Discovering Hidden Groups in Communication Networks Jeffrey Baumes Mark Goldberg Malik Magdon-Ismail William Wallace.

Slides:



Advertisements
Similar presentations
T-Mon SERVER CONNECTOR
Advertisements

1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
By Lydia E. Kavraki, Petr Svestka, Jean-Claude Latombe, Mark H. Overmars Emre Dirican
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Lectures on Network Flows
Accelerometer-based Transportation Mode Detection on Smartphones
Chapter 10 Artificial Intelligence © 2007 Pearson Addison-Wesley. All rights reserved.
Overlay Networks + Internet routing has exhibited scalability - Internet routing is inefficient -Difficult to add intelligence to Internet Solution: Overlay.
1 How to securely outsource cryptographic computations Susan Hohenberger and Anna Lysyanskaya TCC2005.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Sensor Placement September 4, 2003 Tanya Berger-Wolf University of New Mexico Discrete Sensor Placement Problem Tanya Y. Berger-Wolf With William E. Hart.
© 2005 Prentice Hall8-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Performance Comparison of Existing Leader Election Algorithms for Dynamic Networks Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
On the Difficulty of Scalably Detecting Network Attacks Kirill Levchenko with Ramamohan Paturi and George Varghese.
Fast Isocontouring For Improved Interactivity Chandrajit L. Bajaj Valerio Pascucci Daniel R. Schikore.
Dynamics of Bridging and Bonding in Social Groups: A Multi-Agent Model Jeffrey Baumes, Hung-Ching Chen Matthew Francisco, Mark Goldberg Malik Magdon-Ismail,
MAC Protocol By Ervin Kulenica & Chien Pham.
Algorithm: For all e E t, define X e = {w e if e G t, 1 - w e otherwise}. Measure likelihood of substructure S by. Flag S as anomalous if, where is an.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Clustering Vertices of 3D Animated Meshes
Data Visualization and Feature Selection: New Algorithms for Nongaussian Data Howard Hua Yang and John Moody NIPS ’ 99.
COVERTNESS CENTRALITY IN NETWORKS Michael Ovelgönne UMIACS University of Maryland 1 Chanhyun Kang, Anshul Sawant Computer Science Dept.
8-1 Relations and Functions. RELATIONS Relation: A set of ordered pairs. Domain: The x values of the ordered pairs. Also known as the input value. Range:
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
 H cr(H ) Applied Mathematics Operations Research Simulation Science Computer Science.
Chapter 11: Artificial Intelligence
Chapter 10 Artificial Intelligence. © 2005 Pearson Addison-Wesley. All rights reserved 10-2 Chapter 10: Artificial Intelligence 10.1 Intelligence and.
Efficient Gathering of Correlated Data in Sensor Networks
A Sweeper Scheme for Localization and Mobility Prediction in Underwater Acoustic Sensor Networks K. T. DharanC. Srimathi*Soo-Hyun Park VIT University Vellore,
Finding dense components in weighted graphs Paul Horn
Efficient Identification of Overlapping Communities Jeffrey Baumes Mark Goldberg Malik Magdon-Ismail Rensselaer Polytechnic Institute, Troy, NY.
Vision & Recognition. From a different direction At different times, particularly if it has been modified in the interval In different light A particular.
ACT: Attachment Chain Tracing Scheme for Virus Detection and Control Jintao Xiong Proceedings of the 2004 ACM workshop on Rapid malcode Presented.
CACTUS – Clustering Categorical Data Using Summaries By Venkatesh Ganti, Johannes Gehrke and Raghu Ramakrishnan RongEn Li School of Informatics, Edinburgh.
A Graph-based Friend Recommendation System Using Genetic Algorithm
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Inferring Agent Dynamics from Social Communication Network Hung-Ching (Justin) Chen Mark Goldberg Malik Magdon-Ismail William A. Wallance RPI, Troy, NY.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 11: Artificial Intelligence Computer Science: An Overview Tenth Edition.
Workshop on Applications of Wireless Communications (WAWC 2008) 21 August 2008, Lappeenranta - Finland CONTROLLING EPIDEMICS IN WIRELESS NETWORKS Ranjan.
Sorts Tonga Institute of Higher Education. Introduction - 1 Sorting – The act of ordering data Often, we need to order data.  Example: Order a list of.
Fundamentals of Algorithms MCS - 2 Lecture # 15. Bubble Sort.
Attacks on PRNGs - By Nupura Neurgaonkar CS-265 (Prof. Mark Stamp)
Micro-Simulation of Diffusion of Warnings Cindy Hui Mark Goldberg Malik Magdon-Ismail William A. Wallace Rensselaer Polytechnic Institute This material.
MobiQuitous 2007 Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering Wei Gao.
Tarry vs Awerbuchs Shawn Biesan. Background Tarry’s Transversal Algorithm – Initiator forwards token to one of neighbors, each neighbor forwards token.
Identifying Multi-ID Users in Open Forums Hung-Ching Chen Mark Goldberg Malik Magdon-Ismail.
Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format.
A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets MobiHoc 2001.
By:miguel iturrade.  A computer network is a group of computers that are connected to each other for the purpose of communication.
Structure overview Introduction Analysis Design Implementation Evaluation Discussion Related works Conclusion.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Deploying Sensors for Maximum Coverage in Sensor Network Ruay-Shiung Chang Shuo-Hung Wang National Dong Hwa University IEEE International Wireless Communications.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Sharing personal knowledge over the Semantic Web ● We call personal knowledge the knowledge that is developed and shared by the users while they solve.
A New Class of Mobility Models for Ad Hoc Wireless Networks Rahul Amin Advisor: Dr. Carl Baum Clemson University SURE 2006.
Plan for today Introduction Graph Matching Method Theme Recognition Comparison Conclusion.
A Graph Theoretic Approach to Cache-Conscious Placement of Data for Direct Mapped Caches Mirza Beg and Peter van Beek University of Waterloo June
Chapter 11: Artificial Intelligence
Lectures on Network Flows
Finding Communities by Clustering a Graph into Overlapping Subgraphs
مفاهیم بهره وري.
Malik Magdon-Ismail, Konstantin Mertsalov, Mark Goldberg
Introduction Time is something we waist as a society
QoS routing Finding a path that can satisfy the QoS requirement of a connection. Achieving high resource utilization.
Presentation transcript:

