Blocking Adversarial Influence in Social Networks

While social networks are widely used as a media for information diffusion, attackers can also strategically employ analytical tools, such as influence maximization, to maximize the spread of adversarial content through the networks. We investigate the problem of limiting the diffusion of negative information by blocking nodes and edges in the network. We formulate the interaction between the defender and the attacker as a Stackelberg game where the defender first chooses a set of nodes to block and then the attacker selects a set of seeds to spread negative information from. This yields an extremely complex bi-level optimization problem, particularly since even the standard influence measures are difficult to compute. Our approach is to approximate the attacker's problem as the maximum node domination problem. To solve this problem, we first develop a method based on integer programming combined with constraint generation. Next, to improve scalability, we develop an approximate solution method that represents the attacker's problem as an integer program, and then combines relaxation with duality to yield an upper bound on the defender's objective that can be computed using mixed integer linear programming. Finally, we propose an even more scalable heuristic method that prunes nodes from the consideration set based on their degree. Extensive experiments demonstrate the efficacy of our approaches.

[1]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[2]  Masahiro Kimura,et al.  Solving the Contamination Minimization Problem on Networks for the Linear Threshold Model , 2008, PRICAI.

[3]  Zhoujun Li,et al.  Negative Influence Minimizing by Blocking Nodes in Social Networks , 2013, AAAI.

[4]  Jure Leskovec,et al.  Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..

[5]  Hirotaka Ono,et al.  Maximum Domination Problem , 2011, CATS.

[6]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[7]  Stephanie Forrest,et al.  Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[8]  Yifei Yuan,et al.  Scalable Influence Maximization in Social Networks under the Linear Threshold Model , 2010, 2010 IEEE International Conference on Data Mining.

[9]  Le Song,et al.  Scalable diffusion-aware optimization of network topology , 2014, KDD.

[10]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[11]  Yiming Yang,et al.  Introducing the Enron Corpus , 2004, CEAS.

[12]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[13]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[14]  Christos Faloutsos,et al.  Sampling from large graphs , 2006, KDD '06.

[15]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[16]  Yevgeniy Vorobeychik,et al.  Securing interdependent assets , 2012, Autonomous Agents and Multi-Agent Systems.

[17]  Yevgeniy Vorobeychik,et al.  Defending Elections Against Malicious Spread of Misinformation , 2018, AAAI.

[18]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[19]  Masahiro Kimura,et al.  Blocking links to minimize contamination spread in a social network , 2009, TKDD.

[20]  Wei Chen,et al.  Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.

[21]  Li Guo,et al.  Topic-aware Social Influence Minimization , 2015, WWW.

[22]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[23]  Jure Leskovec,et al.  Learning to Discover Social Circles in Ego Networks , 2012, NIPS.

[24]  Christos Faloutsos,et al.  Graph evolution: Densification and shrinking diameters , 2006, TKDD.

[25]  Milind Tambe,et al.  Game-Theoretic Target Selection in Contagion-Based Domains , 2014, Comput. J..

[26]  Milind Tambe,et al.  Bayesian Security Games for Controlling Contagion , 2013, 2013 International Conference on Social Computing.

[27]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[28]  Milind Tambe,et al.  Security Games for Controlling Contagion , 2012, AAAI.

[29]  Wei Chen,et al.  Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.

[30]  Masahiro Kimura,et al.  Minimizing the Spread of Contamination by Blocking Links in a Network , 2008, AAAI.

[31]  Jure Leskovec,et al.  Local Higher-Order Graph Clustering , 2017, KDD.

[32]  Jérôme Kunegis,et al.  KONECT: the Koblenz network collection , 2013, WWW.