Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur 721302 Stability analysis of peer to peer.

Slides:



Advertisements
Similar presentations
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Advertisements

Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
How do the superpeer networks emerge? Niloy Ganguly, Bivas Mitra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur,
School of Information University of Michigan Network resilience Lecture 20.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Spectrum Based RLA Detection Spectral property : the eigenvector entries for the attacking nodes,, has the normal distribution with mean and variance bounded.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Cascading failures in interdependent networks and financial systems -- Departmental Seminar Xuqing Huang Advisor: Prof. H. Eugene Stanley Collaborators:
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
TELCOM2125: Network Science and Analysis
Lin Chen∗, Kaigui Bian∗, Lin Chen† Wei Yan∗, and Xiaoming Li∗
The Erdös-Rényi models
Information Networks Power Laws and Network Models Lecture 3.
Analyzing the Vulnerability of Superpeer Networks Against Churn and Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Modeling Information Diffusion in Networks with Unobserved Links Quang Duong Michael P. Wellman Satinder Singh Computer Science and Engineering University.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
Soon-Hyung Yook, Sungmin Lee, Yup Kim Kyung Hee University NSPCS 08 Unified centrality measure of complex networks.
Author: M.E.J. Newman Presenter: Guoliang Liu Date:5/4/2012.
Theory of αBiNs: Alphabetic Bipartite Networks Animesh Mukherjee Dept. of Computer Science and Engineering Indian Institute of Technology, Kharagpur Collaborators:
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance.
Analyzing the Vulnerability of Superpeer Networks Against Attack B. Mitra (Dept. of CSE, IIT Kharagpur, India), F. Peruani(ZIH, Technical University of.
Workshop on Applications of Wireless Communications (WAWC 2008) 21 August 2008, Lappeenranta - Finland CONTROLLING EPIDEMICS IN WIRELESS NETWORKS Ranjan.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
Soon-Hyung Yook, Sungmin Lee, Yup Kim Kyung Hee University NSPCS 08 Unified centrality measure of complex networks: a dynamical approach to a topological.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Yongqin Gao, Greg Madey Computer Science & Engineering Department University of Notre Dame © Copyright 2002~2003 by Serendip Gao, all rights reserved.
Complex Network Theory – An Introduction Niloy Ganguly.
Robustness and Structure of Complex Networks Shuai Shao Boston University, Physics Department A dvisor: Prof. Gene Stanley Co-advisor: Prof. Shlomo Havlin.
Complex Network Theory – An Introduction Niloy Ganguly.
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Project funded by the Future and Emerging Technologies arm of the IST Programme Are Proliferation Techniques more efficient than Random Walk with respect.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Design of a Robust Search Algorithm for P2P Networks
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
On the behaviour of an edge number in a power-law random graph near a critical points E. V. Feklistova, Yu.
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
Random Walk for Similarity Testing in Complex Networks
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Marina Leri Institute of Applied Mathematical Research
Introduction Secondary Users (SUs) Primary Users (PUs)
Effective Social Network Quarantine with Minimal Isolation Costs
Peer-to-Peer and Social Networks Fall 2017
Research Scopes in Complex Network
Department of Computer Science University of York
CASE − Cognitive Agents for Social Environments
Peer-to-Peer Information Systems Week 6: Performance
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Properties and applications of spectra for networks
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
Presentation transcript:

Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Stability analysis of peer to peer networks

Department of Computer Science, IIT Kharagpur, India Use various ideas of complex networks to model large technological networks – peer- to-peer networks. Language modeling Distributed mobile networks Theoretical development of complex network Complex Network Research Group

Department of Computer Science, IIT Kharagpur, India Overlay Management Searching unstructured networks (IFIP Networks, PPSN, HIPC, Sigcomm (poster), PRL (submitted)). Understanding behavior of phonemes. (ACL, EACL, Colling, ACS) Distributed mobile networks (IEEE JSAC (submitted)) Understanding Bi-partite Networks (EPL,PRE(submitted)) Complex Network Research Group

