1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.

Slides:



Advertisements
Similar presentations
Jennifer Tour Chayes Joint work with N. Berger, C. Borgs, A. Ganesh, A. Saberi, D. B. Wilson Controlling the Spread of Viruses on Power-Law Networks.
Advertisements

Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
It’s a Small World by Jamie Luo. Introduction Small World Networks and their place in Network Theory An application of a 1D small world network to model.
School of Information University of Michigan Network resilience Lecture 20.
Information Networks Failures and Epidemics in Networks Lecture 12.
School of Computer Science Carnegie Mellon Sensor and Graph Mining Christos Faloutsos Carnegie Mellon University & IBM
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Information Networks Generative processes for Power Laws and Scale-Free networks Lecture 4.
RD processes on heterogeneous metapopulations: Continuous-time formulation and simulations wANPE08 – December 15-17, Udine Joan Saldaña Universitat de.
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
Weighted networks: analysis, modeling A. Barrat, LPT, Université Paris-Sud, France M. Barthélemy (CEA, France) R. Pastor-Satorras (Barcelona, Spain) A.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
Population dynamics of infectious diseases Arjan Stegeman.
University of Buffalo The State University of New York Spatiotemporal Data Mining on Networks Taehyong Kim Computer Science and Engineering State University.
Scale Free Networks Robin Coope April Abert-László Barabási, Linked (Perseus, Cambridge, 2002). Réka Albert and AL Barabási,Statistical Mechanics.
CMU SCS Mining Billion-node Graphs Christos Faloutsos CMU.
Social Networks and Graph Mining Christos Faloutsos CMU - MLD.
Zhenhua Wu Advisor: H. E. StanleyBoston University Co-advisor: Lidia A. BraunsteinUniversidad Nacional de Mar del Plata Collaborators: Shlomo HavlinBar-Ilan.
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
Virus Propagation Modeling Chenxi Wang, Christos Faloutsos Yang Wang, Deepayan Chakrabarti Carnegie Mellon University Center for Computer.
Cascading Behavior in Large Blog Graphs: Patterns and a model offence.
Advanced Topics in Data Mining Special focus: Social Networks.
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
The Role of Specialization in LDPC Codes Jeremy Thorpe Pizza Meeting Talk 2/12/03.
The Erdös-Rényi models
Information Networks Power Laws and Network Models Lecture 3.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Online Social Networks and Media Epidemics and Influence.
Complex networks A. Barrat, LPT, Université Paris-Sud, France I. Alvarez-Hamelin (LPT, Orsay, France) M. Barthélemy (CEA, France) L. Dall’Asta (LPT, Orsay,
Statistical Mechanics of Complex Networks: Economy, Biology and Computer Networks Albert Diaz-Guilera Universitat de Barcelona.
V5 Epidemics on networks
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley.
Directed-Graph Epidemiological Models of Computer Viruses Presented by: (Kelvin) Weiguo Jin “… (we) adapt the techniques of mathematical epidemiology to.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
Sanja Teodorović University of Novi Sad Faculty of Science.
Interacting Viruses in Networks: Can Both Survive? Authors: Alex Beutel, B. Aditya Prakash, Roni Rosenfeld, and Christos Faloutsos Presented by: Zachary.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
Emergence of Scaling and Assortative Mixing by Altruism Li Ping The Hong Kong PolyU
Markovian susceptible-infectious- susceptible (SIS) dynamics on finite networks: endemic prevalence and invasion probability Robert Wilkinson Kieran Sharkey.
Winner-takes-all: Competing Viruses or Ideas on fair-play Networks B. Aditya Prakash, Alex Beutel, Roni Rosenfeld, Christos Faloutsos Carnegie Mellon University,
E PIDEMIC SPREADING Speaker: Ao Weng Chon Advisor: Kwang-Cheng Chen 1.
Modeling frameworks Today, compare:Deterministic Compartmental Models (DCM) Stochastic Pairwise Models (SPM) for (I, SI, SIR, SIS) Rest of the week: Focus.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte 2008 SIAM Conference on Data Mining, April 25 th Atlanta, Georgia.
Dynamic Random Graph Modelling and Applications in the UK 2001 Foot-and-Mouth Epidemic Christopher G. Small Joint work with Yasaman Hosseinkashi, Shoja.
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Synchronization in complex network topologies
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
Lassú, villanásos dinamika komplex hálózatokon Géza Ódor MTA-TTK-MFA Budapest 11/04/2014 „Infocommunication technologies and the society of future (FuturICT.hu)”
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
ECML-PKDD 2010, Barcelona, Spain B. Aditya Prakash*, Hanghang Tong* ^, Nicholas Valler+, Michalis Faloutsos+, Christos Faloutsos* * Carnegie Mellon University,
 Probability in Propagation. Transmission Rates  Models discussed so far assume a 100% transmission rate to susceptible individuals (e.g. Firefighter.
CS 590 Term Project Epidemic model on Facebook
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
1 Lecture 16 Epidemics University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CS 791 Special Topics: Network Architectures and.
An Improved Acquaintance Immunization Strategy for Complex Network.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
On the behaviour of an edge number in a power-law random graph near a critical points E. V. Feklistova, Yu.
Scale-free and Hierarchical Structures in Complex Networks L. Barabasi, Z. Dezso, E. Ravasz, S.H. Yook and Z. Oltvai Presented by Arzucan Özgür.
Epidemic Profiles and Defense of Scale-Free Networks L. Briesemeister, P. Lincoln, P. Porras Presented by Meltem Yıldırım CmpE
Random Walk for Similarity Testing in Complex Networks
Failures and Epidemics in Networks
Epidemic spreading in complex networks with degree correlations
SEIV Epidemic Model & Resource Allocation
Large Graph Mining: Power Tools and a Practitioner’s guide
Presentation transcript:

