Skip to main content
Erschienen in: Data Mining and Knowledge Discovery 5/2016

01.09.2016

Optimizing network robustness by edge rewiring: a general framework

verfasst von: Hau Chan, Leman Akoglu

Erschienen in: Data Mining and Knowledge Discovery | Ausgabe 5/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Spectral measures have long been used to quantify the robustness of real-world graphs. For example, spectral radius (or the principal eigenvalue) is related to the effective spreading rates of dynamic processes (e.g., rumor, disease, information propagation) on graphs. Algebraic connectivity (or the Fiedler value), which is a lower bound on the node and edge connectivity of a graph, captures the “partitionability” of a graph into disjoint components. In this work we address the problem of modifying a given graph’s structure under a given budget so as to maximally improve its robustness, as quantified by spectral measures. We focus on modifications based on degree-preserving edge rewiring, such that the expected load (e.g., airport flight capacity) or physical/hardware requirement (e.g., count of ISP router traffic switches) of nodes remain unchanged. Different from a vast literature of measure-independent heuristic approaches, we propose an algorithm, called EdgeRewire, which optimizes a specific measure of interest directly. Notably, EdgeRewire is general to accommodate six different spectral measures. Experiments on real-world datasets from three different domains (Internet AS-level, P2P, and airport flights graphs) show the effectiveness of our approach, where EdgeRewire produces graphs with both (i) higher robustness, and (ii) higher attack-tolerance over several state-of-the-art methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A spanning tree is a subgraph over all nodes, containing \((n-1)\) edges and no cycles.
 
