The Impact of Imperfect Information on Network Attack Andrew Melchionna (University of Rochester) Jesús Caloca (Boise State University) Advisors: S. Squires,

Slides:



Advertisements
Similar presentations
Topology and Dynamics of Complex Networks FRES1010 Complex Adaptive Systems Eileen Kraemer Fall 2005.
Advertisements

Complex Networks: Complex Networks: Structures and Dynamics Changsong Zhou AGNLD, Institute für Physik Universität Potsdam.
Complex Networks Advanced Computer Networks: Part1.
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Social network partition Presenter: Xiaofei Cao Partick Berg.
Analysis and Modeling of Social Networks Foudalis Ilias.
Peer-to-Peer and Social Networks Centrality measures.
School of Information University of Michigan Network resilience Lecture 20.
Graph Partitioning Dr. Frank McCown Intro to Web Science Harding University This work is licensed under Creative Commons Attribution-NonCommercial 3.0Attribution-NonCommercial.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Scale-free networks Péter Kómár Statistical physics seminar 07/10/2008.
Scale Free Networks Robin Coope April Abert-László Barabási, Linked (Perseus, Cambridge, 2002). Réka Albert and AL Barabási,Statistical Mechanics.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University.
Error and Attack Tolerance of Complex Networks Albert, Jeong, Barabási (presented by Walfredo)
Peer-to-Peer and Social Networks Random Graphs. Random graphs E RDÖS -R ENYI MODEL One of several models … Presents a theory of how social webs are formed.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Social Networks Corina Ciubuc.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
Distributed Tracking Using Kalman Filtering Aaron Dyreson, Faculty Advisor: Ioannis Schizas, Ph.D. Department of Electrical Engineering, The University.
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Challenges and Opportunities Posed by Power Laws in Network Analysis Bruno Ribeiro UMass Amherst MURI REVIEW MEETING Berkeley, 26 th Oct 2011.
Soon-Hyung Yook, Sungmin Lee, Yup Kim Kyung Hee University NSPCS 08 Unified centrality measure of complex networks: a dynamical approach to a topological.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Complex network of the brain II Hubs and Rich clubs in the brain
- Anusha Uppaluri 1. Contents  Problem  Problems Importance  Research Methodology  Data Collection  Conclusion  References  Questions 2 2.
Decapitation of networks with and without weights and direction : The economics of iterated attack and defense Advisor : Professor Frank Y. S. Lin Presented.
Algorithms for Biological Networks Prof. Tijana Milenković Computer Science and Engineering University of Notre Dame Fall 2010.
Professor Yashar Ganjali Department of Computer Science University of Toronto
3.4.3 Nature and Impact of Legal Controls on Marketing.
A project from the Social Media Research Foundation: Finding direction in a sea of connection:
Social Networks. 2 A social network is a social structure made up of individuals or organizations (called "nodes“), which are tied (connected) by one.
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
A connected simple graph is Eulerian iff every graph vertex has even degree. The numbers of Eulerian graphs with, 2,... nodes are 1, 1, 2, 3, 7, 16, 54,
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Community Discovery in Social Network Yunming Ye Department of Computer Science Shenzhen Graduate School Harbin Institute of Technology.
Network resilience.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
Informatics tools in network science
Network Theory: Community Detection Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale.
1 Lesson 12 Networks / Systems Biology. 2 Systems biology  Not only understanding components! 1.System structures: the network of gene interactions and.
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Abstract Networks. WWW (2000) Scientific Collaboration Girvan & Newman (2002)
Netlogo demo. Complexity and Networks Melanie Mitchell Portland State University and Santa Fe Institute.
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
Cascading failures of loads in interconnected networks under intentional attack Yongxiang Xia Department of Information Science and Electronic Engineering.
Complex network of the brain II Attack tolerance vs. Lethality Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Complex network of the brain II Hubs and Rich clubs in the brain Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Graph clustering to detect network modules
Structures of Networks
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
Topics In Social Computing (67810)
Marina Leri Institute of Applied Mathematical Research
MA4404 Winter 2018 Introduction to Machine Learning
Michael L. Nelson CS 495/595 Old Dominion University
Classes will begin shortly
Peer-to-Peer and Social Networks Fall 2017
Enhancing Attack Robustness of Scale-free Networks by Camouflage
Robustness or Network Resilience
Department of Computer Science University of York
Topology and Dynamics of Complex Networks
Mathematics for Computer Science MIT 6.042J/18.062J
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
The Impact of Changes in Network Structure on Diffusion of Warnings
Presentation transcript:

The Impact of Imperfect Information on Network Attack Andrew Melchionna (University of Rochester) Jesús Caloca (Boise State University) Advisors: S. Squires, M. Girvan, E. Ott, T. Antonsen

What is a network?  A network represents connections (links) between system components (nodes)  Examples include social networks (friendships), the Internet, and neural networks  In many cases, the network data we have contains errors (e.g. Facebook links may not accurately reflect true friendships).

Attacking the Giant Connected Component  Connected Component: group of nodes connected via some paths of edges  Our goal: remove nodes from (‘attack’) the network in order to break up Giant Connected Component (GCC)  The catch: the info we have about the network contains errors (false and missing links)  While attacks on networks have been studied previously, our focus of the effect of imperfect information on attack is new  Applications: include vaccinating to stop an epidemic, stopping terrorist communication

Simulating Imperfect Information about Network Links  We create a noisy network from the true network in which some false links are added and/or some true links are missing

Attack Strategies  Nodes are removed in order of a specific "centrality" measure, meant to capture how influential each node is in the network  After each removal, we check the GCC size of the true network and use the noisy network to recalculate new centrality measures for each node in the network  Centrality measures for attack strategies include: −Degree −Betweenness −Dynamical Importance

Attack Strategies: Degree Centrality  A node’s degree is the number of links attached to it  An attack based on degree centrality removes the highest- degree nodes first

Attack Strategies: Betweenness Centrality  The betweenness of a node considers the shortest paths between all pairs of nodes, and is proportional to the number of shortest paths that pass through the node

Attack Strategies: Dynamical Importance

Results

Conclusions  The more sophisticated attack strategies remain effective even when the network information contains a significant number of link errors.  The effectiveness of attack strategies is more robust to the addition of false links compared with the deletion of true links.  We have also obtained results for other types of networks, for which find that the above conclusions also apply.

Acknowledgements  Thanks to Dr. Shane Squires and Profs. Girvan, Ott and Antonsen  TREND Program and the University of Maryland  National Science Foundation  Jesús acknowledges the support of the McNair Scholars Program.

References  Albert, R., H. Jeong, and A.L. Barabasi, "Error and attack tolerance of complex networks," Nature 406 (2000)  Restrepo, J. G., E. Ott, and B. R. Hunt. “Characterizing the dynamical importance of network nodes and links." Physical Review Letters 97.9 (2006):  Platig, J., E. Ott, and M. Girvan. "Robustness of network measures to link errors." Physical Review E 88.6 (2013):

Attack Strategies