Discovering Hidden Groups in Communication Networks Jeffrey Baumes Mark Goldberg Malik Magdon-Ismail William Wallace

What is a Hidden Group? Actors in a social network form groups. Some groups try to hide their communications in the background. How do we discover such hidden groups?

How to Find Hidden Groups Individual (semantic) analysis Automated structural/statistical analysis groups 100 actor society

How to Find Hidden Groups Need to preprocess the network based on structure alone Efficiently!

Which is the Hidden Group Time

Which is the Hidden Group Time

Which is the Hidden Group Time

Which is the Hidden Group Time

Goal Find a communication pattern to extract hidden group from background Design efficient algorithm Develop efficient implementation

Overview Hidden group communication patterns Efficient discovery algorithm Background communication models Simulation results Conclusions

Overview Hidden group communication patterns Efficient discovery algorithm Background communication models Simulation results Conclusions

Hidden Group Communication Pattern Assumption: group coordination within some time interval, connected Collect communications at this interval Distinguishing characteristic: –Hidden group connected in each of these networks, persistently connected

Internally Connected Groups Internally connected (non-trusting) groups pass information internally

Externally Connected Groups Externally connected (trusting) groups may use outside actors

A Hidden Group Time

A Hidden Group Time

A Hidden Group Time

A Hidden Group Time

Not a Hidden Group Time

Not a Hidden Group Time

Not a Hidden Group Time

Not a Hidden Group Time

Overview Hidden group communication patterns Efficient discovery algorithm Background communication models Simulation results Conclusions

Algorithm for Discovering Externally Connected Groups Find connected components of Network[1] These components are PHG[1] (possible hidden groups) For every remaining time step t : Find connected components of Network[t] PHG[t] is components intersected with PHG[t-1] Network[2]Network[1]

Algorithm for Discovering Externally Connected Groups Find connected components of Network[1] These components are PHG[1] (possible hidden groups) For every remaining time step t : Find connected components of Network[t] PHG[t] is components intersected with PHG[t-1] Network[2]Network[1]