Literatur
Zurück zum Zitat Akoglu L, McGlohon M, Faloutsos C (2010) Oddball: spotting anomalies in weighted graphs. In: Proceedings of the 14th Pacific-Asia conference on advances in knowledge discovery and data mining—volume Part II, PAKDD’10, pp 410–421 Akoglu L, McGlohon M, Faloutsos C (2010) Oddball: spotting anomalies in weighted graphs. In: Proceedings of the 14th Pacific-Asia conference on advances in knowledge discovery and data mining—volume Part II, PAKDD’10, pp 410–421
Zurück zum Zitat Albert R, Jeong H, Barabasi A-L (2000) Error and attack tolerance of complex networks. Nature 406(6794):378–382CrossRef Albert R, Jeong H, Barabasi A-L (2000) Error and attack tolerance of complex networks. Nature 406(6794):378–382CrossRef
Zurück zum Zitat Baras J, Hovareshti P (2009) Efficient and robust communication topologies for distributed decision making in networked systems. In: Proceedings of the 48th IEEE conference on decision and control, held jointly with the 2009 28th Chinese control conference, CDC/CCC’09, pp 3751–3756 Baras J, Hovareshti P (2009) Efficient and robust communication topologies for distributed decision making in networked systems. In: Proceedings of the 48th IEEE conference on decision and control, held jointly with the 2009 28th Chinese control conference, CDC/CCC’09, pp 3751–3756
Zurück zum Zitat Beygelzimer A, Grinstein G, Linsker R, Rish I (2005) Improving network robustness by edge modification. Phys A Stat Mech Appl 357(3–4):593–612CrossRef Beygelzimer A, Grinstein G, Linsker R, Rish I (2005) Improving network robustness by edge modification. Phys A Stat Mech Appl 357(3–4):593–612CrossRef
Zurück zum Zitat Buekenhout F, Parker M (1998) The number of nets of the regular convex polytopes in dimension \(\le \)4. Discret Math 186(1–3):69–94 Buekenhout F, Parker M (1998) The number of nets of the regular convex polytopes in dimension \(\le \)4. Discret Math 186(1–3):69–94
Zurück zum Zitat Chakrabarti D, Wang Y, Wang C, Leskovec J, Faloutsos C (2008) Epidemic thresholds in real networks. ACM Trans Inf Syst Secur 10(4):1:1–1:26CrossRef Chakrabarti D, Wang Y, Wang C, Leskovec J, Faloutsos C (2008) Epidemic thresholds in real networks. ACM Trans Inf Syst Secur 10(4):1:1–1:26CrossRef
Zurück zum Zitat Chan H, Akoglu L, Tong H (2014) Make it or break it: manipulating robustness in large networks. In: Proceedings of the 2014 SIAM international conference on data mining, SDM’14, pp 325–333 Chan H, Akoglu L, Tong H (2014) Make it or break it: manipulating robustness in large networks. In: Proceedings of the 2014 SIAM international conference on data mining, SDM’14, pp 325–333
Zurück zum Zitat Chan H, Han S, Akoglu L (2015) Where graph topology matters: the robust subgraph problem. In: Proceedings of the 2015 SIAM international conference on data mining, SDM’15, pp 10–18 Chan H, Han S, Akoglu L (2015) Where graph topology matters: the robust subgraph problem. In: Proceedings of the 2015 SIAM international conference on data mining, SDM’15, pp 10–18
Zurück zum Zitat Chandra AK, Raghavan P, Ruzzo WL, Smolensky R (1989) The electrical resistance of a graph captures its commute and cover times. In: Proceedings of the twenty-first annual ACM symposium on theory of computing, STOC ’89, pp 574–586 Chandra AK, Raghavan P, Ruzzo WL, Smolensky R (1989) The electrical resistance of a graph captures its commute and cover times. In: Proceedings of the twenty-first annual ACM symposium on theory of computing, STOC ’89, pp 574–586
Zurück zum Zitat Cvetković DM, Doob M, Sachs H (1980) Spectra of graphs: theory and application. Academic Press, New YorkMATH Cvetković DM, Doob M, Sachs H (1980) Spectra of graphs: theory and application. Academic Press, New YorkMATH
Zurück zum Zitat Costa L da F, Rodrigues F A, Travieso G, Boas P R V (2007) Characterization of complex networks: a survey of measurements. Adv Phys 56:167–242CrossRef Costa L da F, Rodrigues F A, Travieso G, Boas P R V (2007) Characterization of complex networks: a survey of measurements. Adv Phys 56:167–242CrossRef
Zurück zum Zitat Ellens W, Spieksma F, Van Mieghem P, Jamakovic A, Kooij R (2011) Effective graph resistance. Linear Algebra Appl 435(10):2491–2506MathSciNetCrossRefMATH Ellens W, Spieksma F, Van Mieghem P, Jamakovic A, Kooij R (2011) Effective graph resistance. Linear Algebra Appl 435(10):2491–2506MathSciNetCrossRefMATH
