DocumentCode :
2210391
Title :
On the Vulnerability of Large Graphs
Author :
Tong, Hanghang ; Prakash, B. Aditya ; Tsourakakis, Charalampos ; Eliassi-Rad, Tina ; Faloutsos, Christos ; Chau, Duen Horng
fYear :
2010
fDate :
13-17 Dec. 2010
Firstpage :
1091
Lastpage :
1096
Abstract :
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? We need (a) a measure of the ´Vulnerability´ of a given network, (b) a measure of the ´Shield-value´ of a specific set of k nodes and (c) a fast algorithm to choose the best such k nodes. We answer all these three questions: we give the justification behind our choices, we show that they agree with intuition as well as recent results in immunology. Moreover, we propose NetShield a fast and scalable algorithm. Finally, we give experiments on large real graphs, where NetShield achieves tremendous speed savings exceeding 7 orders of magnitude, against straightforward competitors.
Keywords :
computer network security; graph theory; set theory; NetShield; fast algorithm; large graph vulnerability; scalable algorithm; shield value; Vulnerability; graph mining; immunization; scalability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Data Mining (ICDM), 2010 IEEE 10th International Conference on
Conference_Location :
Sydney, NSW
ISSN :
1550-4786
Print_ISBN :
978-1-4244-9131-5
Electronic_ISBN :
1550-4786
Type :
conf
DOI :
10.1109/ICDM.2010.54
Filename :
5694090
Link To Document :
بازگشت