Combinatorial trace method for network immunization

被引:14
作者
Ahmad, Muhammad [1 ]
Ali, Sarwan [1 ]
Tariq, Juvaria [1 ]
Khan, Imdadullah [1 ]
Shabbir, Mudassir [2 ]
Zaman, Arif [1 ]
机构
[1] Lahore Univ Management Sci, Lahore, Pakistan
[2] Informat Technol Univ, Lahore, Pakistan
关键词
Network Immunization; Spectral Methods; Combinatorial Trace; Eigendrop; Closed Walks; DECONTAMINATION; SPREAD;
D O I
10.1016/j.ins.2020.01.037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Immunizing a subset of nodes in a network- enabling them to identify and withstand the spread of harmful content- is one of the most effective ways to counter the spread of malicious content. It has applications in network security, public health policy, and social media surveillance. Finding a subset of nodes whose immunization results in the least vulnerability of the network is a computationally challenging task. In this work, we establish a relationship between a widely used network vulnerability measure and the combinatorial properties of networks. Using this relationship and graph summarization techniques, we propose an efficient approximation algorithm to find a set of nodes to immunize. We provide theoretical justifications for the proposed solution and analytical bounds on the runtime of our algorithm. We empirically demonstrate on various real-world networks that the performance of our algorithm is an order of magnitude better than the state of the art solution. We also show that in practice the runtime of our algorithm is significantly lower than that of the best-known solution. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:215 / 228
页数:14
相关论文
共 42 条
[1]   Sampling Based Efficient Algorithm to Estimate the Spectral Radius of Large Graphs [J].
Abbas, Samar ;
Tariq, Juvaria ;
Zaman, Arif ;
Khan, Imdadullah .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, :175-180
[2]  
Ahmad M, 2017, AUSTRALAS J INF SYST, V21
[3]  
Ahn HJ, 2013, IEEE DECIS CONTR P, P4579, DOI 10.1109/CDC.2013.6760600
[4]  
[Anonymous], 14 AUSTR DAT MIN C
[5]  
[Anonymous], 2014, ARXIV14021731
[6]  
[Anonymous], RISK MANAG TELECOMMU
[7]  
Beg Maham Anwar, 2018, Advances in Knowledge Discovery and Data Mining. 22nd Pacific-Asia Conference, PAKDD 2018. Proceedings: LNAI 10939, P502, DOI 10.1007/978-3-319-93040-4_40
[8]   MONOTONICITY IN GRAPH SEARCHING [J].
BIENSTOCK, D ;
SEYMOUR, P .
JOURNAL OF ALGORITHMS, 1991, 12 (02) :239-245
[9]   Epidemic thresholds in real networks [J].
Chakrabarti, Deepayan ;
Wang, Yang ;
Wang, Chenxi ;
Leskovec, Jurij ;
Faloutsos, Christos .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
[10]   Node Immunization on Large Graphs: Theory and Algorithms [J].
Chen, Chen ;
Tong, Hanghang ;
Prakash, B. Aditya ;
Tsourakakis, Charalampos E. ;
Eliassi-Rad, Tina ;
Faloutsos, Christos ;
Chau, Duen Horng .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (01) :113-126