Zurück zum Zitat Estrada E (2006) Network robustness to targeted attacks. The interplay of expansibility and degree distribution. Phys J B Complex Syst 52(4):563–574MATH Estrada E (2006) Network robustness to targeted attacks. The interplay of expansibility and degree distribution. Phys J B Complex Syst 52(4):563–574MATH
Zurück zum Zitat Estrada E, Hatano N, Benzi M (2012) The physics of communicability in complex networks. Phys Rep 514(3):89–119MathSciNetCrossRef Estrada E, Hatano N, Benzi M (2012) The physics of communicability in complex networks. Phys Rep 514(3):89–119MathSciNetCrossRef
Zurück zum Zitat Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the internet topology. SIGCOMM Comput Commun Rev 29(4):251–262CrossRefMATH Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the internet topology. SIGCOMM Comput Commun Rev 29(4):251–262CrossRefMATH
Zurück zum Zitat Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65(5):056109CrossRef Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65(5):056109CrossRef
Zurück zum Zitat Jamakovic A, Van Mieghem P (2008) On the robustness of complex networks by using the algebraic connectivity. In: Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet, NETWORKING’08, pp 183–194 Jamakovic A, Van Mieghem P (2008) On the robustness of complex networks by using the algebraic connectivity. In: Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet, NETWORKING’08, pp 183–194
Zurück zum Zitat Latora V, Marchiori M (2007) A measure of centrality based on the network efficiency. New J Phys 9:188CrossRef Latora V, Marchiori M (2007) A measure of centrality based on the network efficiency. New J Phys 9:188CrossRef
Zurück zum Zitat Le LT, Eliassi-Rad T, Tong H (2015) Met: a fast algorithm for minimizing propagation in large graphs with small eigen-gaps. In: Proceedings of the 2015 SIAM international conference on data mining, SDM’15, pp 694–702 Le LT, Eliassi-Rad T, Tong H (2015) Met: a fast algorithm for minimizing propagation in large graphs with small eigen-gaps. In: Proceedings of the 2015 SIAM international conference on data mining, SDM’15, pp 694–702
Zurück zum Zitat Louzada VHP, Daolio F, Herrmann HJ, Tomassini M (2013) Smart rewiring for network robustness. J Complex Netw 1:150–159CrossRef Louzada VHP, Daolio F, Herrmann HJ, Tomassini M (2013) Smart rewiring for network robustness. J Complex Netw 1:150–159CrossRef
Zurück zum Zitat Malliaros FD, Megalooikonomou V, Faloutsos C (2012) Fast robustness estimation in large social graphs: communities and anomaly detection. In: Proceedings of the 2012 SIAM international conference on data mining, SDM’12, pp 942–953 Malliaros FD, Megalooikonomou V, Faloutsos C (2012) Fast robustness estimation in large social graphs: communities and anomaly detection. In: Proceedings of the 2012 SIAM international conference on data mining, SDM’12, pp 942–953
Zurück zum Zitat Matisziw TC, Murray AT (2009) Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure. Comput Oper Res 36(1):16–26CrossRefMATH Matisziw TC, Murray AT (2009) Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure. Comput Oper Res 36(1):16–26CrossRefMATH
Zurück zum Zitat Saha S, Adiga A, Prakash BA, Vullikanti AKS (2015) Approximation algorithms for reducing the spectral radius to control epidemic spread. In: Proceedings of the 2015 SIAM international conference on data mining, SDM’15, pp 568–576 Saha S, Adiga A, Prakash BA, Vullikanti AKS (2015) Approximation algorithms for reducing the spectral radius to control epidemic spread. In: Proceedings of the 2015 SIAM international conference on data mining, SDM’15, pp 568–576
Zurück zum Zitat Scellato S, Leontiadis I, Mascolo C, Basu P, Zafer M (2013) Evaluating temporal robustness of mobile networks. IEEE Trans Mob Comput 12(1):105–117CrossRef Scellato S, Leontiadis I, Mascolo C, Basu P, Zafer M (2013) Evaluating temporal robustness of mobile networks. IEEE Trans Mob Comput 12(1):105–117CrossRef
Zurück zum Zitat Schneider CM, Moreira AA, Andrade JS, Havlin S, Herrmann HJ (2011) Mitigation of malicious attacks on networks. Proc Natl Acad Sci 108(10):3838–3841CrossRef Schneider CM, Moreira AA, Andrade JS, Havlin S, Herrmann HJ (2011) Mitigation of malicious attacks on networks. Proc Natl Acad Sci 108(10):3838–3841CrossRef
