Optimal control of computer virus under a delayed model

被引:112
作者
Zhu, Qingyi [1 ]
Yang, Xiaofan [1 ]
Yang, Lu-Xing [1 ,2 ]
Zhang, Chunming [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Coll Math & Stat, Chongqing 400044, Peoples R China
关键词
Computer virus; Delayed model; Controlled system; Optimal control problem; Objective functional; Control strategy; SIR EPIDEMIC MODEL;
D O I
10.1016/j.amc.2012.04.092
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
This paper addresses the issue of how to suppress the spread of computer virus by means of the optimal control method. First, a controlled delayed computer virus spread model is established. Second, an optimal control problem is formulated by making a tradeoff between the control cost and the control effect. Third, the optimal control strategies are theoretically investigated. Finally, it is experimentally shown that the spread of infected nodes can be suppressed effectively by adopting an optimal control strategy. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:11613 / 11619
页数:7
相关论文
共 15 条
  • [1] [Anonymous], 2007, P KSIAM
  • [2] A unified prediction of computer virus spread in connected networks
    Billings, L
    Spears, WM
    Schwartz, IB
    [J]. PHYSICS LETTERS A, 2002, 297 (3-4) : 261 - 266
  • [3] Fister K., 1998, Electron. J. Differ. Equat, V1998, P1
  • [4] Fleming W. H., 2012, Deterministic and Stochastic Optimal Control
  • [5] Dynamical behavior of computer virus on Internet
    Han, Xie
    Tan, Qiulin
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2010, 217 (06) : 2520 - 2526
  • [6] Kamien M, 2000, Dynamics optimization: the calculus of variations and optimal control in economics and management
  • [7] KEPHART JO, 1993, 1993 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P2
  • [8] KEPHART JO, 1991, 1991 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY, P343
  • [9] Fixed period of temporary immunity after run of anti-malicious software on computer nodes
    Mishra, Bimal Kumar
    Jha, Navnit
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2007, 190 (02) : 1207 - 1212
  • [10] Dynamic models for computer viruses
    Piqueira, Jose R. C.
    de Vasconcelos, Adolfo A.
    Gabriel, Carlos E. C. J.
    Araujo, Vanessa O.
    [J]. COMPUTERS & SECURITY, 2008, 27 (7-8) : 355 - 359