FIRST-ORDER BIFURCATION DETECTION FOR DYNAMIC COMPLEX NETWORKS

In this paper, we explore how network centrality and network entropy can be used to identify a bifurcation network event. A bifurcation often occurs when a network undergoes a qualitative change in its structure as a response to internal changes or external signals. In this paper, we show that network centrality allows us to capture important topological properties of dynamic networks. By extracting multiple centrality features from a network for dimensionality reduction, we are able to track the network dynamics underlying an intrinsic low-dimensional manifold. Moreover, we employ von Neumann graph entropy (VNGE) to measure the information divergence between networks over time. In particular, we propose an asymptotically consistent estimator of VNGE so that the cubic complexity of VNGE is reduced to quadratic complexity that scales more gracefully with network size. Finally, the effectiveness of our approaches is demonstrated through a real-life application of cyber intrusion detection.

[1]  J. Crutchfield,et al.  Measures of statistical complexity: Why? , 1998 .

[2]  Alfred O. Hero,et al.  Multi-centrality graph spectral decompositions and their application to cyber intrusion detection , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  S. Severini,et al.  The Laplacian of a Graph as a Density Matrix: A Basic Combinatorial Approach to Separability of Mixed States , 2004, quant-ph/0406165.

[4]  Kwang-Cheng Chen,et al.  Information Epidemics in Complex Networks with Opportunistic Links and Dynamic Topology , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[5]  Xiufen Zou,et al.  Identifying key nodes in multilayer networks based on tensor decomposition. , 2017, Chaos.

[6]  Edwin R. Hancock,et al.  Learning shape-classes using a mixture of tree-unions , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[7]  R. Borchert,et al.  Bifurcation Ratios and the Adaptive Geometry of Trees , 1981, Botanical Gazette.

[8]  Marc Moonen,et al.  Seeing the Bigger Picture: How Nodes Can Learn Their Place Within a Complex Ad Hoc Network Topology , 2013, IEEE Signal Processing Magazine.

[9]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[10]  Alfred O. Hero,et al.  Deep Community Detection , 2014, IEEE Transactions on Signal Processing.

[11]  Peng Sun,et al.  Computation of Minimum Volume Covering Ellipsoids , 2002, Oper. Res..

[12]  Simone Severini,et al.  A note on the von Neumann entropy of random graphs , 2010 .

[13]  P. Rousseeuw,et al.  Minimum volume ellipsoid , 2009 .

[14]  José M. F. Moura,et al.  Big Data Analysis with Signal Processing on Graphs: Representation and processing of massive data sets with irregular structure , 2014, IEEE Signal Processing Magazine.

[15]  Fan Chung,et al.  Spectral Graph Theory , 1996 .

[16]  S. Carpenter,et al.  Early-warning signals for critical transitions , 2009, Nature.

[17]  Gert Sabidussi,et al.  The centrality index of a graph , 1966 .

[18]  Jin Tang,et al.  Graph-Laplacian PCA: Closed-Form Solution and Robustness , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[19]  B. Manly Multivariate Statistical Methods : A Primer , 1986 .

[20]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[21]  Xavier Bresson,et al.  Robust Principal Component Analysis on Graphs , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[22]  Simone Severini,et al.  The von Neumann Entropy of Networks , 2008, 0812.2597.

[23]  G. Bianconi,et al.  Shannon and von Neumann entropy of random networks with heterogeneous expected degree. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[24]  Sabrina L. Spencer,et al.  The Proliferation-Quiescence Decision Is Controlled by a Bifurcation in CDK2 Activity at Mitotic Exit , 2013, Cell.

[25]  Gerald A. Higgins,et al.  Genome Architecture Leads a Bifurcation in Cell Identity , 2017, bioRxiv.

[26]  Edwin R. Hancock,et al.  Graph characterizations from von Neumann entropy , 2012, Pattern Recognit. Lett..

[27]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[28]  Danai Koutra,et al.  Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.

[29]  Christopher S. McGinnis,et al.  Cell population structure prior to bifurcation predicts efficiency of directed differentiation in human induced pluripotent cells , 2017, Proceedings of the National Academy of Sciences.