3,607 research outputs found
Network Interdiction Using Adversarial Traffic Flows
Traditional network interdiction refers to the problem of an interdictor
trying to reduce the throughput of network users by removing network edges. In
this paper, we propose a new paradigm for network interdiction that models
scenarios, such as stealth DoS attack, where the interdiction is performed
through injecting adversarial traffic flows. Under this paradigm, we first
study the deterministic flow interdiction problem, where the interdictor has
perfect knowledge of the operation of network users. We show that the problem
is highly inapproximable on general networks and is NP-hard even when the
network is acyclic. We then propose an algorithm that achieves a logarithmic
approximation ratio and quasi-polynomial time complexity for acyclic networks
through harnessing the submodularity of the problem. Next, we investigate the
robust flow interdiction problem, which adopts the robust optimization
framework to capture the case where definitive knowledge of the operation of
network users is not available. We design an approximation framework that
integrates the aforementioned algorithm, yielding a quasi-polynomial time
procedure with poly-logarithmic approximation ratio for the more challenging
robust flow interdiction. Finally, we evaluate the performance of the proposed
algorithms through simulations, showing that they can be efficiently
implemented and yield near-optimal solutions
A New Framework for Network Disruption
Traditional network disruption approaches focus on disconnecting or
lengthening paths in the network. We present a new framework for network
disruption that attempts to reroute flow through critical vertices via vertex
deletion, under the assumption that this will render those vertices vulnerable
to future attacks. We define the load on a critical vertex to be the number of
paths in the network that must flow through the vertex. We present
graph-theoretic and computational techniques to maximize this load, firstly by
removing either a single vertex from the network, secondly by removing a subset
of vertices.Comment: Submitted for peer review on September 13, 201
Timely Data Delivery in a Realistic Bus Network
Abstract—WiFi-enabled buses and stops may form the backbone of a metropolitan delay tolerant network, that exploits nearby communications, temporary storage at stops, and predictable bus mobility to deliver non-real time information. This paper studies the problem of how to route data from its source to its destination in order to maximize the delivery probability by a given deadline. We assume to know the bus schedule, but we take into account that randomness, due to road traffic conditions or passengers boarding and alighting, affects bus mobility. We propose a simple stochastic model for bus arrivals at stops, supported by a study of real-life traces collected in a large urban network. A succinct graph representation of this model allows us to devise an optimal (under our model) single-copy routing algorithm and then extend it to cases where several copies of the same data are permitted. Through an extensive simulation study, we compare the optimal routing algorithm with three other approaches: minimizing the expected traversal time over our graph, minimizing the number of hops a packet can travel, and a recently-proposed heuristic based on bus frequencies. Our optimal algorithm outperforms all of them, but most of the times it essentially reduces to minimizing the expected traversal time. For values of deadlines close to the expected delivery time, the multi-copy extension requires only 10 copies to reach almost the performance of the costly flooding approach. I
Enhancing community detection using a network weighting strategy
A community within a network is a group of vertices densely connected to each
other but less connected to the vertices outside. The problem of detecting
communities in large networks plays a key role in a wide range of research
areas, e.g. Computer Science, Biology and Sociology. Most of the existing
algorithms to find communities count on the topological features of the network
and often do not scale well on large, real-life instances.
In this article we propose a strategy to enhance existing community detection
algorithms by adding a pre-processing step in which edges are weighted
according to their centrality w.r.t. the network topology. In our approach, the
centrality of an edge reflects its contribute to making arbitrary graph
tranversals, i.e., spreading messages over the network, as short as possible.
Our strategy is able to effectively complements information about network
topology and it can be used as an additional tool to enhance community
detection. The computation of edge centralities is carried out by performing
multiple random walks of bounded length on the network. Our method makes the
computation of edge centralities feasible also on large-scale networks. It has
been tested in conjunction with three state-of-the-art community detection
algorithms, namely the Louvain method, COPRA and OSLOM. Experimental results
show that our method raises the accuracy of existing algorithms both on
synthetic and real-life datasets.Comment: 28 pages, 2 figure
- …