OPTIMAL CONTROL ON THE SPREAD OF SLBS COMPUTER VIRUS MODEL. Brawijaya University Jl. Veteran Malang, 65145, INDONESIA

Similar documents
Global Stability of a Computer Virus Model with Cure and Vertical Transmission

Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model

Stability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet

Research Article Towards the Epidemiological Modeling of Computer Viruses

Research Article Modeling Computer Virus and Its Dynamics

An Improved Computer Multi-Virus Propagation Model with User Awareness

SI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network. 1 Introduction. Bimal Kumar Mishra 1, Aditya Kumar Singh 2

Research Article An Impulse Model for Computer Viruses

Optimal control of culling in epidemic models for wildlife

Stability of SEIR Model of Infectious Diseases with Human Immunity

Department of Mathematics, Faculty of Sciences and Mathematics, Diponegoro University,Semarang, Indonesia

Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy

Dynamical Analysis of Plant Disease Model with Roguing, Replanting and Preventive Treatment

Thursday. Threshold and Sensitivity Analysis

Research Article Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus

Epidemics in Complex Networks and Phase Transitions

Spread of Malicious Objects in Computer Network: A Fuzzy Approach

Introduction to SEIR Models

Optimal Control of an SIR Epidemic Model with a Saturated Treatment

Dynamical models of HIV-AIDS e ect on population growth

A NEW SOLUTION OF SIR MODEL BY USING THE DIFFERENTIAL FRACTIONAL TRANSFORMATION METHOD

Research Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network

Optimal Control Applied to the Spread of Influenza A(H1N1)

A Note on the Spread of Infectious Diseases. in a Large Susceptible Population

Optimal control of vaccination and treatment for an SIR epidemiological model

Mathematical modelling and controlling the dynamics of infectious diseases

Research Article Dynamical Models for Computer Viruses Propagation

Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population

Mathematical Modeling and Analysis of Infectious Disease Dynamics

GLOBAL STABILITY OF SIR MODELS WITH NONLINEAR INCIDENCE AND DISCONTINUOUS TREATMENT

A Delayed HIV Infection Model with Specific Nonlinear Incidence Rate and Cure of Infected Cells in Eclipse Stage

Section 8.1 Def. and Examp. Systems

Kalavakkam, Chennai, , Tamilnadu, INDIA 2,3 School of Advanced Sciences. VIT University Vellore, , Tamilnadu, INDIA

Mathematical Analysis of Epidemiological Models: Introduction

Analysis of Numerical and Exact solutions of certain SIR and SIS Epidemic models

STABILITY ANALYSIS OF A GENERAL SIR EPIDEMIC MODEL

Analysis of Computer Virus Propagation Based on Compartmental Model

Available online at Commun. Math. Biol. Neurosci. 2016, 2016:17 ISSN:

Research Article Optimal Control of an SIR Model with Delay in State and Control Variables

Qualitative Analysis of a Discrete SIR Epidemic Model

Global Analysis of an SEIRS Model with Saturating Contact Rate 1

A New Mathematical Approach for. Rabies Endemy

Impact of Case Detection and Treatment on the Spread of HIV/AIDS: a Mathematical Study

Optimal Control of Epidemic Models of Rabies in Raccoons

An Optimal Control Problem Over Infected Networks

The Existence and Stability Analysis of the Equilibria in Dengue Disease Infection Model

Quantitative model to measure the spread of Security attacks in Computer Networks

Chaos, Solitons and Fractals

Behavior Stability in two SIR-Style. Models for HIV

Stochastic Model for the Spread of the Hepatitis C Virus with Different Types of Virus Genome

MODELING THE SPREAD OF DENGUE FEVER BY USING SIR MODEL. Hor Ming An, PM. Dr. Yudariah Mohammad Yusof

New Journal of Physics

Australian Journal of Basic and Applied Sciences

Available online at J. Math. Comput. Sci. 2 (2012), No. 6, ISSN:

Preservation of local dynamics when applying central difference methods: application to SIR model

Optimal Control of a Delayed SIRS Epidemic Model with Vaccination and Treatment

Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination

Hepatitis C Mathematical Model

Applied Mathematics Letters. Global behaviour of a heroin epidemic model with distributed delays