Zurück zum Zitat Stewart GW, Sun J-G (1990) Matrix perturbation theory. Academic Press, New YorkMATH Stewart GW, Sun J-G (1990) Matrix perturbation theory. Academic Press, New YorkMATH
Zurück zum Zitat Sun F, Shayman MA (2007) On pairwise connectivity of wireless multihop networks. Int J Netw Secur 2(1/2):37–49CrossRef Sun F, Shayman MA (2007) On pairwise connectivity of wireless multihop networks. Int J Netw Secur 2(1/2):37–49CrossRef
Zurück zum Zitat Sydney A, Scoglio C, Gruenbacher D (2013) Optimizing algebraic connectivity by edge rewiring. Appl Math Comput 219(10):5465–5479MathSciNetMATH Sydney A, Scoglio C, Gruenbacher D (2013) Optimizing algebraic connectivity by edge rewiring. Appl Math Comput 219(10):5465–5479MathSciNetMATH
Zurück zum Zitat Tong H, Prakash BA, Eliassi-Rad T, Faloutsos M, Faloutsos C (2012) Gelling, and melting, large graphs by edge manipulation. In: Proceedings of the 21st ACM international conference on information and knowledge management, CIKM ’12, pp 245–254 Tong H, Prakash BA, Eliassi-Rad T, Faloutsos M, Faloutsos C (2012) Gelling, and melting, large graphs by edge manipulation. In: Proceedings of the 21st ACM international conference on information and knowledge management, CIKM ’12, pp 245–254
Zurück zum Zitat Tong H, Prakash BA, Tsourakakis C, Eliassi-Rad T, Faloutsos C, Chau DH (2010) On the vulnerability of large graphs. In: Proceedings of the 2010 IEEE international conference on data mining, ICDM ’10, pp 1091–1096 Tong H, Prakash BA, Tsourakakis C, Eliassi-Rad T, Faloutsos C, Chau DH (2010) On the vulnerability of large graphs. In: Proceedings of the 2010 IEEE international conference on data mining, ICDM ’10, pp 1091–1096
Zurück zum Zitat Tsourakakis CE (2008) Fast counting of triangles in large real networks without counting: algorithms and laws. In: Proceedings of the 2008 eighth IEEE international conference on data mining, ICDM ’08, pp 608–617 Tsourakakis CE (2008) Fast counting of triangles in large real networks without counting: algorithms and laws. In: Proceedings of the 2008 eighth IEEE international conference on data mining, ICDM ’08, pp 608–617
Zurück zum Zitat Van Mieghem P, Stevanović D, Kuipers F, Li C, van de Bovenkamp R, Liu D, Wang H (2011) Decreasing the spectral radius of a graph by link removals. Phys Rev E 84:016101CrossRef Van Mieghem P, Stevanović D, Kuipers F, Li C, van de Bovenkamp R, Liu D, Wang H (2011) Decreasing the spectral radius of a graph by link removals. Phys Rev E 84:016101CrossRef
Zurück zum Zitat Van Mieghem P, Wang H, Ge X, Tang S, Kuipers FA (2010) Influence of assortativity and degree-preserving rewiring on the spectra of networks. Eur Phys J B 76(4):643–652CrossRefMATH Van Mieghem P, Wang H, Ge X, Tang S, Kuipers FA (2010) Influence of assortativity and degree-preserving rewiring on the spectra of networks. Eur Phys J B 76(4):643–652CrossRefMATH
Zurück zum Zitat Wang H, Van Mieghem P (2008) Algebraic connectivity optimization via link addition. In: Proceedings of the 3rd international conference on bio-inspired models of network, information and computing systems, BIONETICS ’08, pp 22:1–22:8 Wang H, Van Mieghem P (2008) Algebraic connectivity optimization via link addition. In: Proceedings of the 3rd international conference on bio-inspired models of network, information and computing systems, BIONETICS ’08, pp 22:1–22:8
Zurück zum Zitat Wu J, Mauricio B, Tan Y-J, Deng H-Z (2010) Natural connectivity of complex networks. Chin Phys Lett 27(7):078902CrossRef Wu J, Mauricio B, Tan Y-J, Deng H-Z (2010) Natural connectivity of complex networks. Chin Phys Lett 27(7):078902CrossRef
Zurück zum Zitat Zeng A, Liu W (2012) Enhancing network robustness against malicious attacks. Phys Rev E 85:066130CrossRef Zeng A, Liu W (2012) Enhancing network robustness against malicious attacks. Phys Rev E 85:066130CrossRef
Metadaten
Titel
Optimizing network robustness by edge rewiring: a general framework
verfasst von
Hau Chan
Leman Akoglu
Publikationsdatum
01.09.2016
Verlag
Springer US
Erschienen in
Data Mining and Knowledge Discovery / Ausgabe 5/2016
Print ISSN: 1384-5810
Elektronische ISSN: 1573-756X
DOI
https://doi.org/10.1007/s10618-015-0447-5

Weitere Artikel der Ausgabe 5/2016

Data Mining and Knowledge Discovery 5/2016 Zur Ausgabe

Premium Partner