 1 .
Mathematics 08 01518 g013
Figure 14. Evolution of λ 2 .
Figure 14. Evolution of λ 2 .
Mathematics 08 01518 g014
Figure 15. Evolution of λ 3 .
Figure 15. Evolution of λ 3 .
Mathematics 08 01518 g015
Figure 16. Evolution of λ 4 .
Figure 16. Evolution of λ 4 .
Mathematics 08 01518 g016
Figure 17. Evolution of λ 5 .
Figure 17. Evolution of λ 5 .
Mathematics 08 01518 g017
Figure 18. Evolution of λ 6 .
Figure 18. Evolution of λ 6 .
Mathematics 08 01518 g018
Table 1. Parameters of the model.
Table 1. Parameters of the model.
ParameterDescriptionRange
vVaccination rate ( 0 , 1 )
aTransmission rate ( 0 , 1 )
b C Recovery rate of carriers ( 0 , 1 )
b I Recovery rate of infectious ( 0 , 1 )
ϵ Rate of lose of immunity of recovered ( 0 , 1 )
δ Rate of fraction of devices based on the targeted OS ( 0 , 1 )

Share and Cite

MDPI and ACS Style

Hernández Guillén, J.D.; Martín del Rey, Á.; Casado Vara, R. On the Optimal Control of a Malware Propagation Model. Mathematics 2020, 8, 1518. https://doi.org/10.3390/math8091518

AMA Style

Hernández Guillén JD, Martín del Rey Á, Casado Vara R. On the Optimal Control of a Malware Propagation Model. Mathematics. 2020; 8(9):1518. https://doi.org/10.3390/math8091518

Chicago/Turabian Style

Hernández Guillén, Jose Diamantino, Ángel Martín del Rey, and Roberto Casado Vara. 2020. "On the Optimal Control of a Malware Propagation Model" Mathematics 8, no. 9: 1518. https://doi.org/10.3390/math8091518

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop