Where Graph Topology Matters: The Robust Subgraph Problem

Robustness is a critical measure of the resilience of large networked systems, such as transportation and communication networks. Most prior works focus on the global robustness of a given graph at large, e.g., by measuring its overall vulnerability to external attacks or random failures. In this paper, we turn attention to local robustness and pose a novel problem in the lines of subgraph mining: given a large graph, how can we find its most robust local subgraph (RLS)? We define a robust subgraph as a subset of nodes with high communicability among them, and formulate the RLS-PROBLEM of finding a subgraph of given size with maximum robustness in the host graph. Our formulation is related to the recently proposed general framework for the densest subgraph problem, however differs from it substantially in that besides the number of edges in the subgraph, robustness also concerns with the placement of edges, i.e., the subgraph topology. We show that the RLS-PROBLEM is NP-hard and propose two heuristic algorithms based on top-down and bottom-up search strategies. Further, we present modifications of our algorithms to handle three practical variants of the RLS-PROBLEM. Experiments on synthetic and real-world graphs demonstrate that we find subgraphs with larger robustness than the densest subgraphs even at lower densities, suggesting that the existing approaches are not suitable for the new problem setting.

[1]  Fan Chung Graham,et al.  The Average Distance in a Random Graph with Given Expected Degrees , 2004, Internet Math..

[2]  Ernesto Estrada,et al.  Network robustness to targeted attacks. The interplay of expansibility and degree distribution , 2006 .

[3]  R. Linsker,et al.  Improving network robustness by edge modification , 2005 .

[4]  Michalis Faloutsos,et al.  Gelling, and melting, large graphs by edge manipulation , 2012, CIKM.

[5]  Refael Hassin,et al.  Complexity of finding dense subgraphs , 2002, Discret. Appl. Math..

[6]  Lars Engebretsen,et al.  Clique Is Hard To Approximate Within , 2000 .

[7]  Sergiy Butenko,et al.  On the maximum quasi-clique problem , 2013, Discret. Appl. Math..

[8]  Christos Faloutsos,et al.  Fast Robustness Estimation in Large Social Graphs: Communities and Anomaly Detection , 2012, SDM.

[9]  J. Håstad Clique is hard to approximate withinn1−ε , 1999 .

[10]  Charalampos E. Tsourakakis Fast Counting of Triangles in Large Real Networks without Counting: Algorithms and Laws , 2008, 2008 Eighth IEEE International Conference on Data Mining.

[11]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[12]  Hisao Tamaki,et al.  Greedily Finding a Dense Subgraph , 2000, J. Algorithms.

[13]  Robert E. Kooij,et al.  Graph measures and network robustness , 2013, ArXiv.

[14]  Nam P. Nguyen,et al.  On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability , 2013, IEEE/ACM Transactions on Networking.

[15]  Charalampos E. Tsourakakis,et al.  Denser than the densest subgraph: extracting optimal quasi-cliques with quality guarantees , 2013, KDD.

[16]  Hiroyoshi Miwa,et al.  Critical Links Detection to Maintain Small Diameter Against Link Failures , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.

[17]  Mihalis Yannakakis,et al.  How easy is local search? , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[18]  Ernesto Estrada,et al.  Characterization of the folding degree of proteins , 2002, Bioinform..

[19]  Wu Jun,et al.  Natural Connectivity of Complex Networks , 2010 .

[20]  Hanghang Tong,et al.  Make It or Break It: Manipulating Robustness in Large Networks , 2014, SDM.

[21]  Caterina M. Scoglio,et al.  Optimizing algebraic connectivity by edge rewiring , 2013, Appl. Math. Comput..

[22]  Sebastian M. Cioaba,et al.  Spectral Densest Subgraph and Independence Number of a Graph , 2007, J. Univers. Comput. Sci..

[23]  V. N. Bogaevski,et al.  Matrix Perturbation Theory , 1991 .

[24]  Moses Charikar,et al.  Greedy approximation algorithms for finding dense components in a graph , 2000, APPROX.

[25]  Massimo Marchiori,et al.  Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[26]  Michele Benzi,et al.  The Physics of Communicability in Complex Networks , 2011, ArXiv.

[27]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[28]  I. Frisch,et al.  Analysis and Design of Survivable Networks , 1970 .

[29]  Khaled M. F. Elsayed,et al.  Network design methods for mitigation of intentional attacks in scale-free networks , 2012, Telecommun. Syst..

[30]  S. Havlin,et al.  Optimization of robustness of complex networks , 2004, cond-mat/0404331.

[31]  Charu C. Aggarwal,et al.  A Survey of Algorithms for Dense Subgraph Discovery , 2010, Managing and Mining Graph Data.

[32]  Marco Di Summa,et al.  Branch and cut algorithms for detecting critical nodes in undirected graphs , 2012, Computational Optimization and Applications.

[33]  Jian Pei,et al.  On mining cross-graph quasi-cliques , 2005, KDD '05.

[34]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[35]  Michalis Faloutsos,et al.  On power-law relationships of the Internet topology , 1999, SIGCOMM '99.

[36]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[37]  Andrew V. Goldberg,et al.  Finding a Maximum Density Subgraph , 1984 .

[38]  An Zeng,et al.  Enhancing network robustness for malicious attacks , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.

[39]  Hiroki Sayama,et al.  Optimization of robustness and connectivity in complex networks. , 2003, Physical review letters.

[40]  Mauricio G. C. Resende,et al.  Greedy Randomized Adaptive Search Procedures , 1995, J. Glob. Optim..

[41]  Piet Van Mieghem,et al.  Finding critical regions in a network , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[42]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .