Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Apnes, Kevin Change, and Aleksandr Yampolskiy.

Slides:



Advertisements
Similar presentations
Approximation algorithms for geometric intersection graphs.
Advertisements

1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
Graph Partitioning Problems Lecture 18: March 14 s1 s3 s4 s2 T1 T4 T2 T3 s1 s4 s2 s3 t3 t1 t2 t4 A region R1 R2 C1 C2.
Poly-Logarithmic Approximation for EDP with Congestion 2
Price Of Anarchy: Routing
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
Approximation Algoirthms: Graph Partitioning Problems Lecture 17: March 16 s1 s3 s4 s2 T1 T4 T2 T3.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
1 Maximum flow sender receiver Capacity constraint Lecture 6: Jan 25.
MIT and James Orlin © Game Theory 2-person 0-sum (or constant sum) game theory 2-person game theory (e.g., prisoner’s dilemma)
“Devo verificare un’equivalenza polinomiale…Che fò? Fò dù conti” (Prof. G. Di Battista)
EMIS 8374 Vertex Connectivity Updated 20 March 2008.
Information Networks Graph Clustering Lecture 14.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Approximation Algorithms Chapter 5: k-center. Overview n Main issue: Parametric pruning –Technique for approximation algorithms n 2-approx. algorithm.
Geometric embeddings and graph expansion James R. Lee Institute for Advanced Study (Princeton) University of Washington (Seattle)
CS774. Markov Random Field : Theory and Application Lecture 17 Kyomin Jung KAIST Nov
Prof. Swarat Chaudhuri COMP 482: Design and Analysis of Algorithms Spring 2012 Lecture 19.
1 Chapter 7 Network Flow Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
1 Chapter 7 Network Flow Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
1 COMMONWEALTH OF AUSTRALIA Copyright Regulations 1969 WARNING This material has been reproduced and communicated to you by or on behalf.
Strategic Network Formation and Group Formation Elliot Anshelevich Rensselaer Polytechnic Institute (RPI)
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
Approximation Algoirthms: Semidefinite Programming Lecture 19: Mar 22.
Oblivious Routing for the L p -norm Matthias Englert Harald Räcke 1.
Welfare Maximization in Congestion Games Liad Blumrosen and Shahar Dobzinski The Hebrew University.
HW2 Solutions. Problem 1 Construct a bipartite graph where, every family represents a vertex in one partition, and table represents a vertex in another.
EDA (CS286.5b) Day 6 Partitioning: Spectral + MinCut.
An Approximation Algorithm for Requirement cut on graphs Viswanath Nagarajan Joint work with R. Ravi.
Maximum Flows Lecture 4: Jan 19. Network transmission Given a directed graph G A source node s A sink node t Goal: To send as much information from s.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Computability and Complexity 24-1 Computability and Complexity Andrei Bulatov Approximation.
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Constant Price of Anarchy in Network Creation Games via Public Service Advertising Presented by Sepehr Assadi Based on a paper by Erik D. Demaine and Morteza.
Integrality Gaps for Sparsest Cut and Minimum Linear Arrangement Problems Nikhil R. Devanur Subhash A. Khot Rishi Saket Nisheeth K. Vishnoi.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
1 COMMONWEALTH OF AUSTRALIA Copyright Regulations 1969 WARNING This material has been reproduced and communicated to you by or on behalf.
Online Social Networks and Media
Chapter 7 April 28 Network Flow.
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 25.
New algorithms for Disjoint Paths and Routing Problems
Vasilis Syrgkanis Cornell University
Graph Partitioning using Single Commodity Flows
Chapter 7 May 3 Ford-Fulkerson algorithm Step-by-step walk through of an example Worst-case number of augmentations Edmunds-Karp modification Time complexity.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
CSCI 256 Data Structures and Algorithm Analysis Lecture 20 Some slides by Kevin Wayne copyright 2005, Pearson Addison Wesley all rights reserved, and some.
Approximating Buy-at-Bulk and Shallow-Light k-Steiner Trees Mohammad T. Hajiaghayi (CMU) Guy Kortsarz (Rutgers) Mohammad R. Salavatipour (U. Alberta) Presented.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
Iterative Improvement for Domain-Specific Problems Lecturer: Jing Liu Homepage:
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Markov Random Fields in Vision
Second case study: Network Creation Games (a.k.a. Local Connection Games)
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Some links between min-cuts, optimal spanning forests and watersheds Cédric Allène, Jean-Yves Audibert, Michel Couprie, Jean Cousty & Renaud Keriven ENPC.
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Generalized Sparsest Cut and Embeddings of Negative-Type Metrics
Approximating k-route cuts
ICS 353: Design and Analysis of Algorithms
Tools for the Analysis and Design of Complex Multi-Scale Networks: Dynamics; Security; Uncertainty MURI Annual Review Columbus OH, October 14, 2010 J.
Network Flow and Connectivity in Wireless Sensor Networks
Graph Partitioning Problems
EE5900 Advanced Embedded System For Smart Infrastructure
Maximum Flow Problems in 2005.
Presentation transcript:

Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Apnes, Kevin Change, and Aleksandr Yampolskiy

Problem: Network of computers all connected to each other Antivirus software that prevents computer from becoming infected Virus introduced and spreads throughout Becoming infected and installing software both have costs

