Node Immunization on Large Graphs: Theory and Algorithms

Chen Chen, Hanghang Tong, B. Aditya Prakash, Charalampos E. Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, Duen Horng Chau

Research output: Contribution to journalArticle

25 Citations (Scopus)

Abstract

Given a large graph, like a computer communication network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? This problem, referred to as the node immunization problem, is the core building block in many high-impact applications, ranging from public health, cybersecurity to viral marketing. A central component in node immunization is to find the best k bridges of a given graph. In this setting, we typically want to determine the relative importance of a node (or a set of nodes) within the graph, for example, how valuable (as a bridge) a person or a group of persons is in a social network. First of all, we propose a novel 'bridging' score Δλ, inspired by immunology, and we show that its results agree with intuition for several realistic settings. Since the straightforward way to compute Δλ is computationally intractable, we then focus on the computational issues and propose a surprisingly efficient way (O(nk2+m) ) to estimate it. Experimental results on real graphs show that (1) the proposed 'bridging' score gives mining results consistent with intuition; and (2) the proposed fast solution is up to seven orders of magnitude faster than straightforward alternatives.

Original languageEnglish (US)
Article number7181715
Pages (from-to)113-126
Number of pages14
JournalIEEE Transactions on Knowledge and Data Engineering
Volume28
Issue number1
DOIs
StatePublished - Jan 1 2016

Fingerprint

Immunization
Graph theory
Immunology
Computer viruses
Public health
Telecommunication networks
Marketing

Keywords

  • graph mining
  • Immunization
  • scalability

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Information Systems
  • Computer Science Applications

Cite this

Chen, C., Tong, H., Prakash, B. A., Tsourakakis, C. E., Eliassi-Rad, T., Faloutsos, C., & Chau, D. H. (2016). Node Immunization on Large Graphs: Theory and Algorithms. IEEE Transactions on Knowledge and Data Engineering, 28(1), 113-126. [7181715]. https://doi.org/10.1109/TKDE.2015.2465378

Node Immunization on Large Graphs : Theory and Algorithms. / Chen, Chen; Tong, Hanghang; Prakash, B. Aditya; Tsourakakis, Charalampos E.; Eliassi-Rad, Tina; Faloutsos, Christos; Chau, Duen Horng.

In: IEEE Transactions on Knowledge and Data Engineering, Vol. 28, No. 1, 7181715, 01.01.2016, p. 113-126.

Research output: Contribution to journalArticle

Chen, C, Tong, H, Prakash, BA, Tsourakakis, CE, Eliassi-Rad, T, Faloutsos, C & Chau, DH 2016, 'Node Immunization on Large Graphs: Theory and Algorithms', IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 1, 7181715, pp. 113-126. https://doi.org/10.1109/TKDE.2015.2465378
Chen C, Tong H, Prakash BA, Tsourakakis CE, Eliassi-Rad T, Faloutsos C et al. Node Immunization on Large Graphs: Theory and Algorithms. IEEE Transactions on Knowledge and Data Engineering. 2016 Jan 1;28(1):113-126. 7181715. https://doi.org/10.1109/TKDE.2015.2465378
Chen, Chen ; Tong, Hanghang ; Prakash, B. Aditya ; Tsourakakis, Charalampos E. ; Eliassi-Rad, Tina ; Faloutsos, Christos ; Chau, Duen Horng. / Node Immunization on Large Graphs : Theory and Algorithms. In: IEEE Transactions on Knowledge and Data Engineering. 2016 ; Vol. 28, No. 1. pp. 113-126.
@article{30f7d9b618f84336a44e9a1d091eb1fe,
title = "Node Immunization on Large Graphs: Theory and Algorithms",
abstract = "Given a large graph, like a computer communication network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? This problem, referred to as the node immunization problem, is the core building block in many high-impact applications, ranging from public health, cybersecurity to viral marketing. A central component in node immunization is to find the best k bridges of a given graph. In this setting, we typically want to determine the relative importance of a node (or a set of nodes) within the graph, for example, how valuable (as a bridge) a person or a group of persons is in a social network. First of all, we propose a novel 'bridging' score Δλ, inspired by immunology, and we show that its results agree with intuition for several realistic settings. Since the straightforward way to compute Δλ is computationally intractable, we then focus on the computational issues and propose a surprisingly efficient way (O(nk2+m) ) to estimate it. Experimental results on real graphs show that (1) the proposed 'bridging' score gives mining results consistent with intuition; and (2) the proposed fast solution is up to seven orders of magnitude faster than straightforward alternatives.",
keywords = "graph mining, Immunization, scalability",
author = "Chen Chen and Hanghang Tong and Prakash, {B. Aditya} and Tsourakakis, {Charalampos E.} and Tina Eliassi-Rad and Christos Faloutsos and Chau, {Duen Horng}",
year = "2016",
month = "1",
day = "1",
doi = "10.1109/TKDE.2015.2465378",
language = "English (US)",
volume = "28",
pages = "113--126",
journal = "IEEE Transactions on Knowledge and Data Engineering",
issn = "1041-4347",
publisher = "IEEE Computer Society",
number = "1",

