Growth Power Law for Time Evolving Networks

3rd International Conference on the Dynamics of Information Systems (DIS-2011)
Exploiting Power-Law Distribution
on Complex Network Vulnerability
Yilin Shen and My T. Thai
Department of Computer Information Science and Engineering
University of Florida
1
Outline
 Introduction
 Power-law Networks (PLN)
 Representative Applications on Network Vulnerability
 The Hardness of Vulnerability Problems on PLN
 Formal Problem Definitions (CDP & CNDP)
 NP-Hardness and Imapproximability
 Approximation Algorithm of CDP
 The Behavior of Power-Law Networks under
Failures and Attacks
 Robust under Random Failures
 Vulnerable under Men-made Attacks
2
Outline
 Introduction
 Power-law Networks (PLN)
 Representative Applications on Network Vulnerability
 The Hardness of Vulnerability Problems on PLN
 Formal Problem Definitions (CDP & CNDP)
 NP-Hardness and Imapproximability
 Approximation Algorithm of CDP
 The Behavior of Power-Law Networks under
Failures and Attacks
 Robust under Random Failures
 Vulnerable under Men-made Attacks
3
Power-Law Networks
Main Property:
The number of nodes having k
connections is proportional to
k-β
β is a parameter whose value is
typically in the range 2 < β < 3
Many Low Degree Nodes
Few High Degree Nodes
Internet in December 1998
http://cs.stanford.edu/people/jure/pubs/powergrowth-kdd05.ppt
4
More Real Network Examples
http://www.mslima.com/mfadt/thesis/2004/08/transportation-routes.html
Continental Airlines Air Route: Most destination maps of airline
companies offer an interesting case of a power-law network.
5
Outline
 Introduction
 Power-law Networks (PLN)
 Representative Applications on Network Vulnerability
 The Hardness of Vulnerability Problems on PLN
 Formal Problem Definitions (CDP & CNDP)
 NP-Hardness and Imapproximability
 Approximation Algorithm of CDP
 The Behavior of Power-Law Networks under
Failures and Attacks
 Robust under Random Failures
 Vulnerable under Men-made Attacks
6
Application 1: Cognitive Disruption
on Complex Networks
Koobface: A
Facebook Worm
http://www.pdastreet.com/articles/2007/11/2007-11-12-Review-Facebook-for.html
http://annarborchronicle.com/2009/01/30/geeks-gather-make-stuff/
7
Application 2: The Discovery of Critical
Nodes/Commanders in Adversarial Networks
Terrorist Network by Krebs
http://vlado.fmf.uni-lj.si/pub/networks/doc/Seminar/Krebs.pdf
8
 How can we fragment these adversarial
networks?
 Can we fragment the network by destroying only a
limited subset of critical nodes?
Most vulnerability related problems
will be much easier to solve when the
network has power-law distribution?
Not Really !!!
9
Outline
 Introduction
 Power-law Networks (PLN)
 Representative Applications on Network Vulnerability
 The Hardness of Vulnerability Problems on PLN
 Formal Problem Definitions (CDP & CNDP)
 NP-Hardness and Imapproximability
 Approximation Algorithm of CDP
 The Behavior of Power-Law Networks under
Failures and Attacks
 Robust under Random Failures
 Vulnerable under Men-made Attacks
10
Formal Definitions
 Cognitive Disruption Problem (CDP)
Given a power-law graph G = (V,E) and a set of constant 0 < ci ≤1,
the problem is to minimize the size of influence nodes D ⊆ V such
that for each node vi ∈ V \ D, |D ∩ N(vi)| ≥ ci N(vi) in d rounds.
 Critical Node Disruptor Problem (CNDP)
Given an integer k and a power-law graph G=(V,E), the problem is
to find out a size bounded subset of critical nodes S ⊂ V , i.e. |S| ≤ k,
whose removal minimizes the number of connected node-pairs.
11
Outline
 Introduction
 Power-law Networks (PLN)
 Representative Applications on Network Vulnerability
 The Hardness of Vulnerability Problems on PLN
 Formal Problem Definitions (CDP & CNDP)
 NP-Hardness and Imapproximability
 Approximation Algorithm of CDP
 The Behavior of Power-Law Networks under
Failures and Attacks
 Robust under Random Failures
 Vulnerable under Men-made Attacks
12
NP-Hardness of CDP
Theorem 1. CDP is NP-hard on power-law graphs.
Proof: The idea is to reduce CDP from vertex cover on dbounded graphs.
PowerLaw
Graph
13
NP-Hardness of CNDP
Theorem 2. CNDP is NP-hard on power-law graphs.
Proof: The idea is to reduce CNDP from vertex cover on
general graphs.