Modeling Addiction with SIR Models and Di usion. David Zimmerman

Dynamical Analysis of a Harvested Predator-prey. Model with Ratio-dependent Response Function. and Prey Refuge

PAijpam.eu NUMERICAL SOLUTION OF WAVE EQUATION USING HAAR WAVELET Inderdeep Singh 1, Sangeeta Arora 2, Sheo Kumar 3

Mathematical Model of Tuberculosis Spread within Two Groups of Infected Population

Fixed Point Analysis of Kermack Mckendrick SIR Model

Optimal control of an epidemic model with a saturated incidence rate

A Novel Computer Virus Model and Its Stability

PAijpam.eu NEW SELF-STARTING APPROACH FOR SOLVING SPECIAL THIRD ORDER INITIAL VALUE PROBLEMS

Modelling the spread of bacterial infectious disease with environmental effect in a logistically growing human population

SIR Epidemic Model with total Population size

The death of an epidemic

Research Article A Delayed Epidemic Model with Pulse Vaccination

The SIR Disease Model Trajectories and MatLab

Global Analysis of a Mathematical Model of HCV Transmission among Injecting Drug Users and the Impact of Vaccination

Optimal Treatment Strategies for Tuberculosis with Exogenous Reinfection

GEMF: GENERALIZED EPIDEMIC MODELING FRAMEWORK SOFTWARE IN PYTHON

Analysis of SIR Mathematical Model for Malaria disease with the inclusion of Infected Immigrants

Mathematical Modeling of Immune Responses to Hepatitis C Virus Infection

Epidemic Spreading in Technological Networks

GLOBAL DYNAMICS OF A MATHEMATICAL MODEL OF TUBERCULOSIS

A comparison of delayed SIR and SEIR epidemic models

Introduction: What one must do to analyze any model Prove the positivity and boundedness of the solutions Determine the disease free equilibrium

LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC

THE RELATION AMONG EULER S PHI FUNCTION, TAU FUNCTION, AND SIGMA FUNCTION

Non-Linear Models Cont d: Infectious Diseases. Non-Linear Models Cont d: Infectious Diseases

Electronic appendices are refereed with the text. However, no attempt has been made to impose a uniform editorial style on the electronic appendices.

Research Article Modeling and Analysis of Epidemic Diffusion within Small-World Network

POSITIVE SOLUTIONS FOR BOUNDARY VALUE PROBLEM OF SINGULAR FRACTIONAL FUNCTIONAL DIFFERENTIAL EQUATION

Modeling the Existence of Basic Offspring Number on Basic Reproductive Ratio of Dengue without Vertical Transmission

APPROXIMATION OF GENERALIZED BINOMIAL BY POISSON DISTRIBUTION FUNCTION

EPIDEMIC MODELS I REPRODUCTION NUMBERS AND FINAL SIZE RELATIONS FRED BRAUER

Stability Analysis and Optimal Control of a Malaria Model with Larvivorous Fish as Biological Control Agent

The Spreading of Epidemics in Complex Networks

MODELING OF VEHICLE INSURANCE CLAIM USING EXPONENTIAL HIDDEN MARKOV. Bogor Agricultural University Meranti Street, Bogor, 16680, INDONESIA

(mathematical epidemiology)

Lecture VI Introduction to complex networks. Santo Fortunato

ON THE SOLUTIONS OF NON-LINEAR TIME-FRACTIONAL GAS DYNAMIC EQUATIONS: AN ANALYTICAL APPROACH

Bayesian Inference for Contact Networks Given Epidemic Data

On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study

Applications in Biology

Mathematical Epidemiology Lecture 1. Matylda Jabłońska-Sabuka

Transcription:

