Skip to main content

Time-Efficient Network Monitoring Through Confined Search and Adaptive Evaluation

  • Conference paper
  • First Online:
Book cover PRICAI 2019: Trends in Artificial Intelligence (PRICAI 2019)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11671))

Included in the following conference series:

  • 2612 Accesses

Abstract

The network monitoring problem, crucial to many applications from outbreak prevention to online rumor management, demands an optimal set of monitors to detect the spreading of infections or rumors over a network. We tackle this problem through solving a type of facility location problem where the monitored nodes are selected to minimize their distance to other nodes. Existing methods for this problem either consume prohibitively long time for large networks, lack of reasonable theoretical performance guarantees, or are very difficult to implement. We propose a new algorithm, \(\mathsf {csav}\), which combines a novel technique to reduce the search space with an iterative improvement mechanism. Our algorithm outputs a logarithmic number of monitors in \(\tilde{O}(|E|)\) time. We perform empirical analysis over both synthesized and real-world networks as well as three propagation models. The results show that \(\mathsf {csav}\) achieves superior performance over a number of benchmark algorithms. In particular, it produces outputs that are comparable to the well-established local search at only a fraction of its running time. Our approach is hence a scalable and time-efficient method for the network monitoring problem.

This work was supported by the National Natural Science Foundation of China (61772503).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    [https://github.com/networkmonitor2019/appendix/blob/master/cplex-proof.pdf].

  2. 2.

    Power grid, soc-douban are available in [konect.uni-koblenz.de/networks]; ca-GrQc, ca-HepPh, astro-ph, Enron, NotreDame are available in [snap.stanford.edu]; OL_road, TG_road, CA_road, San_road are available in [www.cs.utah.edu/~lifeifei]; ca-citeseer is available in [www.networkrepository.com].

  3. 3.

    Running times are based on experiments performed on a server with a 96 Core Intel Xeon CPU E7540 2.40 GHz. Algorithms are implemented using Python 2.6.6, which is available at [https://github.com/networkmonitor2019/Code].

  4. 4.

    [https://github.com/networkmonitor2019/appendix/blob/master/KL-400.pdf].

  5. 5.

    Abundant linear topologies in CA_road or San_road prevent IC from outbreaking, which makes all algorithms indistinguishable.

  6. 6.

    [https://github.com/networkmonitor2019/appendix/blob/master/vary-k.pdf].

References

  1. Arya, V., Garg, N., Khandekar, R., Meyerson, A., Munagala, K., Pandit, V.: Local search heuristics for k-median and facility location problems. SIAM J. Comput. 33(3), 544–562 (2004)

    Article  MathSciNet  Google Scholar 

  2. Awasthi, P., Bandeira, A.S., Charikar, M., Krishnaswamy, R., Villar, S., Ward, R.: Relax, no need to round: Integrality of clustering formulations. In: Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, pp. 191–200. ACM (2015)

    Google Scholar 

  3. Charikar, M., Guha, S., Tardos, É., Shmoys, D.B.: A constant-factor approximation algorithm for the k-median problem. In: Proceedings of the Thirty-First Annual ACM Symposium on Theory of computing, pp. 1–10. ACM (1999)

    Google Scholar 

  4. Charikar, M., Li, S.: A dependent LP-rounding approach for the k-median problem. In: Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. (eds.) ICALP 2012. LNCS, vol. 7391, pp. 194–205. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31594-7_17

    Chapter  Google Scholar 

  5. Chen, D., Lü, L., Shang, M.S., Zhang, Y.C., Zhou, T.: Identifying influential nodes in complex networks. Phys. A 391(4), 1777–1787 (2012)

    Article  Google Scholar 

  6. Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings SIGKDD 2009, pp. 199–208. ACM (2009)

    Google Scholar 

  7. Chen, Z., Gao, L., Kwiat, K.: Modeling the spread of active worms. In: Proceedings INFOCOM 2003, vol. 3, pp. 1890–1900. IEEE (2003)

    Google Scholar 

  8. Gilbert, E.N.: Random plane networks. J. Soc. Ind. Appl. Math. 9(4), 533–543 (1961)

    Article  MathSciNet  Google Scholar 

  9. Jain, K., Mahdian, M., Markakis, E., Saberi, A., Vazirani, V.V.: Greedy facility location algorithms analyzed using dual fitting with factor-revealing LP. J. ACM (JACM) 50(6), 795–824 (2003)

    Article  MathSciNet  Google Scholar 

  10. Kariv, O., Hakimi, S.L.: An algorithmic approach to network location problems. i: the p-centers. SIAM J. Appl. Math. 37(3), 513–538 (1979)

    Article  MathSciNet  Google Scholar 

  11. Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM (2007)

    Google Scholar 

  12. Moores, G., Shakarian, P., Macdonald, B., Howard, N.: Finding near-optimal groups of epidemic spreaders in a complex network. PLoS ONE 9(4), e90303 (2014)

    Article  Google Scholar 

  13. Moskvina, A., Liu, J.: How to build your network? a structural analysis. In: Proceedings IJCAI-16, pp. 2597–2603. AAAI Press (2016)

    Google Scholar 

  14. Nagarajan, C., Williamson, D.P.: An experimental evaluation of incremental and hierarchical k-median algorithms. In: Pardalos, P.M., Rebennack, S. (eds.) SEA 2011. LNCS, vol. 6630, pp. 169–180. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20662-7_15

    Chapter  Google Scholar 

  15. Nekovee, M., Moreno, Y., Bianconi, G., Marsili, M.: Theory of rumour spreading in complex social networks. Phys. A 374(1), 457–470 (2007)

    Article  Google Scholar 

  16. Thorup, M.: Quick k-median, k-center, and facility location for sparse graphs. SIAM Journal on Computing 34(2), 405–432 (2005)

    Article  MathSciNet  Google Scholar 

  17. Tsai, J., Nguyen, T.H., Tambe, M.: Security Games for Controlling Contagion. AAAI (2012)

    Google Scholar 

  18. Wang, D.E.J.: Fast approximation of centrality. Graph Algorithms. Appl. 5(5), 39 (2006)

    MathSciNet  MATH  Google Scholar 

  19. Yan, B., Chen, Y., Liu, J.: Dynamic relationship building: exploitation versus exploration on a social network. In: Bouguettaya, A., et al. (eds.) WISE 2017. LNCS, vol. 10569, pp. 75–90. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68783-4_6

    Chapter  Google Scholar 

  20. Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings CCS 2003, pp. 190–199. ACM (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qifu Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, Q., Li, A., Liu, J., Liu, J. (2019). Time-Efficient Network Monitoring Through Confined Search and Adaptive Evaluation. In: Nayak, A., Sharma, A. (eds) PRICAI 2019: Trends in Artificial Intelligence. PRICAI 2019. Lecture Notes in Computer Science(), vol 11671. Springer, Cham. https://doi.org/10.1007/978-3-030-29911-8_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29911-8_49

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29910-1

  • Online ISBN: 978-3-030-29911-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics