UNCLASSIFIED Worm Spread in Scale-Free Networks 1 A Model Using Random Graph Theory PRESENTED TO: CSIIR Workshop Oak Ridge National Lab PRESENTED BY*:

Slides:



Advertisements
Similar presentations
The Theory of Zeta Graphs with an Application to Random Networks Christopher Ré Stanford.
Advertisements

Jennifer Tour Chayes Joint work with N. Berger, C. Borgs, A. Ganesh, A. Saberi, D. B. Wilson Controlling the Spread of Viruses on Power-Law Networks.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
School of Information University of Michigan Network resilience Lecture 20.
Classical SIR and Network Models 2012 TCM Conference January 27, 2012 Dan Teague NC School of Science and Mathematics.
RD processes on heterogeneous metapopulations: Continuous-time formulation and simulations wANPE08 – December 15-17, Udine Joan Saldaña Universitat de.
1 A Random-Surfer Web-Graph Model (Joint work with Avrim Blum & Hubert Chan) Mugizi Rwebangira.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
1 Copyright © 2005 Brooks/Cole, a division of Thomson Learning, Inc. Chapter 8 Sampling Variability & Sampling Distributions.
Population dynamics of infectious diseases Arjan Stegeman.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Deployment Strategies for Differentiated Detection in Wireless Sensor Network Jingbin Zhang, Ting Yan, and Sang H. Son University of Virginia From SECON.
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
HIV in CUBA Kelvin Chan & Sasha Jilkine. Developing a Model S = Susceptible I = Infected Z = AIDS Patients N = S+I = Active Population.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Convergence Speed of Binary Interval Consensus Moez Draief Imperial College London Milan Vojnović Microsoft Research IEEE Infocom 2010, San Diego, CA,
CSE 522 – Algorithmic and Economic Aspects of the Internet Instructors: Nicole Immorlica Mohammad Mahdian.
CHAPTER 6 Statistical Analysis of Experimental Data
Modeling the SARS epidemic in Hong Kong Dr. Liu Hongjie, Prof. Wong Tze Wai Department of Community & Family Medicine The Chinese University of Hong Kong.
Copyright © Cengage Learning. All rights reserved.
COVERTNESS CENTRALITY IN NETWORKS Michael Ovelgönne UMIACS University of Maryland 1 Chanhyun Kang, Anshul Sawant Computer Science Dept.
How does mass immunisation affect disease incidence? Niels G Becker (with help from Peter Caley ) National Centre for Epidemiology and Population Health.
Statistical Methods For Engineers ChE 477 (UO Lab) Larry Baxter & Stan Harding Brigham Young University.
Copyright © Cengage Learning. All rights reserved. CHAPTER 11 ANALYSIS OF ALGORITHM EFFICIENCY ANALYSIS OF ALGORITHM EFFICIENCY.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
A Provocation: Social insects as an experimental model of network epidemiology Michael Otterstatter (CA)
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Efficient Gathering of Correlated Data in Sensor Networks
STA Lecture 161 STA 291 Lecture 16 Normal distributions: ( mean and SD ) use table or web page. The sampling distribution of and are both (approximately)
Estimation of Statistical Parameters
Lecture 12 Statistical Inference (Estimation) Point and Interval estimation By Aziza Munir.
V5 Epidemics on networks
Nina H. Fefferman, Ph.D. Rutgers Univ. Balancing Workforce Productivity Against Disease Risks for Environmental and Infectious.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Directed-Graph Epidemiological Models of Computer Viruses Presented by: (Kelvin) Weiguo Jin “… (we) adapt the techniques of mathematical epidemiology to.
1 Estimation From Sample Data Chapter 08. Chapter 8 - Learning Objectives Explain the difference between a point and an interval estimate. Construct and.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
INTEGRALS 5. INTEGRALS In Chapter 2, we used the tangent and velocity problems to introduce the derivative—the central idea in differential calculus.
Integrals  In Chapter 2, we used the tangent and velocity problems to introduce the derivative—the central idea in differential calculus.  In much the.
E PIDEMIC SPREADING Speaker: Ao Weng Chon Advisor: Kwang-Cheng Chen 1.
Chapter 8 Sampling Variability and Sampling Distributions.
Copyright © 2010, 2007, 2004 Pearson Education, Inc. All Rights Reserved. Section 7-1 Review and Preview.
Dynamic Random Graph Modelling and Applications in the UK 2001 Foot-and-Mouth Epidemic Christopher G. Small Joint work with Yasaman Hosseinkashi, Shoja.
1 2 nd Pre-Lab Quiz 3 rd Pre-Lab Quiz 4 th Pre-Lab Quiz.
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Chapter 12 Confidence Intervals and Hypothesis Tests for Means © 2010 Pearson Education 1.
1 Epidemic Potential in Human Sexual Networks: Connectivity and The Development of STD Cores.
Probability Theory Modelling random phenomena. Permutations the number of ways that you can order n objects is: n! = n(n-1)(n-2)(n-3)…(3)(2)(1) Definition:
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Predicting the Future To Predict the Future, “all we have to have is a knowledge of how things are and an understanding of the rules that govern the changes.
Estimation by Intervals Confidence Interval. Suppose we wanted to estimate the proportion of blue candies in a VERY large bowl. We could take a sample.
Written By: Presented By: Swarup Acharya,Amr Elkhatib Phillip B. Gibbons, Viswanath Poosala, Sridhar Ramaswamy Join Synopses for Approximate Query Answering.
Copyright (c) 2004 Brooks/Cole, a division of Thomson Learning, Inc. Chapter 7 Inferences Concerning Means.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Scale-free and Hierarchical Structures in Complex Networks L. Barabasi, Z. Dezso, E. Ravasz, S.H. Yook and Z. Oltvai Presented by Arzucan Özgür.
Chapter 9: Means and Proportions as Random Variables 9.1 Understanding dissimilarity among samples 9.2 Sampling distributions for sample proportions 9.3.
INTEGRALS 5. INTEGRALS In Chapter 3, we used the tangent and velocity problems to introduce the derivative—the central idea in differential calculus.
Network (graph) Models
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
Greedy & Heuristic algorithms in Influence Maximization
Direct Proof and Counterexample III: Divisibility
Sampling Variability & Sampling Distributions
Minimum Spanning Tree 8/7/2018 4:26 AM
Effective Social Network Quarantine with Minimal Isolation Costs
The normal distribution
Predicting the Future To Predict the Future, “all we have to have is a knowledge of how things are and an understanding of the rules that govern the changes.
Viral Marketing over Social Networks
Presentation transcript:

UNCLASSIFIED Worm Spread in Scale-Free Networks 1 A Model Using Random Graph Theory PRESENTED TO: CSIIR Workshop Oak Ridge National Lab PRESENTED BY*: Christopher Griffin Penn State Applied Research * Richard R. Brooks of Clemson University contributed to this study.

2 Goals of Presentation Summarize the epidemiological models of worm spread in the Internet Introduce Random Graphs as models of the Internet Propose a natural model of worm spread using Random Graphs Demonstrate quantitative results showing this model may be appropriate

3 Computer Worms Computing a self-replicating program able to propagate itself across a network, typically having a detrimental effect.Computing a self-replicating program able to propagate itself across a network, typically having a detrimental effect. The name 'worm' comes from The Shockwave Rider, a science fiction novel published in 1975 by John Brunner. Researchers John F Shoch and John A Hupp of Xerox PARC chose the name in a paper published in 1982; The Worm Programs, Comm ACM, 25(3): , 1982), and it has since been widely adopted.

4 Epidemic Models Epidemiology: The study of the spread of disease in populations. Diseases may spread quickly and then die out (Ebola) or remain endemic within a population (Chicken Pox) Populations can be modeled in a number of ways: “SI”, “SIS” or “SIR” models are most common.

5 Mathematical Epidemiology Classical Mathematical Epidemiology Uses 3 Key Parameters in SIS/SIR Models: –R 0 : The number of secondary infections that occur when one infective agent is introduced into a population. –  (t): The average number of effective contacts an individual has during his/her infected period. –R(t) : The average number of secondary infections produced by an individual during his/her infected period. In general, epidemic is only possible if R 0 > 1.

6 Scale-Free Networks A graph G=(V,E) is scale free if the number of vertices with degree d follows an inverse power law. That is: n(d) = k/d  –n(d) is the number of vertices with degree d. –k is a constant of proportionality, and –  is the scaling parameter. Scale-free graphs have gained popularity in recent years. Examples: The World Wide Web, Human Sexual Contacts, Protein-Protein Interaction Networks.

7 Worm Models with Epidemiology R. Pastor-Satorras and A. Vespigani studied the spread of worms in Internet-like networks using classical mathematical epidemiology. –Differential Equation Model of Infection Spread –Mean-Field Theory Approximations They show that for certain scale-free networks with scaling parameter 1.

8 OK, this model “looks” good. Why not use it? Three reasons to search for a different model: –These models assume a completely mixed population. –Classical mathematical epidemiology assumes a fluid-like behavior of individuals. –R. Pastor-Satorras and A. Vespigani were studying general scale-free networks, not computer networks specifically. Two dangers to note: –In the absence of ad hoc mesh networks, computers do not mix. –The effective R 0 is highly dependent on the initial infection position.

9 Graphs and Random Graphs A graph G=(V,E) is said to have a giant component H if H is a subgraph and contains a majority of the vertices of G. A random graph is a misnomer. A random graph is a tuple ( ,p), where  is a set of graphs and p is an appropriately defined probability measure on a sigma algebra of . The most widely studied random graph family is  (n,p), where each graph in  has n vertices when any graph G is chosen from  the probability that there is an edge between two arbitrarily chosen vertices is p. These are the Erdös-Renyi Random Graphs.

10 Random Graph Model of SF Graphs Aiello et al. have formulated a random graph model of SF graphs. Let  ( ,  ) be the collection of graphs whose degree distribution follows the curve n(d)=  exp(  )/d  . –Here  x  denotes the greatest integer lower bound for x. –Aiello et al. have shown that this definition is mathematically sufficient and that a reasonable probability measure can be defined. In this model,  (roughly) controls the size of the graph while  controls the scaling of the graph.

11 Relation to Epidemic Models Lemma [Griffin & Brooks 2006]: If G is an element of  ( ,  ), and vertices of G are uniformly randomly kept with probability 0<p≤1 to produce G’, then a.s. G’ has the same properties as G. Theorem [Griffin & Brooks 2006]: For any infection in graph G  ( ,  ) with  >2, and with nodes having susceptibility probability p, then for all time

12 Infection Potential Theorem [Griffin & Brooks 2006]: If 2<  <  0, and for any infectious agent with infection probability p, a.s. lim t  i(t) = p. Where i(t) is the proportion of infected nodes. This result is particularly interesting: –Often the affects of Internet worms have been blamed on the monoculture of Microsoft products. –This theorem suggests that even in the absence of a network monoculture, for appropriate Internet structures, 100% infection would occur among the susceptible nodes.

13 Rate of Infection Theorem [Griffin & Brooks]: Suppose that the rate of infection is constant, then the time required to achieve total infection is a.s. O(log|G|). Suppose that the infection rate is r(t), then: For certain r(t) we can obtain an “S” curve matching the data. This gives a natural model of infection rate that matches the given data and does not appeal to continuous mixing models.

14 Comparison of Approaches When we try a model: We obtain: The model is seen to be imperfect because the true “logarithmic rate” does have hump, but it is probably not Gaussian in nature. G/B puts the diameter of this monitored network at ~13--this is a bit smaller than most estimates of the diameter of the Internet.

15 Infection Countermeasures Theorem [Griffin & Brooks 2006]: Centralized patch distribution runs in O(|G|), while decentralized “white worms” can inoculate machines in time O(log|G|) assuming a constant rate of transmission. This theorem was “experimentally verified” by Chen and Carley (2005). What does this mean? –Centralized patch distribution is inefficient but… –Centralized patch distribution is safe. –Inefficiency is the cost of safety. Here is a real tradeoff: either we distribute patches quickly and prevent global infection at the risk of creating patch-based errors or we live with our current security model.

16 Conclusions Infectious agents in computer networks can be modeled using natural “random graph” models. These models are more appropriate than continuous mixing models. For scale-free random graph models, total infection is a.s. whenever  <  0, hence infections are a function of network structure as much as pathogen. Infection rates can be well described using the random graph model. There is a natural trade-off between security countermeasures efficiency and safety. This confirms experimental results presented by Chen and Carley.