Optimizing Graph Structure for Targeted Diffusion

The problem of diffusion control on networks has been extensively studied, with applications ranging from marketing to controlling infectious disease. However, in many applications, such as cybersecurity, an attacker may want to attack a targeted subgraph of a network, while limiting the impact on the rest of the network in order to remain undetected. We present a model POTION in which the principal aim is to optimize graph structure to achieve such targeted attacks. We propose an algorithm POTION-ALG for solving the model at scale, using a gradient-based approach that leverages Rayleigh quotients and pseudospectrum theory. In addition, we present a condition for certifying that a targeted subgraph is immune to such attacks. Finally, we demonstrate the effectiveness of our approach through experiments on real and synthetic networks.

[1]  Yang Yang,et al.  Small vulnerable sets determine large network cascades in power grids , 2017, Science.

[2]  Yevgeniy Vorobeychik,et al.  Data-driven agent-based modeling, with application to rooftop solar adoption , 2015, Autonomous Agents and Multi-Agent Systems.

[3]  Konstantin Avrachenkov,et al.  The Effect of New Links on Google Pagerank , 2006 .

[4]  Cedric E. Ginestet,et al.  Cognitive relevance of the community structure of the human brain functional coactivation network , 2013, Proceedings of the National Academy of Sciences.

[5]  L. Trefethen,et al.  Numerical linear algebra , 1997 .

[6]  Gene H. Golub,et al.  Matrix computations , 1983 .

[7]  Christos Faloutsos,et al.  Node Immunization on Large Graphs: Theory and Algorithms , 2016, IEEE Transactions on Knowledge and Data Engineering.

[8]  Christos Faloutsos,et al.  Patterns of Cascading Behavior in Large Blog Graphs , 2007, SDM.

[9]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[10]  N. Ling The Mathematical Theory of Infectious Diseases and its applications , 1978 .

[11]  Michael Unser,et al.  Hessian Schatten-Norm Regularization for Linear Inverse Problems , 2012, IEEE Transactions on Image Processing.

[12]  Ariel D. Procaccia,et al.  Monitoring Stealthy Diffusion , 2015, ICDM.

[13]  L. Trefethen,et al.  Spectra and pseudospectra : the behavior of nonnormal matrices and operators , 2005 .

[14]  Sudip Saha,et al.  Approximation Algorithms for Reducing the Spectral Radius to Control Epidemic Spread , 2015, SDM.

[15]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[16]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[17]  Adilson E Motter,et al.  Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[18]  Christos Faloutsos,et al.  Epidemic thresholds in real networks , 2008, TSEC.

[19]  Michalis Faloutsos,et al.  Gelling, and melting, large graphs by edge manipulation , 2012, CIKM.

[20]  Jure Leskovec,et al.  Meme-tracking and the dynamics of the news cycle , 2009, KDD.

[21]  Hernán A. Makse,et al.  Influence maximization in complex networks through optimal percolation , 2015, Nature.

[22]  Ambuj K. Singh,et al.  Fighting Opinion Control in Social Networks via Link Recommendation , 2019, KDD.

[23]  P. Van Mieghem,et al.  Virus Spread in Networks , 2009, IEEE/ACM Transactions on Networking.

[24]  Yevgeniy Vorobeychik,et al.  Inducing Equilibria in Networked Public Goods Games through Network Structure Modification , 2020, AAMAS.

[25]  Hanghang Tong,et al.  MET: A Fast Algorithm for Minimizing Propagation in Large Graphs with Small Eigen-Gaps , 2015, SDM.

[26]  Chinwendu Enyioha,et al.  Optimal vaccine allocation to control epidemic outbreaks in arbitrary networks , 2013, 52nd IEEE Conference on Decision and Control.

[27]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[28]  Ernesto Estrada,et al.  ‘Hubs-repelling’ Laplacian and related diffusion on graphs/networks , 2020 .

[29]  Christos Faloutsos,et al.  Graph evolution: Densification and shrinking diameters , 2006, TKDD.

[30]  José J. Ramasco,et al.  Systemic delay propagation in the US airport network , 2013, Scientific Reports.

[31]  Zhihui Wang,et al.  Dynamic Targeting in Cancer Treatment , 2019, Front. Physiol..

[32]  Michalis Faloutsos,et al.  Threshold conditions for arbitrary cascade models on arbitrary networks , 2011, 2011 IEEE 11th International Conference on Data Mining.

[33]  Piet Van Mieghem,et al.  Epidemic processes in complex networks , 2014, ArXiv.

[34]  Hanghang Tong,et al.  Node Immunization with Non-backtracking Eigenvalues , 2020, ArXiv.

[35]  D. Stevanović,et al.  Decreasing the spectral radius of a graph by link removals. , 2011, Physical review. E, Statistical, nonlinear, and soft matter physics.