On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

The Average Case Complexity of Counting Distinct Elements David Woodruff IBM Almaden.
Lower Bounds for Additive Spanners, Emulators, and More David P. Woodruff MIT and Tsinghua University To appear in FOCS, 2006.
Why Simple Hash Functions Work : Exploiting the Entropy in a Data Stream Michael Mitzenmacher Salil Vadhan And improvements with Kai-Min Chung.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Jennifer Tour Chayes Joint work with N. Berger, C. Borgs, A. Ganesh, A. Saberi, D. B. Wilson Controlling the Spread of Viruses on Power-Law Networks.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
On the Density of a Graph and its Blowup Raphael Yuster Joint work with Asaf Shapira.
DYNAMICS OF RANDOM BOOLEAN NETWORKS James F. Lynch Clarkson University.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Gibbs sampler - simple properties It’s not hard to show that this MC chain is aperiodic. Often is reversible distribution. If in addition the chain is.
Week 5 - Models of Complex Networks I Dr. Anthony Bonato Ryerson University AM8002 Fall 2014.
Maximizing the Spread of Influence through a Social Network
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Information Networks Generative processes for Power Laws and Scale-Free networks Lecture 4.
Information Networks Small World Networks Lecture 5.
1 Algorithmic Performance in Power Law Graphs Milena Mihail Christos Gkantsidis Christos Papadimitriou Amin Saberi.
CSE 522 – Algorithmic and Economic Aspects of the Internet Instructors: Nicole Immorlica Mohammad Mahdian.
Power law random graphs. Loose definition: distribution is power-law if Over some range of values for some exponent Examples  Degree distributions of.
1 List Coloring and Euclidean Ramsey Theory TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A Noga Alon, Tel Aviv.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
Combinatorial optimization and the mean field model Johan Wästlund Chalmers University of Technology Sweden.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 8 May 4, 2005
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
SUMS OF RANDOM VARIABLES Changfei Chen. Sums of Random Variables Let be a sequence of random variables, and let be their sum:
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
CSE 421 Algorithms Richard Anderson Lecture 4. What does it mean for an algorithm to be efficient?
Advanced Topics in Data Mining Special focus: Social Networks.
1 On the Benefits of Adaptivity in Property Testing of Dense Graphs Joint work with Mira Gonen Dana Ron Tel-Aviv University.
The k-server Problem Study Group: Randomized Algorithm Presented by Ray Lam August 16, 2003.
Expanders Eliyahu Kiperwasser. What is it? Expanders are graphs with no small cuts. The later gives several unique traits to such graph, such as: – High.
Christian Sohler 1 University of Dortmund Testing Expansion in Bounded Degree Graphs Christian Sohler University of Dortmund (joint work with Artur Czumaj,
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 7 May 14, 2006
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Ramanujan Graphs of Every Degree Adam Marcus (Crisply, Yale) Daniel Spielman (Yale) Nikhil Srivastava (MSR India)
1 Introduction to Approximation Algorithms Lecture 15: Mar 5.
Computer Science 1 Web as a graph Anna Karpovsky.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Epidemics on graphs: Thresholds and curing strategies A. J. Ganesh Microsoft Research, Cambridge.
1 “Expansion” in Power Law and Scale Free Graphs Milena Mihail Georgia Tech with Christos Gkantsidis, Christos Papadimitriou and Amin Saberi.
Computational Geometry Piyush Kumar (Lecture 10: Point Location) Welcome to CIS5930.
Week 21 Conditional Probability Idea – have performed a chance experiment but don’t know the outcome (ω), but have some partial information (event A) about.
Testing the independence number of hypergraphs
Graph Colouring L09: Oct 10. This Lecture Graph coloring is another important problem in graph theory. It also has many applications, including the famous.
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Approximate Inference: Decomposition Methods with Applications to Computer Vision Kyomin Jung ( KAIST ) Joint work with Pushmeet Kohli (Microsoft Research)
1 Quasi-randomness is determined by the distribution of copies of a graph in equicardinal large sets Raphael Yuster University of Haifa.
Review of Probability. Important Topics 1 Random Variables and Probability Distributions 2 Expected Values, Mean, and Variance 3 Two Random Variables.
1 Probability and Statistical Inference (9th Edition) Chapter 5 (Part 2/2) Distributions of Functions of Random Variables November 25, 2015.
Miniconference on the Mathematics of Computation
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Chebyshev’s Inequality Markov’s Inequality Proposition 2.1.
Theory of Computational Complexity Probability and Computing Ryosuke Sasanuma Iwama and Ito lab M1.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Theory of Computational Complexity M1 Takao Inoshita Iwama & Ito Lab Graduate School of Informatics, Kyoto University.
Shuffling by semi-random transpositions Elchanan Mossel, U.C. Berkeley Joint work with Yuval Peres and Alistair Sinclair.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Enumerating Distances Using Spanners of Bounded Degree
Maximal Independent Set
Random Geometric Graph Diameter in the Unit Disk
Introduction Wireless Ad-Hoc Network
Modelling and Searching Networks Lecture 6 – PA models
Discrete Mathematics and its Applications Lecture 6 – PA models
Locality In Distributed Graph Algorithms
Presentation transcript:

On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi

The Internet Graph Faloutsos, Faloutsos and Faloutsos ‘99

The Sex Web Lilijeros et. al ‘01

Model for Power-Law Graphs: Preferential Attachment non-rigorous: Simon ‘55, Barabasi-Albert ‘99, measurements: Kumar et. al. ‘00, rigorous: Bollobas-Riordan ‘00, Bollobas et. al. ‘03 Add one vertex at a time New vertex i attaches to m ¸ 1 existing vertices j chosen as follows: With probability , choose j uniformly, and with probability 1- , choose j according to Prob(i attaches to j) / d j with d j = degree(j)

Definition of model: infected ! healthy at rate 1 healthy ! infected at rate (# infected neighbors) Studied in probability theory, physics, epidemiology Kephart and White ’93: modelling the spread of viruses in a computer network Model for Spread of Viruses: Contact Process

Epidemic Threshold(s) 1 2 Infinite graph: extinction weak strong survival survival Note: 1 = 2 on Z d 1 < 2 on a tree Finite subset logarthmic exponential of Z d : survival (super-poly) time survival time

The Internet Graph

What is the epidemic threshold of the Internet graph?