Group Activities Graduate level course – Complex Network Graduate level course – Complex Network Workshops organized at European Conference of Complex Systems Workshops organized at European Conference of Complex Systems Published Book volume named “Dynamics on and of Complex Network” Published Book volume named “Dynamics on and of Complex Network” Collaboration with a number of national and international Institutions/Organizations Collaboration with a number of national and international Institutions/Organizations Projects from government, private companies (DST, DIT, Vodafone, Indo-German, STIC-Asie) Projects from government, private companies (DST, DIT, Vodafone, Indo-German, STIC-Asie)

External Collaborators Technical University Dresden, Germany Technical University Dresden, Germany Telenor, Norway Telenor, Norway CEA, Sacalay, France CEA, Sacalay, France Microsoft Research India, Bangalore Microsoft Research India, Bangalore University of Duke, USA University of Duke, USA

Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Stability analysis of peer to peer networks

Selected Publications Generalized theory for node disruption in finite-size complex networks, Physical Review E, 78, , Stability analysis of peer to peer against churn. Pramana, Journal of physics, Vol. 71, (No.2), August Analyzing the Vulnerability of the Superpeer Networks Against Attack, ACM CCS, 14th ACM Conference on Computer and Communications Security, Alexandria, USA, 29 October - 2 Nov, How stable are large superpeer networks against attack? The Seventh IEEE Conference on Peer-to-Peer Computing, 2007 Brief Abstract - Measuring Robustness of Superpeer Topologies, PODC 2007 Poster - Developing Analytical Framework to Measure Stability of P2P Networks, ACM Sigcomm 2006 Pisa, Italy Department of Computer Science, IIT Kharagpur, India

Peer to peer and overlay network  An overlay network is built on top of physical network  Nodes are connected by virtual or logical links  Underlying physical network becomes unimportant  Interested in the complex graph structure of overlay

Department of Computer Science, IIT Kharagpur, India Dynamicity of overlay networks Peers in the p2p system leave network randomly without any central coordination (peer churn) Important peers are targeted for attack Makes overlay structures highly dynamic in nature Frequently it partitions the network into smaller fragments Communication between peers become impossible

Department of Computer Science, IIT Kharagpur, India Problem definition Investigating stability of the peer to peer networks against the churn and attack Developing an analytical framework for finite as well as infinite size networks Impact of churn and attack upon the network topology Examining the impact of different structural parameters upon stability Size of the network degree of peers, superpeers their individual fractions

Department of Computer Science, IIT Kharagpur, India Steps followed to analyze Modeling of Overlay topologies pure p2p networks, superpeer networks, hybrid networks Various kinds of churn and attacks Computing the topological deformation due to failure and attack Defining stability metric Developing the analytical framework for stability analysis Validation through simulation Understanding the impact of structural parameters

Department of Computer Science, IIT Kharagpur, India Modeling overlay topologies Topologies are modeled by various random graphs characterized by degree distribution p k Fraction of nodes having degree k Examples: Erdos-Renyi graph Scale free network Superpeer networks

Department of Computer Science, IIT Kharagpur, India Modeling overlay topologies: E-R graph, scale free networks Erdos-Renyi graph Degree distribution follows Poisson distribution. Scale free network Degree distribution follows power law distribution Average degree

Department of Computer Science, IIT Kharagpur, India Superpeer network (KaZaA, Skype) - small fraction of nodes are superpeers and rest are peers Modeled using bimodal degree distribution r=fraction of peers k l =peer degree k m =superpeer degree p kl =r p km =(1-r) Modeling: Superpeer networks

Department of Computer Science, IIT Kharagpur, India Modeling: Attack f k probability of removal of a node of degree k after the disrupting event Deterministic attack Nodes having high degrees are progressively removed f k =1 when k>k max 0< f k < 1 when k=k max f k =0 when k<k max Degree dependent attack Nodes having high degrees are likely to be removed Probability of removal of node having degree k is proportional to k γ

Department of Computer Science, IIT Kharagpur, India Deformation of the network due to node removal Removal of a node along with its adjacent links changes the degrees of its neighbors Hence changes the topology of the network Let initial degree distribution of the network be p k Probability of removal of a node having degree k is f k We represent the new degree distribution p k ’ as a function of p k and f k

