14,558 research outputs found
Benchmarking Measures of Network Influence
Identifying key agents for the transmission of diseases (ideas, technology,
etc.) across social networks has predominantly relied on measures of centrality
on a static base network or a temporally flattened graph of agent interactions.
Various measures have been proposed as the best trackers of influence, such as
degree centrality, betweenness, and -shell, depending on the structure of
the connectivity. We consider SIR and SIS propagation dynamics on a
temporally-extruded network of observed interactions and measure the
conditional marginal spread as the change in the magnitude of the infection
given the removal of each agent at each time: its temporal knockout (TKO)
score. We argue that the exhaustive approach of the TKO score makes it an
effective benchmark measure for evaluating the accuracy of other, often more
practical, measures of influence. We find that none of the common network
measures applied to the induced flat graphs are accurate predictors of network
propagation influence on the systems studied; however, temporal networks and
the TKO measure provide the requisite targets for the hunt for effective
predictive measures
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph
As the security landscape evolves over time, where thousands of species of
malicious codes are seen every day, antivirus vendors strive to detect and
classify malware families for efficient and effective responses against malware
campaigns. To enrich this effort, and by capitalizing on ideas from the social
network analysis domain, we build a tool that can help classify malware
families using features driven from the graph structure of their system calls.
To achieve that, we first construct a system call graph that consists of system
calls found in the execution of the individual malware families. To explore
distinguishing features of various malware species, we study social network
properties as applied to the call graph, including the degree distribution,
degree centrality, average distance, clustering coefficient, network density,
and component ratio. We utilize features driven from those properties to build
a classifier for malware families. Our experimental results show that
influence-based graph metrics such as the degree centrality are effective for
classifying malware, whereas the general structural metrics of malware are less
effective for classifying malware. Our experiments demonstrate that the
proposed system performs well in detecting and classifying malware families
within each malware class with accuracy greater than 96%.Comment: Mathematical Problems in Engineering, Vol 201
Structure of Heterogeneous Networks
Heterogeneous networks play a key role in the evolution of communities and
the decisions individuals make. These networks link different types of
entities, for example, people and the events they attend. Network analysis
algorithms usually project such networks unto simple graphs composed of
entities of a single type. In the process, they conflate relations between
entities of different types and loose important structural information. We
develop a mathematical framework that can be used to compactly represent and
analyze heterogeneous networks that combine multiple entity and link types. We
generalize Bonacich centrality, which measures connectivity between nodes by
the number of paths between them, to heterogeneous networks and use this
measure to study network structure. Specifically, we extend the popular
modularity-maximization method for community detection to use this centrality
metric. We also rank nodes based on their connectivity to other nodes. One
advantage of this centrality metric is that it has a tunable parameter we can
use to set the length scale of interactions. By studying how rankings change
with this parameter allows us to identify important nodes in the network. We
apply the proposed method to analyze the structure of several heterogeneous
networks. We show that exploiting additional sources of evidence corresponding
to links between, as well as among, different entity types yields new insights
into network structure
- …