Network Resilience and the Length-Bounded Multicut Problem

Motivated by networked systems in which the functionality of the network depends on vertices in the network being within a bounded distance T of each other, we study the length-bounded multicut problem: given a set of pairs, find a minimum-size set of edges whose removal ensures the distance between each pair exceeds T. We introduce the first algorithms for this problem capable of scaling to massive networks with billions of edges and nodes: three highly scalable algorithms with worst-case performance ratios. Furthermore, one of our algorithms is fully dynamic, capable of updating its solution upon incremental vertex / edge additions or removals from the network while maintaining its performance ratio. Finally, we show that unless NP ⊆ BPP, there is no polynomial-time, approximation algorithm with performance ratio better than $Ømega (T)$, which matches the ratio of our dynamic algorithm up to a constant factor.

[1]  Euiwoong Lee Improved Hardness for Cut, Interdiction, and Firefighter Problems , 2017, ICALP.

[2]  Nam P. Nguyen,et al.  A Graph-Theoretic QoS-Aware Vulnerability Assessment for Network Topologies , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[3]  My T. Thai,et al.  Pseudo-Separation for Assessment of Structural Vulnerability of a Network , 2017, SIGMETRICS.

[4]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[5]  Arunabha Sen,et al.  Region-based connectivity - a new paradigm for design of fault-tolerant networks , 2009, 2009 International Conference on High Performance Switching and Routing.

[6]  Venkatesan Guruswami,et al.  Inapproximability of Feedback Vertex Set for Bounded Length Cycles , 2014, Electron. Colloquium Comput. Complex..

[7]  Gunnar Prytz,et al.  QoS in switched Industrial Ethernet , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.

[8]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[9]  Dániel Marx,et al.  Parameterized Complexity and Approximation Algorithms , 2008, Comput. J..

[10]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[11]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[12]  Petr A. Golovach,et al.  Paths of bounded length and their cuts: Parameterized complexity and algorithms , 2009, Discret. Optim..

[13]  Mihalis Yannakakis,et al.  Approximate Max-Flow Min-(Multi)Cut Theorems and Their Applications , 1996, SIAM J. Comput..

[14]  A. K. Mittal,et al.  The k most vital arcs in the shortest path problem , 1990 .

[15]  Alan T. Murray,et al.  Comparative Approaches for Assessing Network Vulnerability , 2008 .

[16]  Xiaoyan Hong,et al.  Landmark routing in large wireless battlefield networks using UAVs , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[17]  Vijitha Weerackody,et al.  Free-Space Optical Communications for Next-generation Military Networks , 2006, IEEE Communications Magazine.

[18]  Vijay V. Vazirani,et al.  Approximation Algorithms , 2001, Springer Berlin Heidelberg.

[19]  Anupam Gupta Improved results for directed multicut , 2003, SODA '03.

[20]  Laurence T. Yang,et al.  An Incremental CFS Algorithm for Clustering Large Data in Industrial Internet of Things , 2017, IEEE Transactions on Industrial Informatics.

[21]  Nils J. Nilsson,et al.  A Formal Basis for the Heuristic Determination of Minimum Cost Paths , 1968, IEEE Trans. Syst. Sci. Cybern..

[22]  Christos Faloutsos,et al.  Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.

[23]  Noga Alon,et al.  Improved approximation for directed cut problems , 2007, STOC '07.

[24]  Pavel Dvorák,et al.  Parameterized Complexity of Length-bounded Cuts and Multicuts , 2015, Algorithmica.

[25]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[26]  Yuichi Yoshida,et al.  A Generalization of Submodular Cover via the Diminishing Return Property on the Integer Lattice , 2015, NIPS.

[27]  Thomas Brinkhoff,et al.  Generating network-based moving objects , 2000, Proceedings. 12th International Conference on Scientific and Statistica Database Management.

[28]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[29]  Thomas Erlebach,et al.  Length-bounded cuts and flows , 2006, TALG.

[30]  Dirk P. Kroese,et al.  Estimating the Number of s-t Paths in a Graph , 2007, J. Graph Algorithms Appl..

[31]  Panos M. Pardalos,et al.  Greedy approximations for minimum submodular cover with submodular cost , 2010, Comput. Optim. Appl..

[32]  Michael Sipser,et al.  Introduction to the Theory of Computation , 1996, SIGA.

[33]  Arunabha Sen,et al.  Finding a Path Subject to Many Additive QoS Constraints , 2007, IEEE/ACM Transactions on Networking.

[34]  Takahiro Hara,et al.  A survey on communication and data management issues in mobile sensor networks , 2014, Wirel. Commun. Mob. Comput..

[35]  Irene Casas,et al.  Role of Spatial Data in the Protection of Critical Infrastructure and Homeland Defense , 2010, Applied Spatial Analysis and Policy.