1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos

2 Introduction Computer viruses are a prevalent threat Existing defense mechanisms (eg., scanning) focus on local behaviors only  like “curing” a contagious disease in one patient Global defense strategies require the understanding of global propagation behaviors  like “prevention” of spread of a contagious disease in a population  Epidemiological models can help us do exactly that

3 Introduction Why do we care?  Understanding the spread of a virus is the first step in preventing it  How fast do we need to disinfect nodes so that the virus attack dies off?  How long will the virus take to die out?

4 Problem definition Question: How does a virus spread across an arbitrary network? Specifically, we want  a general analytic model for viral propagation  that applies to any network topology  and offers an easy-to-compute “threshold condition”

5 Framework The network of computers consists of nodes (computers) and edges (links between nodes) Each node is in one of two states  Susceptible (in other words, healthy)  Infected Susceptible-Infected-Susceptible (SIS) model  Cured nodes immediately become susceptible SusceptibleInfected Infected by neighbor Cured internally

6 Framework (Continued) Homogeneous birth rate β on all edges between infected and susceptible nodes Homogeneous death rate δ for infected nodes Infected Healthy XN1 N3 N2 Prob. β Prob. δ

7 Outline Introduction Classical models and their limitations Modeling viral propagation in arbitrary network topologies Epidemic threshold and eigenvalues Experiments Conclusions

8 Basic Homogeneous Model [Kephart-White ’91, ’93]  Homogeneous connectivity  Every node has equal probability of connecting to every other node  Many real networks deviate from this!

9 Power-law Networks Many real world networks exhibit power-law characteristics  Probability that a node has k links: P(k) = ck –γ  γ = power law exponent  The Internet: 2  γ  3…and still evolving  [Faloutsos+ ’99, Ripeanu+ ’02]

10 Power-law Networks Model for Barabási-Albert networks (PL-3)  [Pastor-Satorras & Vespignani, ’01, ’02]  Prediction limited to BA type networks  which only allow power-laws of exponent γ = 3

11 Power-law Networks Model for correlated (Markovian) networks  [Boguñá-Satorras ’02]  Additional distribution for neighbor degree correlation: P(k|k’)  Difficult to find/produce P(k|k’) in arbitrary networks  Such correlations have yet to be confirmed in real world networks

12 Outline Introduction Classical models and their limitations Modeling viral propagation in arbitrary network topologies Epidemic threshold and eigenvalues Experiments Conclusions

13 Topology-independent epidemic model Takes topological characteristics into account without being limited by them Discrete time A node is healthy at time t if it  Was healthy before t and not infected at t Infected Healthy XN1 N3 N2

14 Topology-independent epidemic model Takes topological characteristics into account without being limited by them Discrete time A node is healthy at time t if it  Was healthy before t and not infected at t OR  Was infected before t, cured and not re-infected at t Infected Healthy XN1 N3 N2

15 Topology-independent epidemic model Takes topological characteristics into account without being limited by them Discrete time A node is healthy at time t if it  Was healthy before t and not infected at t OR  Was infected before t, cured and not re-infected at t OR  Was infected before t, therefore ignored re-infection attempts and was subsequently cured at t Infected Healthy XN1 N3 N2

16 Topology-independent epidemic model Deterministic time evolution of infection  1 - p i,t : probability node i is healthy at time t  ζ k,t : probability a k-linked node will not receive infections from its neighbors at time t  Assume probability of curing before infection attempts 50%  Solve numerically Equation 1

17 Simulation evaluation of model (1/2) 1000-node homogeneous network KW model Our model Simulation

18 Simulation evaluation of model (2/2) Our model’s predictions consistently equal or outperform predictions made by models designed for specific topologies PL-3 model Our model Simulation Real-world node Oregon network

19 Outline Introduction Classical models and their limitations Modeling viral propagation in arbitrary network topologies Epidemic threshold and eigenvalues Experiments Conclusions

20 Epidemic threshold The epidemic threshold τ is the value such that  β/δ < τ  there is no epidemic  where β = birth rate, and δ = death rate What is this threshold for an arbitrary graph? [Theorem 1] τ = 1/ λ 1,A where λ 1,A is the largest eigenvalue of the adjacency matrix A of the topology λ 1,A alone captures the property of the graph!