Goal: Install antivirus software on certain number of computers that minimizes cost 2 Ways to approach problem: –Individual Selection –Dictator Selection

Individual Selection Each user of computer makes own decision on whether or not to install software Example: cost of software, C, outweighs cost caused by virus, L Nash Equilibrium must be reached

Game Set-Up Graph G (V, E) where V = {0, 1, 2, …, n-1} All n nodes start vulnerable

Strategies For every i in G, the strategy of i is represented by a i a i is the probability of i installing software So we can also create vector ā that represents all strategies in G I a = set of nodes that are secure G a is “attack graph” G a = G - I a

Attack Model Virus is started at some random node Propagates through network by attacking unprotected nodes

Individual Costs Cost of C to install software Cost of L if node becomes infected Cost of node i is cost i (ā) = a i C + (1-a i )L*p i (ā) p i (ā) is the probability of node getting infected based on its reachability In pure strategies: p i (ā) = k i /n

Social Cost Equal to the sum of individual costs in network We remove m nodes at a cost of C per node and create so many connected components in the graph Each node in the i th connected component has a k i /n chance of getting infected

Social Cost So… Social cost = Cm + Σ(Lk i (k i /n)) = Cm + (L/n)Σ(k i 2 ) Where k i is the number of nodes in all connected components created by removing the m nodes that are in I a

Nash Equilibrium Computers make decision based on their local environment Reached when each node cannot change strategy to minimize cost

Nash Equilibrium Can find a threshold for the decisions made by the computers –t = Cn/L Example: t = 1.5 Nash Equilibrium can be found in O(n 3 ) time

Price of Anarchy How far the Nash equilibrium is from the optimal social cost For this system price of anarchy is Θ(n)

Dictator Selection A centralized solution that makes choices for the computer in the best interest of social cost Can be reduced to sum-of-squares partition problem when removing m nodes Approximation algorithm that allows us to find O(log 1.5 n)m nodes that get us in within a constant of the optimal solution

Sum-of-Squares We see social cost is Cm + (L/n)Σ(k i 2 ) Sum-of-Squares partition gives us approximately best answer for removing m nodes Repeat to make m 1,2, …, n

Sum-of-Squares Sum-of-Squares Partition Problem: –Given a graph G =(V, E), remove a set of nodes F, of at most m, in order to partition the graph into disconnected components H 1, H 2, …, H l such that Σ i (|H i | 2 ) is minimized

Main Goal: Theorem 12: There exists a polynomial time (O(log 1.5 n), O(1))-bicriterion approximation algorithm for the sum-of- squares partition problem Corollary 13: If OPT is the cost of the optimum solution for the inoculation problem, there exists a polynomial time approximation algorithm that finds a solution with cost at most O(log 1.5 n)OPT

Arora-Rao-Vazirani Algorithm Used to find the sparsest edge cut Can be extended to be used for node cuts Takes a set of nodes H and splits them into 3 sets –V 1 and V 2 –R

Arora-Rao-Vazirani Algorithm Approach is similar to greedy set cover algorithm Consequence of ARV algo paper: –There exists some O(log 1/2 n)-approximation for the following problem: given graph G, find a node cut that partitions the nodes of G into three sets: two set defining disconnected subgraphs with nodes sets V 1 and V 2 and a set of removed nodes R, such that the quantity (|V 1 |+(|R|/2))(|V 2 |+(|R|/2)) |R|is maximized

Cost-Effectiveness We have connected subgraph H with k nodes that is split into sets V 1, V 2, and R then the cut’s cost-effectiveness is: k 2 - |V 1 | 2 - |V 2 | 2 |R|

Cost-Effectiveness vs. Sparsity Sparsity: Cost Effectiveness:

Lemma 15 Let H be a graph with k nodes, if α* is the maximum cost effectiveness of all node cuts of H, the Arora-Rao-Vazirani sparse cut algorithm will find a cut with cost effectiveness at least α*/(clog 1/2 k)

Algorithm Input: A graph G and integer m > 0 Initialize: G 1  G, F  , l  0 1.Use sparse cut algorithm to find an approximate most cost effective cut in each connected component in G

Algorithm 2. Let H 1, H 2, …, H k be the components of G l in which the sparse cut algorithm found a cut that removes at most (20clog 1/2 n)m nodes If no such component exists, then halt operation and output the partition of G that results from removing all nodes in set F

Algorithm 3. Choose the component H j from among those considered in the previous step for which the cost-effectiveness is highest. So we have R as the set of nodes that partitioned H j into V 1 and V 2

Algorithm 4. Add all of the nodes in R to the set F. Now let G l +1 be the residual graph induced by removing R from G l. If |F| > (36clog 1.5 n)m, then halt and output the partition of G that results from having removed all nodes in F 5. Otherwise, l = l+1 and repeat

Aspnes, James, Kevin Chang, and Aleksandr Yampolskiy. "Inoculation Strategies for Victims of Viruses and the Sum-of-squares Partition Problem." Journal of Computer and System Sciences 72.6 (2006): Web. S. Arora, S. Rao, U. Vazirani, Expander flows, geometric embeddings and graph partitioning, in: Proceedings of the 36th Annual ACM Symposium on the Theory of Computing, 2004, pp. 222– 231. T. Leighton, S. Rao, Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms, J. Assoc. Comput. Machinery 46 (6) (1999) 787–832.