}

TY - JOUR

T1 - Node Immunization on Large Graphs

T2 - Theory and Algorithms

AU - Chen, Chen

AU - Tong, Hanghang

AU - Prakash, B. Aditya

AU - Tsourakakis, Charalampos E.

AU - Eliassi-Rad, Tina

AU - Faloutsos, Christos

AU - Chau, Duen Horng

PY - 2016/1/1

Y1 - 2016/1/1

N2 - Given a large graph, like a computer communication network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? This problem, referred to as the node immunization problem, is the core building block in many high-impact applications, ranging from public health, cybersecurity to viral marketing. A central component in node immunization is to find the best k bridges of a given graph. In this setting, we typically want to determine the relative importance of a node (or a set of nodes) within the graph, for example, how valuable (as a bridge) a person or a group of persons is in a social network. First of all, we propose a novel 'bridging' score Δλ, inspired by immunology, and we show that its results agree with intuition for several realistic settings. Since the straightforward way to compute Δλ is computationally intractable, we then focus on the computational issues and propose a surprisingly efficient way (O(nk2+m) ) to estimate it. Experimental results on real graphs show that (1) the proposed 'bridging' score gives mining results consistent with intuition; and (2) the proposed fast solution is up to seven orders of magnitude faster than straightforward alternatives.

AB - Given a large graph, like a computer communication network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? This problem, referred to as the node immunization problem, is the core building block in many high-impact applications, ranging from public health, cybersecurity to viral marketing. A central component in node immunization is to find the best k bridges of a given graph. In this setting, we typically want to determine the relative importance of a node (or a set of nodes) within the graph, for example, how valuable (as a bridge) a person or a group of persons is in a social network. First of all, we propose a novel 'bridging' score Δλ, inspired by immunology, and we show that its results agree with intuition for several realistic settings. Since the straightforward way to compute Δλ is computationally intractable, we then focus on the computational issues and propose a surprisingly efficient way (O(nk2+m) ) to estimate it. Experimental results on real graphs show that (1) the proposed 'bridging' score gives mining results consistent with intuition; and (2) the proposed fast solution is up to seven orders of magnitude faster than straightforward alternatives.

KW - graph mining

KW - Immunization

KW - scalability

UR - http://www.scopus.com/inward/record.url?scp=84961625682&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84961625682&partnerID=8YFLogxK

U2 - 10.1109/TKDE.2015.2465378

DO - 10.1109/TKDE.2015.2465378

M3 - Article

AN - SCOPUS:84961625682

VL - 28

SP - 113

EP - 126

JO - IEEE Transactions on Knowledge and Data Engineering

JF - IEEE Transactions on Knowledge and Data Engineering

SN - 1041-4347

IS - 1

M1 - 7181715

ER -