Epidemic Threshold in Scale-Free Network In preferential attachment networks both thresholds are zero asymptotically almost surely, i.e.   1 = 2 = 0 a.a.s. Physics argument: Pastarros, Vespignani ‘01 Rigorous proof: B., Borgs, Chayes, Saberi ’04 Moreover, we get detailed estimates (matching upper and lower bounds) on the survival probability as a function of

Theorem 1. For every > 0, and for all n large enough, if the infection starts from a uniformly random vertex in a sample of the scale-free graph of size n, then with probability 1-O( 2 ), v is such that the infection survives longer than e n 0.1 with probability at least and with probability at most where 0 < C 1 < C 2 < 1 are independent of and n. log (1/ ) log log (1/ ) C 1 log (1/ ) log log (1/ ) C 2

Typical versus average behavior Notice that we left out O( 2 n) vertices in Theorem 1. Question: What is the effect of these vertices on the average survival probability? Answer: Dramatic.

Theorem 2. For every > 0, and for all n large enough, if the infection starts from a uniformly random vertex in a sample of the scale-free graph of size n, then the infection survives longer than e n 0.1 with probability at least C 3 and with probability at most C 4 where 0 < C 3, C 4 < 1 are independent of and n.

Typical versus average behavior The survival probability for an infection starting from a typical (i.e., 1 – O( 2 ) ) vertex is The average survival probability is  (1) log (1/ ) log log (1/ )  ( )

Key Elements of the Proof 1. Properties of the contact process 2. Properties of preferential attachment graphs

Key Elements of the Proof 1. Properties of the contact process If the maximum degree is much less than 1/  then the infection dies out very quickly. On a vertex of degree much more than 1/ 2, the infection lives for a long time in the neighborhood of the vertex (“star lemma”)

Star Lemma If we start by infecting the center of a star of degree k, with high probability, the survival time is more than Key Idea: The center infects a constant fraction of vertices before becoming disinfected.

Consequence of star lemma If the virus is “lucky enough” to start at a vertex of degree higher than -2, the process has a good chance of lasting for a long time. Since there are  (1) such vertices, the average survival probability is  (1). If the virus not as lucky, then if it can at least reach a vertex of degree -  (1), it will survive for a long time in the neighborhood of that vertex.

Key Elements of the Proof: 2. Properties of preferential attachment graphs Expanding Neighborhood Lemma (after Bollobas and Riordan): With high probability, the largest degree in a ball of radius k about a vertex v is at most (k!) 10 and at least (k!)  (m,  ) where  (m,  ) > 0. To prove this, we introduced a Polya Urn Representation of the preferential attachment graph.

Polya Urn Representation of Graph Polya’s Urn: At each time step, add a ball to one of the urns with probability proportional to the number of balls already in that urn. Polya’s Theorem: This is equivalent to choosing a number p according to the  - distribution, and then sending the balls i.i.d. with probability p to the left urn and with probability 1– p to the right urn.

Polya Urn Representation of Graph For each new vertex we choose it strength according to the appropriate Beta distribution. Then we rescale all strengths so that they sum to 1.

Polya Urn Representation of Graph Then from every interval end we sample m i.i.d. uniform points left to it. We say that there is an edge between u and v if a variable from v fell in u.

Polya Urn Representation of Graph

When does it work This works when the Barabasi-Albert graph Is realized in an exchangeable way.

Exchangeable examples The m vertices are chosen one by one, where the distribution of the i-th is influenced by the previous ones. The m vertices are chosen simultaneously, only depending on the past, conditioned on being different from each other.

Non-exchangeable example The m vertices are chosen simultaneously and independently.

Open Problem: Find a way to prove our estimates in the non- exchangeable regime. (Or to prove they don’t hold)

Consequence of the expanding neighborhood lemma The largest degree of a vertex within a ball of radius k around a typical vertex is (k!)  (1) ) the closest vertex of degree -  (1) is at a distance  (log -1 / log log -1 ) ) must take k =  (log -1 / log log -1 ) in the proof

Let By the preferential attachment lemma, the ball of radius C 1 k around vertex v contains a vertex w of degree larger than [(C 1 k)!]  > -5 where the inequality follows by taking C 1 large. The infection must travel at most C 1 k to reach w, which happens with probability at least C 1 k, at which point, by the star lemma, the survival time is more than exp(C -3 ). Iterate until we reach a vertex z of sufficiently high degree for exp(n 1/10 ) survival. “Proof” of Main Theorem: logn iterations to get to high-degree vertex log (1/ ) log log (1/ ) k = v w z

Summary Developed a new representation of the preferential attachment model: Polya Urn Representation. Used the representation to: 1. prove that any virus with a positive rate of spread has a positive probability of becoming epidemic 2. calculate the survival probability for both typical and average vertices

Show that there is exponential (rather than just super-polynomial) survival time Analyze other models for the spread of viruses (either with permanent immunity to one virus or with several distinct infected states) Design efficient algorithms for selective immunization Open Problems

THE END

Use this and some work to show that the addition of a new vertex can be represented by adding a new urn to the existing sequence of urns and adding edges between the new urn and m of the old ones.