International Journal of Pure and Applied Mathematics Volume 17 No. 3 216, 749-758 ISSN: 1311-88 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 1.12732/ijpam.v17i3.21 PAijpam.eu OPTIMAL CONTROL ON THE SPREAD OF SLBS COMPUTER VIRUS MODEL Pangestuti Prima Darajat 1, Agus Suryanto 2, Agus Widodo 3 1,2,3 Department of Mathematics Brawijaya University Jl. Veteran Malang, 65145, INDONESIA Abstract: In this paper, we discuss an optimal control on the spread of SLBS computer virus model. Control strategy by installing antivirus on each subpopulation aims to minimize the number of infective computers (latent and breakingout) and the cost associated with the control. Optimal system condition is determined by using Pontryagin principle and is solved numerically by using Forward-Backward Sweep method in combination with the fourth order Runge-Kutta method. Our numerical simulations show that the strategy by installing antivirus on susceptible computers as preventive give a great influence on suppressing the spread of computer viruses. AMS Subject Classification: 49J15 Key Words: optimal control, spread of computer virus model, Pontryagin principle, forward-backward sweep method 1. Introduction A computer viruses are malicious program that can replicate themselves and spread among computers. When user on computer network or use removable storage device, the computers are at hight risk of being infective by a computer Received: March 18, 216 Published: April 22, 216 Correspondence author c 216 Academic Publications, Ltd. url: www.acadpubl.eu

75 P.P. Darajat, A. Suryanto, A. Widodo viruses. During the breakingout period, virus may cause damage on whole computer system and give huge financial lose. However, antivirus software as a tool to agains computer virus has limited ability to solve it [1]. Considering the urgency of controlling the spread of computer viruses, many research formulate models of the spread of computer viruses and concerns with qualitative analysis of the model. Various model was adopted form classic epidemic infection disease model, such as SIR or SIRS model [2][3], SIE model [4], SEIR model [5], etc. However, computer viruses have the main characteristics that differentiate from biological virus, i.e., there are no infective computers that do not have infectivity. Therefore, the spread of computer viruses model should not have exposed computers (E). Moreover, infective computers are categorized as latent or breakingout which depends on condition of viruses stay in it [6]. The latent period that begins when the virus enters the computer until just before the virus damages the computer system, whereas the breakingout period is when the virus begins to destroy the computer system until just before cleaned. Lu-Xing and Xiaofan [1] has proposed a new epidemic model of computer virus where connected computers in this case are categorized into three subpopulations: susceptible computers (S S(t)), latent computers (L L(t)), and breakout computers (B B(t)). By assuming that every new connected computer is in virus free condition, the compartment diagram for the model is shown in Figure 1 and the model is written below, ds dt = µ β 1LS β 2 BS θs +γ 1 L+γ 2 B δs, (1a) dl dt = β 1LS +β 2 BS +θs γ 1 L+αL δl, db dt = αl γ 2B δb, (1b) where µ, β 1, β 2, θ, γ 1, γ 2, δ, α are positive constants. In this model, susceptible computers connect to the network at constant rate µ. Each subpopulation disconnects from network with coefficient δ. Due to the interaction, the coefficients of infection from latent computers and breakingout computers to susceptible computers are denoted by β 1 and β 2. The susceptible computers can be infective due to the influence of removable storage device with coefficient θ. Latent computers may break out and enter the B compartment with coefficient α. Finally it is assumed that latent and breakingout computers are cured with coefficient γ 1 and γ 2, respectively. (1c)

OPTIMAL CONTROL ON THE SPREAD OF... 751 Figure 1: Compartment of the spread of vomputer virus. Lu-Xing and Xiaofan [1] have shown that system (1) has a unique equilibrium, i.e., the endemic equilibrium which is globally asymptotically stable. This showed that there is no virus-free condition and the virus will always exist in the system. To minimize the number of infective (latent and breakout) computers, other strategies than constant curing have to be implemented to control the spread of computer viruses. Such strategies are usually combined with efforts to minimize the cost related to these strategies. Hence, an important tool in this case is optimal control theory. Lijuan et al. [6] has proposed a control strategy by installing antivirus on breakingout computers to minimize the number of breakingout computers and the costs associated with the control. They found that optimal control solution exists and effective for reducing the number of the breakout computers. However, their numerical simulations showed that the breakout computers still exist and the number of latent computers are increased. In this paper we introduce a different strategy to minimize the number of both latent and breakout computer including the costs associated with the control. Our strategy, the related theoretical optimal control problem and the method to solve this problem will be given in Section 2. In Section 4. numerical simulations are performed to show the influence of control variables. All results are summarized in Section 5. 2. Optimal Control Problem In this paper we introduce control strategy u 1 u 1 (t), u 2 u 2 (t), and u 3 u 3 (t) that denote control for installing effective antivirus programs on susceptible, latent and breakout computers, respectively. Control u 1 is intended to provide protection for susceptible when interacting with infective computers or removable media. Control u 2 and u 3 are intended to repair infective computers (latent and breakingout). Due to limitation of antivirus abillity, we assume that by applying control u 3 for breakout computers at time t then there will

