<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Conflict Control of Spreading Processes on Networks</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Software Systems NAS</institution>
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2062</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The focus of this work is to provide introduction to the current state of art of the field of spreading processes on networks in connection with optimal control theory and game theory. This is challenging problem which remains open, so we present problem formulation, make suggestion of possible ideas of solution and show simulations to substantiate these ideas. This work presents development of the problem of conflict control of epidemic processes on networks. This area has been topic of research interest among different fields, including biology, computer science, economics, and the social sciences. Epi demic dynamic in population, computer virus spreading over communication network, and rumors or fake news widening through social networks are examples of very different processes with the same nature.</p>
      </abstract>
      <kwd-group>
        <kwd>Networks</kwd>
        <kwd>game theory</kwd>
        <kwd>optimal control</kwd>
        <kwd>epidemic model</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        
spreading (for example epidemic) models [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
network analysis [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
game theory [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
supported by parallel computational algorithms, sufficient to perform computation for
networks dynamic in realistic scale. So far main problem was to build and analyze
epidemic models, but today the point of efforts shifting towards effective control of
spreading under conflict and uncertainty. Taking into account the most recent attacks
on computer networks and security issues it is very natural to expand results to the
field of malware mitigation [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Consider the heterogeneous SI dynamics:

 ̇ = ∑     (1 −   ) −  
where   is the probability of infection of ith node,   - are elements of matrix with
infection rates for every i-j node interaction,   - our influence on process, or in other
words, control.
      </p>
      <p>It is natural to set constraints for control in geometric and integral form
  ∈ [0,  
], ∫0   ( )
≤  
also it is usual to define the objective function to be minimized (for example in form
with linear costs):

0
∫ (   ( ) +    ( ))
→</p>
      <p>
        For this problem there is idea to use Pontryagin’s maximum principle. As shown in
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] (for simplistic setup) that the optimal solution is in form of bang-bang control. Our
main goal to extend this approach for more general setup.
      </p>
      <p>Consider a network, defined by adjacency matrix 
= {  } . Dynamic of epidemic
process on this network is described by system of equations:
 ̇ =  (1 −   ) ∑    

 =1
with  0 - vector of initial infection probabilities.</p>
      <p>Optimal control idea. Control   ( ) could be applied to (every) node to delay
spreading process. The main goal is to delay infection with minimal cost.</p>
      <p>Conflict-control idea. If we reformulate original problem to set imaginary “player”,

responsible for infecting. Let us define   ( ) =  (1 −   ) ∑ =1     , then the
process</p>
      <p>̇ =  − 
practical tools to analyze.
model setup) for arbitrary networks.
2</p>
      <p>
        Simulations
is a conflict-controlled process [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The goal is to find   (∙) as a function of   ( ) to
protect the network from infection (or at least formulate conditions when it is possible
to do). This is challenging problem which should be supported with theoretical and
      </p>
      <p>
        In this work we provide a simulation tool to compute spreading process (in SI
Simulation models were developed using R environment and available for working at
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. For arbitrary network topology and initial infection distribution we run SI model
and calculate spreading process on the network. There are two input files: network
structure – .csv file with pairs of nodes. Each pair is a connection between them.
Second file is names of infected (at the beginning) nodes. There are two methods
implemented – network dynamic without additional infection (classical SI model) and
network dynamic 2 – infection, which gives influence on other nodes starting from any
non-zero level. The results are presented on Fig. 1.
      </p>
      <p>Solid line shows dynamic for the case when infected node is at the most distant
node from the center. Dotted line is for the case when infected node is on the border.
Dashed line is for the case when infected node is in the centre. As we can understand
from simulations network topology has immediate and strong effect on the spreading
process.</p>
      <p>
        Second direction of simulations was to calculate bang-bang control and its effect
on SI model dynamic [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. On the fig.2 there is simple SI model for  = 0.2 and  0 =
0.02. There are two controls: red (starts at 5 and ends at 10, power 0.07) and green
(starts at 13 and ends at 29, power 0.24).
      </p>
      <p>On fig. 3 it is shown result of different controls with the time of working 10 – 20
(red) and 15 – 25 (green). As we can conclude – it is much more effective to deal with
spreading at the beginning them after some time.</p>
      <p>In this work we present tool for network simulations, developed to get better
understanding of spreading dynamics. Also we create bang-bang control simulation to
illustrate its efficiency.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Nowzari</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , et al.:
          <article-title>Analysis and control of epidemics: A survey of spreading processes on complex networks</article-title>
          .
          <source>IEEE Control Systems</source>
          <volume>36</volume>
          (
          <issue>1</issue>
          ),
          <fpage>26</fpage>
          -
          <lpage>46</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Newman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Networks: an introduction</article-title>
          . Oxford university press, (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Ignatenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Game-Theoretical Model of Users Interaction in Computer Networks</article-title>
          .
          <source>Journal of Automation and Information Sciences 49.8</source>
          ,
          <fpage>68</fpage>
          -
          <lpage>81</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Eshghi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , et al.:
          <article-title>Optimal patching in clustered epidemics of malware</article-title>
          .
          <source>IEEE Trans. Network</source>
          <volume>24</volume>
          (
          <issue>1</issue>
          ),
          <fpage>283</fpage>
          -
          <lpage>298</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Khanafer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basar</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>An optimal control problem over infected networks</article-title>
          .
          <source>In Proc. Int. Conf. Control, Dynamic Systems, Robotics</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . Ottawa, ON, Canada (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Chikrii</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Conflict-controlled processes</article-title>
          . Vol.
          <volume>405</volume>
          . Springer Science &amp; Business Media, (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Shiny application, https://ignat.shinyapps.io/Networks/, last accessed
          <year>2018</year>
          /04/16
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Shiny application, https://ignat.shinyapps.io/SI_simple_control/,
          <source>last accessed</source>
          <year>2018</year>
          /04/16
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>