Deformation of the network due to node removal  In this diagram, left node set denotes the survived nodes (N∑p k (1-f k )) and right node set denotes the removed nodes (N∑p k f k )  The change in the degree distribution is due to the edges removed from the left set  We calculate the number of edges connecting left and right set (E) Department of Computer Science, IIT Kharagpur, India

Deformation of the network due to node removal The total number of tips in the surviving node set is The probability of finding a random tip that is going to be removed is The ‘-1’ signifies that a tip cannot connect to itself. The total number of edges running between two subset Department of Computer Science, IIT Kharagpur, India

Deformation of the network due to node removal Probability of finding an edge in the surviving (left) subset that is connected to a node of removed (right) subset Department of Computer Science, IIT Kharagpur, India

Deformation of the network due to node removal Removal of a node reduces the degree of the survived nodes Node having degree > k becomes a node having degree k by losing one or more edges Probability that a survived node will lose one edge becomes Department of Computer Science, IIT Kharagpur, India

Deformation of the network due to node removal Probability of finding a node having degree k (p k ’) after removal of nodes following f k, depends upon Probability that nodes having degree k, k+1, k+2 … will lose 0, 1, 2, etc edges respectively to become a node having degree k Probability that nodes having degree k, k+1, k+2 … will sustain k number of edges with them Hence Where denotes the fraction of nodes in the survived (left) node set having degree q Department of Computer Science, IIT Kharagpur, India

Deformation of the network due to node removal Department of Computer Science, IIT Kharagpur, India Degree distribution of the Poisson and power law networks after the attack of the form Main figure shows for N=10 5 and inset shows for N=50.

Department of Computer Science, IIT Kharagpur, India Stability Metric: Percolation Threshold Initially all the nodes in the network are connected Forms a single component Size of the giant component is the order of the network size Giant component carries the structural properties of the entire network Nodes in the network are connected and form a single component

Department of Computer Science, IIT Kharagpur, India Stability Metric: Percolation Threshold Initial single connected component f fraction of nodes removed Giant component still exists

Department of Computer Science, IIT Kharagpur, India Stability Metric: Percolation Threshold Initial single connected component f fraction of nodes removed Giant component still exists f c fraction of nodes removed The entire graph breaks into smaller fragments Therefore f c becomes the percolation threshold

Department of Computer Science, IIT Kharagpur, India Percolation threshold Percolation condition of a network having degree distribution p k can be given as After removal of f k fraction of nodes, if the degree distribution of the network becomes pk’, then the condition for percolation becomes Which leads to the following critical condition for percolation

Percolation threshold for finite size network The percolation threshold for random failure in the network of size N where the percolation threshold of infinite network Experimental validation for E-R networks Our equation shows the impact of network size N on the percolation threshold. Department of Computer Science, IIT Kharagpur, India

Percolation threshold for infinite size network In infinite network, the critical condition for percolation reduces to Degree distribution Peer dynamics The critical condition is applicable For any kind of topology (modeled by p k ) Undergoing any kind of dynamics (modeled by 1-q k )

Department of Computer Science, IIT Kharagpur, India Outline of the results Networks under consideration Disrupting events Superpeer networks (Characterized by bimodal degree distribution ) Degree independent failure or random failure Degree dependent failure Degree dependent attack Deterministic attack (special case of degree dependent attack ??)

Department of Computer Science, IIT Kharagpur, India Stability against various failures Degree independent random failure : Percolation threshold Degree dependent random failure : Critical condition for percolation becomes Thus critical fraction of node removed becomes where which satisfies the above equation

Department of Computer Science, IIT Kharagpur, India Stability against random failure For superpeer networks Average degree of the network Superpeer degree Fraction of peers

Department of Computer Science, IIT Kharagpur, India Stability against random failure (superpeer networks) Comparative study between theoretical and experimental results We keep average degree fixed

Department of Computer Science, IIT Kharagpur, India Stability against random failure (superpeer networks) Comparative study between theoretical and experimental results Increase of the fraction of superpeers (specially above 15% to 20%) increases stability of the network

Department of Computer Science, IIT Kharagpur, India Stability against random failure (superpeer networks) Comparative study between theoretical and experimental results There is a sharp fall of f c when fraction of superpeers is less than 5%