21 Epidemic threshold for various networks Our epidemic threshold condition is accurate and general Homogeneous networks  λ 1,A = ; τ = 1/  where = average degree  This is the same result as of Kephart & White ! Star networks  λ 1,A = √d; τ = 1/ √d  where d = the degree of the central node Infinite power-law networks  λ 1,A = ∞; τ = 0 ; this concurs with previous results Finite power-law networks  τ = 1/ λ 1,A

22 Epidemic threshold [Theorem 1] The epidemic threshold is given by »τ = 1/ λ 1,A How fast will an infection die out? [Theorem 2] Below the epidemic threshold, the epidemic dies out exponentially  If β/δ < τ (β = birth rate, δ = death rate) then  any local breakout of infection dies out exponentially fast

23 Outline Introduction Classical models and their limitations Modeling viral propagation in arbitrary network topologies Epidemic threshold and eigenvalues Experiments Conclusions

24 Epidemic threshold experiments (Star) β/δ = τ (close to the threshold) β/δ < τ (below threshold) β/δ > τ (above threshold)

25 Epidemic threshold experiments (Oregon) β/δ > τ (above threshold) β/δ = τ (at the threshold) β/δ < τ (below threshold)

26 Our prediction vs. previous prediction When we do not subsume previous predictions, our predictions are much more accurate OregonStar PL-3 Our Number of infected nodes β/δβ/δβ/δβ/δ

27 Outline Introduction Classical models and their limitations Modeling viral propagation in arbitrary network topologies Epidemic threshold and eigenvalues Experiments Conclusions

28 Contributions We match our goals √ A general analytic model for viral propagation (Equation 1) √ that applies to any network topology √ and offers an easy-to-compute “threshold condition” (Theorem 1)

29 Contributions We created new topology-independent epidemic model  More accurate than previous models  More general than previous models We derived new epidemic threshold condition  Only requires one parameter (λ 1,A ) that can be calculated with existing tools  Subsumes previous theories for epidemic threshold condition  When does not subsume, our theory is more accurate

30 Halting viruses Immunization strategies must concentrate on nodes that are statistically significant Statistically significant nodes are not necessarily limited to ones that are highly connected  We are building mathematical models to identify the most significant nodes in power-law models Other system parameters may also matter

31 Summary and future work Our models will provide a theoretical basis for global defense strategies for  intelligent immunization  mechanisms to guard against distributed denial-of-service (DDOS) attacks  those that propagate via virus code – Phase transition phenomena at epidemic threshold Additional environmental factors that affect epidemic behavior

32 Basic homogeneous model - KW Homogeneous connectivity Homogeneous birth rate β on all edges between infected and susceptible nodes Homogeneous death rate δ for infected nodes Susceptible-Infected-Susceptible (SIS) model  Cured individuals immediately become susceptible Susceptible-Infected-Removed (SIR) model  Cured individuals are removed from the population

33 Homogeneous model equations Deterministic time evolution of infected population η t  Change = birth term - death term Equilibrium point of infection η, ρ’= δ/(β ) For homogeneous or Erdös-Rényi (random) networks

34 Homogeneous model η = 1-  ’= 1 -  /(  ) = = 0.9

35 Power-law networks Discrepancy between simulation results and homogeneous model predictions

36 Power-law networks There exist statistically significant nodes  Node 928 was infected 9473 times  Run #3 hits 928 around time 20  Both runs #1 and #2 hit 928 early in its run

37 Models for power-law and correlated networks Many real world networks exhibit power-law characteristics  P(k) = k -γ --- probability that a node has k links  The Internet: 2  γ  3…and still evolving Model for Barabási-Albert networks (SV)  γ = 3  Steady state: η = 2e -δ/mβ, m = minimum connectivity  Prediction limited to BA type networks Model for correlated (Markovian) networks  Additional distribution for neighbor degree correlation: P(k|k’)  Difficult to find/produce P(k|k’) in arbitrary networks  Such correlations have yet to be confirmed in real world networks

38 Epidemic threshold The epidemic threshold τ = β/δ (the ratio of birth rate to death rate) below which there is no epidemic Epidemic threshold for existing models:  Threshold of the basic homogeneous model: 1/  Threshold of SV power-law model: / We derive an epidemic threshold condition from our model  τ = 1/ λ 1,A  λ 1,A : largest eigenvalue of the adjacency matrix A of the topology Power-law networks have extremely low threshold since connectivity variance is usually high, resulting in large λ 1,A