Abstract

This paper is devoted to exploring the combined impact of a generic nonlinear infection rate and infected removable storage media on viral spread. For that purpose, a novel dynamical model with an external compartment is proposed, and the explanations of the main model assumptions (especially the generic nonlinear infection rate) are also examined. The existence and global stability of the unique equilibrium of the model are fully investigated, from which it can be seen that computer virus would persist. On this basis, a next-best approach to controlling the level of infected computers is suggested, and the theoretical analysis of optimal control of the model is also performed. Additionally, some numerical examples are given to illustrate the main results.

1. Introduction

In the wake of developments in computer and network technologies, computer virus has become more capable of conquering computer system. In the meantime, the study of fighting against computer virus has in the past few decades been paid more attention. In reality, there is no doubt that antivirus software and firewall are the most effective prevention measures. However, they are incompetent to inhibit computer virus diffusion over the Internet [1]. To deal with this problem, a wide variety of mathematical models have been widely studied (for the related references, see, e.g., [215]).

The infection rate is an important and essential system parameter in computer virus propagation models. However, the dominating majority of previous models assume a bilinear incidence rate (for the related references, see, e.g., [1620]) or a nonlinear increasing incidence rate (for the related references, see, e.g., [21]). The former assumption is suitable for the case where the proportion of infected computers is small. The latter assumption neglects the fact that, due to active protection measures taken during viral spread, the infection rate would be decreasing, while the infected computers may be increasing. In order to depict the case where the infection rate could be decreasing with the infected computers and inspired by the previous work (e.g., [22, 23]), the proposed model of this paper adopts a nonlinear function , where and function with , , and (see also the model assumption (A3) in the next section).

External computers (i.e., computers outside the Internet) and infected removable storage media play an important role in viral spread (for the related references, see, e.g., [24, 25]). In [24], the impact of infected removable storage media is considered, but the influence of external computers is insufficient. In [25], a dynamical model, in which all external computers are regarded as a separate compartment, was proposed. Unfortunately, this model ignores the effects of generic nonlinear infection rate and infected removable storage media. Consequently, it is necessary to consider the combined impact of a generic nonlinear infection rate and infected removable storage media on viral spread.

In addition, optimal control theory is often applied to control virus prevalence (for the related references, see, e.g., [14, 2628]). In [14, 27], a susceptible-latent-breaking-outside-susceptible (SLBOS) model and a susceptible-latent-breaking-susceptible (SLBS) model were studied, respectively. References [26, 28] considered a susceptible-infected-recovered-susceptible (SIRS) model in a fully connected network and a complex network, respectively. To our knowledge, there is no susceptible-infected-external-susceptible (SIES) model that has been examined by applying optimal control theory.

Combining the above discussions, a novel SIES model with two kinds of incidence rates, which are caused by infected computers and infected removable storage media, is established in this paper. A systematic analysis of the proposed model shows that the unique (viral) equilibrium is globally asymptotically stable. This result indicates that any effort in eradicating computer virus cannot succeed. In this regard, theoretical analysis of a next-best approach and optimal control of the model is performed. Numerical analysis of the model is also included.

The remaining materials of this paper are organized as follows: Section 2 formulates the model. Section 3 considers the viral equilibrium and its global stability. In Section 4, a theoretical analysis of optimal control of the model is performed. Finally, Section 5 concludes the contributions of this work and points out some further works that are worth doing.

2. Model Characterization

In this paper, the proposed model consists of three compartments (see (i)–(iii)), and the assumptions of it are also made (see (A1)–(A8)):-compartment: the set of all -computers (susceptible internal computers, i.e., computers in the Internet)-compartment: the set of all -computers (infected internal computers)-compartment: the set of all -computers (external computers, i.e., computers outside the Internet)Every computer is out of use with probability per unit time Every - or -computer leaves the Internet with probability per unit time Due to possible communication with -computers over the Internet, every -computer is infected with probability per unit time , where and function with , , and Due to possible effect of infected removable storage media, every -computer is infected with probability per unit time Due to treatment, every -computer is cured with probability per unit time The rate of all newly accessed -computers is Every -computer is either susceptible or infected when it enters the InternetEvery susceptible (or infected) -computer enters the Internet with probability per unit time (or )

For convenience, let , , and represent the average number of computers in -compartment, -compartment, and -compartment at time , respectively. Collecting the foregoing hypotheses, the proposed model can be depicted by Figure 1 or the differential systemwith initial condition .

3. Model Analysis

Let . System (1) can be rewritten aswith initial condition .

Let and . Solving the first and third equations of system (2), we get and System (2) can be reduced to the limiting system [29]where and

Clearly, system (3) has no virus-free equilibrium. Thus, this section mainly addresses the existence and global stability of viral equilibrium of system (3) with respect to positively invariant region: .

3.1. Equilibrium

Theorem 1. System (3) has a unique viral equilibrium , where is the unique root in of the equation

Proof. If is a viral equilibrium of system (3), then it satisfies (4). Now, it suffices to show that (4) has a unique root in . As and , we proceed by treating two possibilities.
Case 1. ; namely, . Note thatLet ; then . , ; implies that . Hence, ; implies that has a unique root in .
Case 2. ; namely, . LetThen,Thus, has a unique root in . The claimed result follows by the above discussions.

Remark 2. It follows from the above proof that .

3.2. Global Stability

Theorem 3. is globally asymptotically stable with respect to .

