Optimal control strategy for a novel computer virus propagation model on scale-free networks
Introduction
Computer virus is a kind of computer program that can replicate itself and spread from one computer to others [1]. Computer viruses have caused enormous financial losses in the past few decades. With the popularization of the Internet and wireless networks, the epidemic capability of computer viruses has been overwhelmingly magnified. Indeed, computer viruses have turned out to be a major threat to our work and life [2]. The dynamical modeling, as it is known, is a vital approach to studying the way computer virus spreads on the Internet. Since Kephart and White [3], who followed the idea suggested by Cohen [4] and Murray [5], presented the first propagation model of computer virus, numerous relevant efforts in this field have been done.
In the past decade, the work on computer virus epidemiology has been mainly focused on the following two topics:
- (i)
Viruses spreading on fully-connected networks that are established based on the assumption that every computer on the network is equally likely to be accessed by any other computer across the network. Some classical models range from conventional models, such as the Susceptible–Infected–Susceptible (SIS) models [3], [6], Susceptible–Infected–Removed (SIR) models [7], [8], Susceptible–Infectious–Recovered–Susceptible (SIRS) models [9], [10], [11], Susceptible–Infected–External–Susceptible (SIES) models [12], Susceptible–Exposed–Infectious–Recovered (SEIR) models [13], [14], Susceptible–Exposed–Infectious–Recovered–Susceptible (SEIRS) models [15], Susceptible–Exposed–Infectious–Quarantined–Recovered–Susceptible (SEIQRS) models [16], Susceptible–Latent–Breaking–Susceptible (SLBS) models [17], [18], [19], [20], [21], [22], Susceptible–Infected–Countermeasure–Susceptible (SICS) models [23], [24], and some other models [25], [26], [27], [28], to unconventional models such as delayed models [29], [30], [31], [32], [33], [34], [35], [36] and stochastic models [22], [37].
- (ii)
Viruses spreading on complex networks, which was stimulated by the discovery that the Internet follows a power-law degree distribution [38], [39], [40]. These pioneering work has aroused intense interest in the impact of network topology on virus spreading. As a result, multifarious network-based virus epidemic models, ranging from Susceptible–Infected (SI) models [41], [42], [43] and SIS models [44], [45], [46], [47] to SIR models [48], [49], [50], [51], [52] and SLBS models [53] have been inspected.
To better understand the combined impact of both reinstalling system and network topology on virus spreading, in this paper we propose a novel SLBOS model by assuming that the underlying network is scale-free, i.e. its degree distribution follows a power law distribution. A comprehensive study of the model is conducted. Specifically, the spreading threshold is calculated, the virus-free equilibrium is shown to be globally asymptotically stable if , and the viral equilibrium is proved to be permanent if . To better control computer virus propagation, an optimally controlled SLBOS epidemic model on complex networks is also proposed.
The layout of this paper is as follows: Section 2 deals with the relevant mathematical framework (notations, hypotheses, and model formulation). Section 3 determines the spreading threshold and equilibria for this model. In Sections 4 Stability of the virus-free equilibrium, 5 Permanence of the virose equilibrium, we examine the global stability of the virus-free equilibrium and the permanence of the viral equilibrium, respectively. The effects of system parameters on virus spreading are analyzed in Section 6. In Section 7, the analysis of optimization problems is presented. Some numerical simulations are performed in Section 8. Finally, Section 9 outlines this work.
Section snippets
Description of the new model
We shall use a graph to represent the Internet topology, where nodes and edges stand for computers and communication links among computers, respectively. Its node degrees asymptotically comply with a power-law distribution, , where () means the probability that a node chosen randomly from the Internet is of degree [39], [40]. At any time a node has two states: within system, and without system. The nodes within system have three states: virus-free nodes, infected nodes
Spreading threshold and equilibria
Let where stands for the second origin moment of the node degree, . Then, we have Theorem 1 Consider system (4). The following assertions hold. There is always a virus-free equilibrium, , where . There is no virose equilibrium if . There is a unique virose equilibrium, , if , where
Stability of the virus-free equilibrium
This section examines the stability of the virus-free equilibrium . For convenience, let Let and rewrite system (4) in matrix–vector notation as with initial condition , where
Permanence of the virose equilibrium
To better understand the dynamical properties of system (4), we give Theorem 4 Consider system (4) and suppose . If , then, for all , we have
Proof According to assertion (2) of Lemma 4, there exists such that Let . Then As , let . Then . There exists
Further discussions
In order to eradicate virus infections, measures ensuring should be taken. To have a close look at the impact of different parameters on , let us do the following calculations.
From these computational results, we can draw the following conclusions:
- (a)
Reducing the infection rate, and , could
The optimal control problem
Optimal control techniques are widely used in applying optimal strategies to control computer viruses [36], [55], [56], [57]. To address the challenges of obtaining an optimal computer worm control strategy, we exploit optimal control theory in Ref. [58].
In the system (4), we have three state variables , and . For the optimal control problem, we consider the control variable to be the percentage of infected computers become recovered computers under the effects of
Numerical simulations
In this section, some numerical simulations are given to show the geometric impression of our results. To demonstrate the global stability of infection-free solution of system (4), we take the following set of parameter values: , , , , , , which runs on a scale-free network with and . In this case, we have , see Fig. 2.
To demonstrate the permanence of system (4), we take the following set of parameter values: , , ,
Conclusions
To better understand the combined impact of reinstalling system and network topology on virus spreading, a new model capturing the epidemics of computer viruses on scale-free networks has been proposed. The spreading threshold for the model has been determined. The global asymptotic stability of the virus-free equilibrium has been shown when the threshold is below one, whereas the permanence of the virose equilibrium has been proved if the threshold is above one. The effect of some system
Acknowledgments
The authors are indebted to the anonymous reviewers and the editor for their valuable suggestions that have greatly improved the quality of this paper. This work is supported by Natural Science Foundation of China (#11347150, #61304117). This work is supported by Natural Science Foundation of Guangdong Province, China (#2014A030310239).
References (59)
Computer viruses: Theory and experiments
Comput. Secur.
(1987)- et al.
A unified prediction of computer virus spread in connected networks
Phys. Lett. A
(2002) - et al.
A novel computer virus model and its dynamics
Nonliear Anal. RWA
(2012) - et al.
Modeling and analysis of the spread of computer virus
Commun. Nonlinear Sci. Numer. Simul.
(2012) - et al.
A propagation model of computer virus with nonlinear vaccination probability
Commun. Nonlinear Sci. Numer. Simul.
(2014) - et al.
An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate
Appl. Math. Comput.
(2013) - et al.
Network virus-epidemic model with the point-to-group information propagation
Appl. Math. Comput.
(2008) - et al.
Towards controlling virus propagation in information systems with pointto- group information sharing
Decis. Support Syst.
(2009) - et al.
Dynamic model of worms with vertical transmission in computer network
Appl. Math. Comput.
(2011) - et al.
SEIQRS model for the transmission of malicious objects in computer network
Appl. Math. Model.
(2010)