Weakening Covert Networks by Minimizing Inverse Geodesic Length

We consider the problem of deleting nodes in a covert network to minimize its performance. The inverse geodesic length (IGL) is a well-known and widely used measure of network performance. It equals the sum of the inverse distances of all pairs of vertices. In the MINIGL problem the input is a graph G, a budget k, and a target IGL T, and the question is whether there exists a subset of vertices X with |X| = k, such that the IGL of G - X is at most T. In network analysis, the IGL is often used to evaluate how well heuristics perform in strengthening or weakening a network. In this paper, we undertake a study of the classical and parameterized complexity of the MINIGL problem. The problem is NP-complete even if T = 0 and remains both NP-complete and W[1]-hard for parameter k on bipartite and on split graphs. On the positive side, we design several multivariate algorithms for the problem. Our main result is an algorithm for MINIGL parameterized by twin cover number.

[1]  Michael R. Fellows,et al.  Fundamentals of Parameterized Complexity , 2013 .

[2]  Pim van 't Hof,et al.  On the Computational Complexity of Vertex Integrity and Component Order Connectivity , 2014, Algorithmica.

[3]  John T. Saccoman,et al.  A Survey of Component Order Connectivity Models of Graph Theoretic Networks , 2013 .

[4]  Fedor V. Fomin,et al.  Algorithms Parameterized by Vertex Cover and Modular Width, Through Potential Maximal Cliques , 2014, Algorithmica.

[5]  Yicheng Zhang,et al.  Identifying influential nodes in complex networks , 2012 .

[6]  Rafael Amer,et al.  A connectivity game for graphs , 2004, Math. Methods Oper. Res..

[7]  Hernán A. Makse,et al.  Influence maximization in complex networks through optimal percolation , 2015, Nature.

[8]  John E. Hopcroft,et al.  Complexity of Computer Computations , 1974, IFIP Congress.

[9]  Michael Lampis,et al.  Algorithmic Meta-theorems for Restrictions of Treewidth , 2010, Algorithmica.

[10]  Guofei Gu,et al.  A Taxonomy of Botnet Structures , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[11]  Richard M. Karp,et al.  Reducibility Among Combinatorial Problems , 1972, 50 Years of Integer Programming.

[12]  Albert-László Barabási,et al.  Destruction perfected , 2015, Nature.

[13]  Ivan Belik,et al.  The Analysis of Split Graphs in Social Networks Based on the K-Cardinality Assignment Problem , 2014 .

[14]  John Dunagan,et al.  Active Graph Reachability Reduction for Network Security and Software Engineering , 2011, IJCAI.

[15]  Talal Rahwan,et al.  Strategic Social Network Analysis , 2017, AAAI.

[16]  Robert Ganian,et al.  Improving Vertex Cover as a Graph Parameter , 2015, Discret. Math. Theor. Comput. Sci..

[17]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[18]  Robert Ganian,et al.  Using Neighborhood Diversity to Solve Hard Problems , 2012, ArXiv.

[19]  Reinhard Diestel,et al.  Graph Theory , 1997 .

[20]  Talal Rahwan,et al.  Efficient algorithms for game-theoretic betweenness centrality , 2016, Artif. Intell..

[21]  Nicholas R. Jennings,et al.  Computational Analysis of Connectivity Games with Applications to the Investigation of Terrorist Networks , 2013, IJCAI.

[22]  E. Griffor,et al.  Computational Complexity Theory , 2022 .

[23]  L. Christophorou Science , 2018, Emerging Dynamics: Science, Energy, Society and Values.

[24]  Leizhen Cai,et al.  Parameterized Complexity of Cardinality Constrained Optimization Problems , 2008, Comput. J..

[25]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[26]  R. Rosenfeld Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[27]  Herbert Hamers,et al.  Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda , 2013, Eur. J. Oper. Res..

[28]  K. Brown,et al.  Graduate Texts in Mathematics , 1982 .

[29]  Mikkel Thorup,et al.  Undirected single-source shortest paths with positive integer weights in linear time , 1999, JACM.

[30]  Michal Pilipczuk,et al.  Parameterized Algorithms , 2015, Springer International Publishing.

[31]  Kathleen M. Carley,et al.  Destabilizing Terrorist Networks , 1998 .

[32]  Michael R. Fellows,et al.  Graph Layout Problems Parameterized by Vertex Cover , 2008, ISAAC.

[33]  Ge Xia,et al.  Improved upper bounds for vertex cover , 2010, Theor. Comput. Sci..

[34]  Oskar Skibski,et al.  Defeating Terrorist Networks with Game Theory , 2015, IEEE Intelligent Systems.