752 P.P. Darajat, A. Suryanto, A. Widodo be ηu 3 B breakout computers which will become susceptibles and (1 η)u 3 B breakout computers will become latent, with η [, 1]. By applying such control strategies, model (1) can be written as, ds dt = µ (1 u 1 )(β 1 LS +β 2 BS +θs) +γ 1 L+γ 2 B δs +u 2 L+ηu 3 B (2a) dl dt = (1 u 1 )(β 1 LS +β 2 BS +θs) γ 1 L+ αl δl u 2 L+(1 η)u 3 B (2b) db dt = αl γ 2B δb u 3 B,. (2c) Control variables will be implemented during a time interval t [,T] and they are normalized such that the admissible set is given by, U ad = { u u 1 1, u 2 1, u 3 1,t [,T]} (3) where u = (u 1,u 2,u 3 ). Our objective will be contructed with the following goal: 1. Minimized the number of latent computers and breakingout computers. 2. Minimized the total cost for installing the antivirus program in each subpopulation. Mathematically, the objective function is to minimize the following functional J( u) = T [vl+wb +xu 2 1 +yu 2 2 +zu 2 3]dt (4) where v, w, x, y, and z are the weight constants subject to system of equations (2). To solve this optimal control problem we apply the Pontryagin minimum principle. For that, we define adjoint variables σ 1 σ 1 (t), σ 2 σ 2 (t), and σ 3 sigma 3 (t) for state S, L, and B respectively and consider the following Hamiltonian H(S,L,B, u, σ,t) = vl+wb +xu 2 1 +yu 2 2 +zu 2 3 + 3 σ i f i (S,L,B, u) (5) i=1 where σ = (σ 1,σ 2,σ 3 ) and f i are the right hand side of system (2), with transversal conditions σ i (T) =, i = 1,2,3.

OPTIMAL CONTROL ON THE SPREAD OF... 753 Theorem 1. For optimal control problem (4) subject to system (2) there exists an optimal control u, and optimal state solution S,L,B so that J( u ) = min J( u). Then, there exist adjoint variables σ 1,σ 2, and σ 3 that satisfy, σ 1 = σ 1 ((1 u 1 )(β 1 L+β 2 B +θ)+δ) σ 2 ((1 u 1 )(β 1 L+β 2 B +θ)) (6a) σ 2 = v +σ 1 ((1 u 1 )β 1 S γ 1 u 2 ) σ 3 α σ 2 ((1 u 1 )β 1 S γ 1 α δ u 2 ) (6b) σ 3 = w+σ 1 ((1 u 1 )β 2 S(t) γ 2 ηu 3 ) σ 2 β 2 S + σ 2 u 1 β 2 S +σ 2 (1 η)u 3 σ 3 (γ 2 +δ +u 3 ) (6c) with transversal condition σ i (T) =, i = 1,2,3. Proof. The adjoint equations and the transversality conditions are determined from the Hamiltonian (5). Differentiating the Hamiltonian (5) with σ respect to each state variable, i.e. 1 = H S, σ 2 = H L and σ 3 = H B, we obtain the adjoint system as follows σ 1 = σ 1 ((1 u 1 )(β 1 L+β 2 B +θ)+δ) σ 2 ((1 u 1 )(β 1 L+β 2 B +θ)) (7a) σ 2 = v +σ 1 ((1 u 1 )β 1 S γ 1 u 2 ) σ 3 α σ 2 ((1 u 1 )β 1 S γ 1 α δ u 2 ) (7b) σ 3 = w +σ 1 ((1 u 1 )β 2 S γ 2 ηu 3 ) σ 3 (γ 2 +δ +u 3 ) σ 2 ((1 u 1 )β 2 S +(1 η)u 3 ) (7c) In this system, there is no terminal cost and the final state is free. Therefore, the transversality conditions (bounded conditions) for the adjoint variables are