Proof. Consider the Lyapunov functionThen,Here, we proceed by treating two cases.
Case 1. If , namely, , then it follows from the Lagrange mean value theorem that , , or . As , and if and only if . Thus, the claimed result follows from LaSalle’s Invariance Principle [30].
Case 2. If , namely, , letThen,Next, we need to further distinguish two subcases.
Subcase 2.1. If , it follows from the Lagrange mean value theorem that , . As , . Then, for ,Subcase 2.2. If , it follows from the Lagrange mean value theorem that , . As , . Then, for ,It follows from (12)-(13) that . Thus, . Furthermore, if and only if . The claimed result also follows from LaSalle’s Invariance Principle [30]. The proof is complete.

Example 4. Consider system (1) with , , , , , , , and . Figure 2 displays the time plot of this system with initial condition . From Figure 2, the values of , , and tend to a constant, respectively. Furthermore, tends to a positive constant. This shows that is globally asymptotically stable.

Remark 5. Theorem 3 reveals that tends to a positive constant . From an epidemiological standpoint, it indicates that computer virus would persist in network. Thus, one can conclude that any effort in eradicating computer virus is doomed to failure. Thus, the best achievable goal is to make the number of infected computers below an acceptable level (i.e., as low as possible). Note that cannot be expressed in a specific formula, and it follows from Remark 2 that . Then, one could keep the value of below an acceptable threshold. To this end, the following result is made.

Theorem 6. From Equation (3), . Then , , , , and .

Proof. Since , thenThus, the proof is complete.

Remark 7. Theorem 6 implies the effects of some system parameters on the value of .

In addition, the following two examples exhibit the impacts of and on , respectively.

Example 8. Consider system (1) with , , , , , , and . Figure 3 demonstrates the time plot of this system with initial condition .

Example 9. Consider system (1) with , , , , , , and . Figure 4 shows the time plot of this system with initial condition .

Figures 3 and 4 show the effects of different infection rates and infected removable media on virus diffusion, respectively.

4. Optimal Control of the Model

To make a tradeoff between control cost and control effect, the control variable meaning the control strategy is applied in the proposed model (system (1)). Then, one can get the controlled dynamical systemwith initial condition , where

The admissible control set iswhere and are positive constants and .

Let . Then system (15) can be written in matrix notation aswith initial condition .

Now, the objective is to find a control variable so as to minimize both the number of infected computers and the total budget for treatment and vaccination during the time period . That is, it suffices to solve the optimal control problem.subject to system (18), whereis the Lagrangian and is a tradeoff factor based on the control cost and control effect.

Theorem 10. The optimal control problem (19) has an optimal control.

Proof. From equations (19) and (20), one can get that (1)there exist such that system (18) is solvable,(2)the admissible control set is convex and closed,(3)the right-hand side of system (18) is bounded by a linear function in ,(4) is convex on ,(5)there exist , , and such that .Thus, the claimed result follows directly from [31].

Theorem 11. Suppose is an optimal control for the optimal control problem (19), and is the solution to system (18) with . Then, there exist functions , , and , , such thatwith transversality conditions , where Furthermore, we have

Proof. Note that the Hamiltonian iswhere , , and are undetermined.
Then, applying the Pontryagin Minimum Principle [32], there exist functions , , and , , such that Hence, system (21) follows by a straightforward calculation. As the terminal cost is unspecified and the final state is free, the transversality conditions hold.
Note that the optimality condition . Then, either or or . Thus, the proof is complete.

By combining the above discussions, the optimality system for the optimal control problem (19) can be derived as follows:with , and .

Next, the effectiveness of optimal control will be examined. Here we have to point out that all parameter values are chosen hypothetically due to the unavailability of real-world data.

Example 12. Suppose that , , , , , , , , , , and . The optimality system (18) with is to be numerically solved with the backward-forward Runge-Kutta fourth-order scheme. Then Figures 57 and Table 1 are obtained.

Figures 5 and 6 exhibit the evolution of and with different control strategies, respectively. From these two figures, it is natural to see that the optimal control is superior to others.

Figure 7 shows the corresponding optimal control strategy.

Table 1 lists the values of infected computers and objective function under different control strategies. It is easy to conclude that is the best choice.

5. Conclusions and Prospects

This paper has investigated an SIES model with generic nonlinear infection rate. A thorough analysis shows that the unique (viral) equilibrium is globally asymptotically stable. This result implies that any effort in eradicating computer virus is inoperative. As a result, a countermeasure, which mainly aims to maintain the number of infected computers at an acceptable level, and optimal control analysis of the proposed model have been posed. Some numerical examples are also included.

The study of this model not only implies some new practical measures but also gives a theoretical support to the usefulness of some existing antivirus strategies and provides the basis to developing many other more elaborated models.

The study can be continued in several directions. First of all, it would be interesting for complex network (e.g., scale-free network) because our model is a homogeneous model. Next, delays (or pulses) could be incorporated in our model so as to characterize the delay in the development of new vaccine (or the emergency of new virus). Finally, our model involves a relatively large number of parameters, which are very difficult to establish with accuracy. Therefore, it is appropriate to modify our model by considering the parameters to be random variables.

Competing Interests

The authors declare that there are no competing interests regarding the publication of this paper.

Acknowledgments

This work is supported by Natural Science Foundation of China (Grant nos. 11547148, 61603065, and 61503307), Innovation Project of the Common Key Technology of Chongqing Science and Technology Industry (Grant no. cstc2015zdcy-ztzx40008), Scientific and Technological Research Program of Chongqing Municipal Education Commission (Grant nos. KJ1500415 and KJ1500904), and Doctoral Scientific Research Foundation of Chongqing University of Posts and Telecommunications (Grant nos. A2015-02 and A2016-10).