Time-Efficient Network Monitoring Through Confined Search and Adaptive Evaluation

The network monitoring problem, crucial to many applications from outbreak prevention to online rumor management, demands an optimal set of monitors to detect the spreading of infections or rumors over a network. We tackle this problem through solving a type of facility location problem where the monitored nodes are selected to minimize their distance to other nodes. Existing methods for this problem either consume prohibitively long time for large networks, lack of reasonable theoretical performance guarantees, or are very difficult to implement. We propose a new algorithm, \(\mathsf {csav}\), which combines a novel technique to reduce the search space with an iterative improvement mechanism. Our algorithm outputs a logarithmic number of monitors in \(\tilde{O}(|E|)\) time. We perform empirical analysis over both synthesized and real-world networks as well as three propagation models. The results show that \(\mathsf {csav}\) achieves superior performance over a number of benchmark algorithms. In particular, it produces outputs that are comparable to the well-established local search at only a fraction of its running time. Our approach is hence a scalable and time-efficient method for the network monitoring problem.

[1]  Yicheng Zhang,et al.  Identifying influential nodes in complex networks , 2012 .

[2]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[3]  Kevin A. Kwiat,et al.  Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[4]  Kamesh Munagala,et al.  Local Search Heuristics for k-Median and Facility Location Problems , 2004, SIAM J. Comput..

[5]  Yamir Moreno,et al.  Theory of Rumour Spreading in Complex Social Networks , 2007, ArXiv.

[6]  Ravishankar Krishnaswamy,et al.  Relax, No Need to Round: Integrality of Clustering Formulations , 2014, ITCS.

[7]  O. Kariv,et al.  An Algorithmic Approach to Network Location Problems. II: The p-Medians , 1979 .

[8]  David P. Williamson,et al.  An Experimental Evaluation of Incremental and Hierarchical k-Median Algorithms , 2011, SEA.

[9]  Bo Yan,et al.  Dynamic Relationship Building: Exploitation Versus Exploration on a Social Network , 2017, WISE.

[10]  Donald F. Towsley,et al.  Monitoring and early warning for internet worms , 2003, CCS '03.

[11]  Sudipto Guha,et al.  A constant-factor approximation algorithm for the k-median problem (extended abstract) , 1999, STOC '99.

[12]  Sudipto Guha,et al.  A constant-factor approximation algorithm for the k-median problem (extended abstract) , 1999, STOC '99.

[13]  Mikkel Thorup,et al.  Quick k-Median, k-Center, and Facility Location for Sparse Graphs , 2001, SIAM J. Comput..

[14]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[15]  Shi Li,et al.  A Dependent LP-Rounding Approach for the k-Median Problem , 2012, ICALP.

[16]  Jiamou Liu,et al.  How to Build Your Network? A Structural Analysis , 2016, IJCAI.

[17]  Milind Tambe,et al.  Security Games for Controlling Contagion , 2012, AAAI.

[18]  E. N. Gilbert,et al.  Random Plane Networks , 1961 .

[19]  Paulo Shakarian,et al.  Finding Near-Optimal Groups of Epidemic Spreaders in a Complex Network , 2014, PloS one.

[20]  Evangelos Markakis,et al.  Greedy facility location algorithms analyzed using dual fitting with factor-revealing LP , 2002, JACM.

[21]  Milind Tambe,et al.  Bayesian Security Games for Controlling Contagion , 2013, 2013 International Conference on Social Computing.