Algorithm for Discovering Externally Connected Groups Find connected components of Network[1] These components are PHG[1] (possible hidden groups) For every remaining time step t : Find connected components of Network[t] PHG[t] is components intersected with PHG[t-1] Network[2]Network[1] PHG[1]

Algorithm for Discovering Externally Connected Groups Find connected components of Network[1] These components are PHG[1] (possible hidden groups) For every remaining time step t : Find connected components of Network[t] PHG[t] is components intersected with PHG[t-1] Network[2]Network[1] PHG[1]

Algorithm for Discovering Externally Connected Groups Find connected components of Network[1] These components are PHG[1] (possible hidden groups) For every remaining time step t : Find connected components of Network[t] PHG[t] is components intersected with PHG[t-1] Network[2]Network[1] PHG[1] PHG[2]

Algorithm for Discovering Internally Connected Groups Find connected components of Network[1] These components are PHG[1] For every remaining time step t : For all groups in PHG[t-1] : If internally connected in Network[t], put in PHG[t] Otherwise break into components, check each component in all other networks Network[2]Network[1]

Algorithm for Discovering Internally Connected Groups Find connected components of Network[1] These components are PHG[1] For every remaining time step t : For all groups in PHG[t-1] : If internally connected in Network[t], put in PHG[t] Otherwise break into components, check each component in all other networks Network[2]Network[1] PHG[1]

Algorithm for Discovering Internally Connected Groups Find connected components of Network[1] These components are PHG[1] For every remaining time step t : For all groups in PHG[t-1] : If internally connected in Network[t], put in PHG[t] Otherwise break into components, check each component in all other networks Network[2]Network[1] PHG[1]

Algorithm for Discovering Internally Connected Groups Find connected components of Network[1] These components are PHG[1] For every remaining time step t : For all groups in PHG[t-1] : If internally connected in Network[t], put in PHG[t] Otherwise break into components, check each component in all other networks Network[2]Network[1] PHG[1]

Algorithm for Discovering Internally Connected Groups Find connected components of Network[1] These components are PHG[1] For every remaining time step t : For all groups in PHG[t-1] : If internally connected in Network[t], put in PHG[t] Otherwise break into components, check each component in all other networks Network[2]Network[1] PHG[1]

Algorithm for Discovering Internally Connected Groups Find connected components of Network[1] These components are PHG[1] For every remaining time step t : For all groups in PHG[t-1] : If internally connected in Network[t], put in PHG[t] Otherwise break into components, check each component in all other networks Network[2]Network[1] PHG[1]

Algorithm for Discovering Internally Connected Groups Find connected components of Network[1] These components are PHG[1] For every remaining time step t : For all groups in PHG[t-1] : If internally connected in Network[t], put in PHG[t] Otherwise break into components, check each component in all other networks Network[2]Network[1] PHG[1] PHG[2]

Overview Hidden group communication patterns Efficient discovery algorithm Background communication models Simulation results Conclusions

Background Communication Models Uniform Random Graphs: (G(n,p) Graphs) Links spread uniformly Group Random Graphs: Most communication occurs within groups

Overview Hidden group communication patterns Efficient discovery algorithm Background communication models Simulation results Conclusions

Discovery Time How much data is needed? Given a hidden group size h : –How long until the hidden group is discovered? T(h) –Under what conditions are hidden groups discovered quickly?

PHG[1] Hidden group size h : Discovery Time 123

PHG[2] Hidden group size h : Discovery Time 123

PHG[3] Hidden group size h : Discovery Time 123

Theoretical G(n,p) Results → → Largest connected subgraph:

G(n,p), p = 1/n, ln n/n, c p = 1/n p = ln(n)/n p = 0.1

Random vs. Group Random 50 Groups ∞ : G(n,p)

Trusting vs. Non-trusting Internally connected (non-trusting) Externally connected (trusting)

Overview Hidden group communication patterns Efficient discovery algorithm Background communication models Simulation results Conclusions

When is it easier to discover hidden groups: Less intense background Less structured background Non-trusting hidden groups

Future Work Generalize hidden group pattern NP-hard Evolving background groups Practical approaches –Some actors are flagged –More structured internal hidden group communications