754 P.P. Darajat, A. Suryanto, A. Widodo σ i (T) =, i = 1,2,3. Furthermore, the optimal conditions is obtained from the stationary conditions, i.e., 2xu 1 + σ 1 (β 1 L S +β 2 B S +θs ) σ 2 (β 1 L S +β 2 B S +θs ) = (8a) 2yu 2 +σ 1L σ 2 L = (8b) 2zu 3 +σ 1ηB σ 2 (1 η)b σ 3 B = Considering the feature of the admissible set U ad, see equation (3), we obtained u 1 = min(max(, (σ 2 σ 1 )(β 1 LS +β 2 BS +θs) ),1) (9a) 2x u 2 = min(max(, (σ 2 σ 1 )L ),1) (9b) 2x u 3 = min(max(, (σ 3 σ 2 (1 η) σ 1 η)b ),1) (9c) 2x Thus the optimal control solution is obtained by solving the following equation system, (8c) ds dt dl dt db dt = f 1 (S,L,B,u 1,u 2,u 3 ) (1a) = f 2 (S,L,B,u 1,u 2,u 3 ) (1b) = f 3 (S,L,B,u 1,u 2,u 3 ) (1c) σ 2 σ 1 = σ 1 ((1 u 1 )(β 1L +β 2 B +θ)+δ) σ2 ((1 u 1)(β 1 L +β 2 B +θ)) = v +σ1 ((1 u 1 )β 1S γ 1 u 2 ) σ 2 ((1 u 1 )β 1S γ 1 α δ u 2 ) σ 3 α (1d) (1e) σ 3 = w +σ 1((1 u 1)β 2 S γ 2 ηu 3) σ 2((1 u 1)β 2 S +(1 η)u 3) σ 3(γ 2 +δ +u 3. (1f)

OPTIMAL CONTROL ON THE SPREAD OF... 755 3. Numerical Simulation The optimality system (1) in this section is solved numerically using forwardbackward Sweep method in combination with the fourth order Runge-Kutta method, see [7] and [8] for the detail. For simulations, we take parameter values from [6] as shown in Tabel 1. The initial population is S = 15, L = 1, and B = 1. The control variables will be implemented during t [,T] with T = 1. Table 1: Parameter values for the simulations µ δ β 1 β 2 θ γ 1 γ 2 α η 4.1.2.1.2.2.1.2.8 We first study the influence of each control variable on system (2). For that aim, we carry out simulations by applying one control variable while two other control variables are set to be zero. The results of these simulations are shown in Figure 2. For comparison, we also plot the numerical solution without any control. It is found that without any control, the numerical solution is convergent to endemic equilibrium (Ŝ, ˆL, ˆB)=(11.379, 14.3145, 14.3145). When a control strategy by installing antivirus only on susceptible computers, i.e. onlyu 1 isimplemented, it isoptimal tostart thisstrategy at maximumrate. This strategy significantly influences the system which in this case the infective computers(bothlatent andbreakout)areeradicated. Ataboutt = 9, u 1 starts to decline. As a result, the number of latent and breakout computers start to increase due to the infection from removable media. If antivirus is installed only on latent computers or only on breakout computers, i.e., applying only u 2 or only u 3, then the optimal control strategies are not at maximum rate. Such optimal control can reduce the number of latent or breakout computers but they are not as effective as u 1. This is because the control strategy by installing antivirus only on latent computers or only on breakout computers can not prevent virus infection from removable storage. In the second case, we implement all three control variables (u 1, u 2, and u 3 ) simultaneously, i.e., antivirus is installed on all susceptible, latent and breakout computers. The optimal solution for this case is shown in Figure 3. At the beginning, control u 1 is not at maximum rate due to u 2 and u 3 are also applied. Then, control u 1 is optimal to be implemented at maximum rate, while u 2 and u 3 are set to be zero. This optimal strategy leads to increasing the number of susceptible computers significantly and the number of latent and breakout computers decrease to zero. Since the control variables are stop at t = 1, u 1

