Hiding in Multilayer Networks

Multilayer networks allow for modeling complex relationships, where individuals are embedded in multiple social networks at the same time. Given the ubiquity of such relationships, these networks have been increasingly gaining attention in the literature. This paper presents the first analysis of the robustness of centrality measures against strategic manipulation in multilayer networks. More specifically, we consider an "evader" who strategically chooses which connections to form in a multilayer network in order to obtain a low centrality-based ranking-thereby reducing the chance of being highlighted as a key figure in the network-while ensuring that she remains connected to a certain group of people. We prove that determining an optimal way to "hide" is NP-complete and hard to approximate for most centrality measures considered in our study. Moreover, we empirically evaluate a number of heuristics that the evader can use. Our results suggest that the centrality measures that are functions of the entire network topology are more robust to such a strategic evader than their counterparts which consider each layer separately.

[1]  Tomasz P. Michalak,et al.  On the Construction of Covert Networks , 2017, AAMAS.

[2]  Talal Rahwan,et al.  Attacking Similarity-Based Link Prediction in Social Networks , 2018, AAMAS.

[3]  E. Lazega Introduction : Collegial Phenomenon : The Social Mechanisms of Cooperation Among Peers in a Corporate Law Partnership , 2001 .

[4]  Mason A. Porter,et al.  Multilayer networks , 2013, J. Complex Networks.

[5]  Qi Xuan,et al.  Target Defense Against Link-Prediction-Based Attacks via Evolutionary Perturbations , 2018, IEEE Transactions on Knowledge and Data Engineering.

[6]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[7]  M. A. Beauchamp AN IMPROVED INDEX OF CENTRALITY. , 1965, Behavioral science.

[8]  Victor Asal,et al.  Lethal Connections: The Determinants of Network Connections in the Provisional Irish Republican Army, 1970–1998 , 2014 .

[9]  Barbora Micenková,et al.  Combinatorial Analysis of Multiple Networks , 2013, ArXiv.

[10]  Jian Pei,et al.  A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.

[11]  Krishna P. Gummadi,et al.  You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.

[12]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[13]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[14]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[15]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[16]  Ryan Miller,et al.  Three is The Answer: Combining Relationships to Analyze Multilayered Terrorist Networks , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[17]  Alex Bavelas A Mathematical Model for Group Structures , 1948 .

[18]  A. Arenas,et al.  Mathematical Formulation of Multilayer Networks , 2013, 1307.4977.

[19]  Fabio Celli,et al.  Social Network Data and Practices: The Case of Friendfeed , 2010, SBP.

[20]  Kai Zhou,et al.  How to Hide One’s Relationships from Link Prediction Algorithms , 2019, Scientific Reports.

[21]  R. Kitchin,et al.  The ethics of smart cities and urban science , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[22]  M. E. Shaw Group Structure and the Behavior of Individuals in Small Groups , 1954 .

[23]  Zhiwei Steven Wu,et al.  Private algorithms for the protected in social network search , 2016, Proceedings of the National Academy of Sciences.

[24]  David Zuckerman,et al.  Electronic Colloquium on Computational Complexity, Report No. 100 (2005) Linear Degree Extractors and the Inapproximability of MAX CLIQUE and CHROMATIC NUMBER , 2005 .

[25]  Talal Rahwan,et al.  Hiding individuals and communities in a social network , 2016, Nature Human Behaviour.

[26]  Talal Rahwan,et al.  Strategic Social Network Analysis , 2017, AAAI.