Title :
On the Vulnerability of Large Graphs
Author :
Tong, Hanghang ; Prakash, B. Aditya ; Tsourakakis, Charalampos ; Eliassi-Rad, Tina ; Faloutsos, Christos ; Chau, Duen Horng
Abstract :
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? We need (a) a measure of the ´Vulnerability´ of a given network, (b) a measure of the ´Shield-value´ of a specific set of k nodes and (c) a fast algorithm to choose the best such k nodes. We answer all these three questions: we give the justification behind our choices, we show that they agree with intuition as well as recent results in immunology. Moreover, we propose NetShield a fast and scalable algorithm. Finally, we give experiments on large real graphs, where NetShield achieves tremendous speed savings exceeding 7 orders of magnitude, against straightforward competitors.
Keywords :
computer network security; graph theory; set theory; NetShield; fast algorithm; large graph vulnerability; scalable algorithm; shield value; Vulnerability; graph mining; immunization; scalability;
Conference_Titel :
Data Mining (ICDM), 2010 IEEE 10th International Conference on
Conference_Location :
Sydney, NSW
Print_ISBN :
978-1-4244-9131-5
Electronic_ISBN :
1550-4786
DOI :
10.1109/ICDM.2010.54