Department of Computer Science, IIT Kharagpur, India Stability against degree dependent failure (superpeer networks) In this case, the value of critical exponent which percolates the network Superpeer degree Average degree of the network

Department of Computer Science, IIT Kharagpur, India Stability against deterministic attack Case 1 Removal of a fraction of high degree nodes is sufficient to breakdown the network Percolation threshold Case 2 Removal of all the high degree nodes is not sufficient to breakdown the network. Have to remove a fraction of low degree nodes Percolation threshold

Department of Computer Science, IIT Kharagpur, India Stability against deterministic attack (superpeer networks) Case 1: Removal of a fraction of superpeers is sufficient to breakdown the network Case 2: Removal of all the superpeers is not sufficient to breakdown the network Have to remove a fraction of peers nodes. Fraction of superpeers in the network

Department of Computer Science, IIT Kharagpur, India Stability of superpeer networks against deterministic attack Two different cases may arise Case 1: Removal of a fraction of high degree nodes are sufficient to breakdown the network Case 2: Removal of all the high degree nodes are not sufficient to breakdown the network Have to remove a fraction of low degree nodes  Interesting observation in case 1  Stability decreases with increasing value of peers – counterintuitive

Department of Computer Science, IIT Kharagpur, India Stability of superpeer networks against degree dependent attack Probability of removal of a node is directly proportional to its degree Calculation of normalizing constant C Maximum value = 1 Hence minimum value of This yields an inequality Critical condition

Department of Computer Science, IIT Kharagpur, India Stability of superpeer networks against degree dependent attack Probability of removal of a node is directly proportional to its degree Calculation of normalizing constant C Maximum value = 1 Hence minimum value of The solution set of the above inequality can be either bounded or unbounded

Department of Computer Science, IIT Kharagpur, India Degree dependent attack: Impact of solution set Three situations may arise Removal of all the superpeers along with a fraction of peers – Case 2 of deterministic attack Removal of only a fraction of superpeer – Case 1 of deterministic attack Removal of some fraction of peers and superpeers

Department of Computer Science, IIT Kharagpur, India Degree dependent attack: Impact of solution set Three situations may arise Case 2 of deterministic attack Networks having bounded solution set If, Case 1 of deterministic attack Networks having unbounded solution set If, Degree Dependent attack is a generalized case of deterministic attack

Department of Computer Science, IIT Kharagpur, India Degree dependent attack: Impact of solution set Three situations may arise Case 2 of deterministic attack Networks having bounded solution set If, Case 1 of deterministic attack Networks having unbounded solution set If, Degree Dependent attack is a generalized case of deterministic attack

Department of Computer Science, IIT Kharagpur, India Summarization of the results Network size has a profound impact upon the stability of the network Our theory is capable in capturing both infinite and finite size networks Random failure Drastic fall of the stability when fraction of superpeers is less than 5% In deterministic attack, networks having small peer degrees are very much vulnerable Increase in peer degree improves stability Superpeer degree is less important here! In degree dependent attack, Stability condition provides the critical exponent Amount of peers and superpeers required to be removed is dependent upon

Department of Computer Science, IIT Kharagpur, India Conclusion Contribution of our work Development of general framework to analyze the stability of finite as well as infinite size networks Modeling the dynamic behavior of the peers using degree independent failure as well as attack. Comparative study between theoretical and simulation results to show the effectiveness of our theoretical model. Work in progress Correlated Network, Networks with same assortative coefficient, identify networks with equal robustness

Department of Computer Science, IIT Kharagpur, India Conclusion Contribution of our work Development of general framework to analyze the stability of finite as well as infinite size networks Modeling the dynamic behavior of the peers using degree independent failure as well as attack. Comparative study between theoretical and simulation results to show the effectiveness of our theoretical model. Future work Perform the experiments and analysis on more realistic network

Department of Computer Science, IIT Kharagpur, India Thank you

Department of Computer Science, IIT Kharagpur, India Stability Analysis - Talk overview Introduction and problem definition Modeling peer to peer networks and various kinds of failures and attacks Development of analytical framework for stability analysis Validation of the framework with the help of simulation Impact of network size and other structural parameters upon network vulnerability Conclusion