Bipartite Graph
(Ferrante 08’)
v1
v2
u1
u2
v1
x2
y2
v2
v4
u4
……
v4
…
v3
v5
y1
……
v3
x1
xm
u3
yn
Power-Law
Graph
v5
u5
14
Does the power-law distribution impact
the network vulnerability?
Intuitively, the answer should be “yes” !
We prove it by showing better
inapproximability factors on CDP !
15
Inapproximability Factors
Theorem 3. CDP is UG-hard to be approximated into
on power-law graphs.
The basic idea in proof is to use the reduction we
showed in the proof of NP-hardness on CDP.
-Completeness:
16
-Soundness:
The inequality holds since the function
is monotonously decreasing when f (x) > 0 for any x.
17
Outline
 Introduction
 Power-law Networks (PLN)
 Representative Applications on Network Vulnerability
 The Hardness of Vulnerability Problems on PLN
 Formal Problem Definitions (CDP & CNDP)
 NP-Hardness and Imapproximability
 Approximation Algorithm of CDP
 The Behavior of Power-Law Networks under
Failures and Attacks
 Robust under Random Failures
 Vulnerable under Men-made Attacks
18
Approximation Algorithm for CDP
 Can we devise an approximation algorithm for
CDP?
 Which algorithm will work?
 Why does the algorithm work?
…
Simple greedy algorithm will work !
19
Greedy Algorithm
v1
v2
v3
v1
v2
v3
v4
v5
v6
v4
v5
v6
v1
v2
v3
v4
v5
v6
v7
v7
v7
20
Main Theorem
Theorem 4. When d=1, CDP
can be approximated into
1/(1-λ) with probability at
least
Much better than
the ratio O(log n) in
general graphs
Power-Law Network is more vulnerable !
The seed nodes to inject false information are easier to find.
21
Outline
 Introduction
 Power-law Networks (PLN)
 Representative Applications on Network Vulnerability
 The Hardness of Vulnerability Problems on PLN
 Formal Problem Definitions (CDP & CNDP)
 NP-Hardness and Imapproximability
 Approximation Algorithm of CDP
 The Behavior of Power-Law Networks under
Failures and Attacks
 Robust under Random Failures
 Vulnerable under Men-made Attacks
22
The Behavior of Power-Law Networks
under Failures and Attacks
 Are power-law networks vulnerable in any
cases?
 If so, why do most real networks still follow
power-law distribution?
 What is the advantage?
…
23
Outline
 Introduction
 Power-law Networks (PLN)
 Representative Applications on Network Vulnerability
 The Hardness of Vulnerability Problems on PLN
 Formal Problem Definitions (CDP & CNDP)
 NP-Hardness and Imapproximability
 Approximation Algorithm of CDP
 The Behavior of Power-Law Networks under
Failures and Attacks
 Robust under Random Failures
 Vulnerable under Men-made Attacks
24
Random Failures
Are the power-law networks also vulnerable
under the uniform failures?
25
Random Failures (Cont.)
 The power-law networks are
extremely robust even when
the failure probability is
unrealistically large
 Even though PLN is
affected, the number of
node-pairs after failure is
close to original PLN
 Smaller β is better
26
The Basic Idea in Proof
How to find the number of nodepairs when there is Q<0?
27
The Basic Idea in Proof (Cont.)
 We use the Branching Process Method
 Use Azuma’s martingale inequality
28
Outline
 Introduction
 Power-law Networks (PLN)
 Representative Applications on Network Vulnerability
 The Hardness of Vulnerability Problems on PLN
 Formal Problem Definitions (CDP & CNDP)
 NP-Hardness and Imapproximability
 Approximation Algorithm of CDP
 The Behavior of Power-Law Networks under
Failures and Attacks
 Robust under Random Failures
 Vulnerable under Men-made Attacks
29
Man-made Attacks
 Preferential Attacks
 Nodes of high degrees are more likely to be attacked
 Centrality Attacks
 Intruders attack the centrality nodes intentionally
 degree-centrality, betweenness centrality …
Power-Law Networks are vulnerable
under man-made attacks !
30
Preferential Attacks
 How many expected number of failure nodes
can destroy the power-law networks?
 How will the intruders attack various nodes?
A node of degree i is attacked with probability pi
31
Preferential Attacks (Cont.)
 Power-Law Networks will not
be affected only when under
around expected 13% of
nodes are attacked
 Smaller β is better
32
Centrality Attacks
 Nodes of high degrees are intentional attacked !
 Power-Law Networks will not
be affected only when under
5% of degree-centrality nodes
are attacked
 Smaller β is better
33
Conclusions
 Vulnerability Problems on Power-Law Networks
 Most vulnerability problems remains NP-hard
 Much easier to find near-optimal solutions
(The inapproximability ratio is much lower)
 Behaviors of Power-Law Networks under
Failures and Attacks
 Robust under random failures
 Vulnerable under man-made attacks
 The smaller the exponential factor the better
34
Questions?
35
Thank you !
36