756 P.P. Darajat, A. Suryanto, A. Widodo 4 3 S w/o control S w only u 1 S w only u 2 2 15 Susceptible 2 1 S w only u 3 Latent 1 5 L w/o control L w only u 1 L w only u 2 2 4 6 8 1 L w only u 3 2 4 6 8 1 15 1 u 1 Breakingout 1 5 B wο Control B w only u 1 Control Rate.8.6.4 u 2 u 3 B w only u 2 B w only u 3 2 4 6 8 1.2 2 4 6 8 1 Figure 2: Numerical solutions of system (2) without control (black fullline), with control u 1 (red dashed-line), with control u 2 (blue dasheddotted line), with control u 3 (green dotted-line): (a) susceptible computers, (b) latent computers and (c) breakingout computers. (d) The optimal control rate u 1 (red dahsed-line), u 2 (blue dashed-dotted-line), u 3 (green dotted-line). starts to decrease at about t = 9. With decreasing u 1, latent computers start to appear again due to the infection from removable media so that it is optimal to control the network by targeting the latent and breakout computers. Since all control has to be stop at t = 1, while the infection from removable media cannot be stop, the number of latent and breakout computers is getting bigger at the end of control. Figure 2 and Figure 3 show that applying only u 1 and combining all three control variable (u 1, u 2, and u 3 ) give relatively the same result. This indicates that to suppress the spread of computer viruses is enough

OPTIMAL CONTROL ON THE SPREAD OF... 757 4 15 Susceptible 3 2 1 S w/o control S w control u 1, u 2, u 3 Latent 1 5 L w/o control L w control u 1, u 2, u 3 2 4 6 8 1 2 4 6 8 1 Breakingout 15 1 5 B w/o control B w control u 1, u 2, u 3 Control Rate u 3 1.8.6.4 u 1 u 2 u 3.2 2 4 6 8 1 2 4 6 8 1 Figure 3: Numerical solutions of system (2) without control (black), with control u 1, u 2 and u 3 (red): (a) susceptible computers, (b) latent computers and(c) breakingout computers. (d) The optimal control rate u 1 (black dashed-dotted line), u 2 (blue dashed-line), u 3 (red dottedline). by installing antivirus only on susceptible computers as prevention. 4. Conclusions In this paper we have discussed an optimal strategy to eradicate virus infection on SLBS computer virus model by installing antivirus program on all subpopulation (susceptible, latent and breakout computers). The optimal control strategy is meant to minimize the number of latent and breakout computers as well as the cost associated with installing the antivirus program. The optimal problem is solved using Pontryagin s principle and the obtained optimality system is solved numerically using forward-backward sweep method. Based on the numerical simulations, it is found that installing antivirus program only on sus-

758 P.P. Darajat, A. Suryanto, A. Widodo ceptible computers as a preventive is the most effective strategy in suppressing the spread of computer viruses. References [1] Y. Lu-Xing, Y. Xiaofan, A new epidemic model of computer viruses, Commun. Nonlinear Sci. Numer. Simulat., 19, No. 6 (214), 1935 1944. [2] I. Darti, A. Suryanto, M. Yustianingsih, Simulation of worms transmission in computer network based on SIRS fuzzy epidemic model, AIP Conf. Proc., 1651, (215), 48 52. [3] G. Chenquan, Y. Xiaofan, L. Wanping, Z. Qingyi, A propagation model of computer virus with nonlinear vaccination probability, Commun. Nonlinear Sci. Numer. Simulat., 19, No. 1 (214), 92 1. [4] G. Chenquan, Y. Xiaofan, L. Wanping, Z. Qingyi, J. Jian, H. Li, Propagation of computer virus both across the Internet and external computers: A complex-network approach, Commun. Nonlinear Sci. Numer. Simulat, 19, No. 8 (214), 2785 2792. [5] P. Mei, H. Xing, H. Junjian, D. Tao, Modeling computer virus and its dynamics, Mathematical Problems in Engineering, 213, (213), Article ID 842614. [6] C. Lijuan, K. Hattaf, S. Jitao, Optimal control of a delayed SLBS computer virus model, Physica A, 427, (215), 244 25. [7] S. Lenhart, J. T. Workman, Optimal Control Apllied to Biological Models, Taylor and Francis Group, New York (215). [8] D. E. Mahmudah, A. Suryanto, Trisilowati, Optimal control of a vector-host epidemic model with direct transmission, Appl. Math. Sciences, 7, No. 99 (213), 4919 4927.