Abstract
The network monitoring problem, crucial to many applications from outbreak prevention to online rumor management, demands an optimal set of monitors to detect the spreading of infections or rumors over a network. We tackle this problem through solving a type of facility location problem where the monitored nodes are selected to minimize their distance to other nodes. Existing methods for this problem either consume prohibitively long time for large networks, lack of reasonable theoretical performance guarantees, or are very difficult to implement. We propose a new algorithm, \(\mathsf {csav}\), which combines a novel technique to reduce the search space with an iterative improvement mechanism. Our algorithm outputs a logarithmic number of monitors in \(\tilde{O}(|E|)\) time. We perform empirical analysis over both synthesized and real-world networks as well as three propagation models. The results show that \(\mathsf {csav}\) achieves superior performance over a number of benchmark algorithms. In particular, it produces outputs that are comparable to the well-established local search at only a fraction of its running time. Our approach is hence a scalable and time-efficient method for the network monitoring problem.
This work was supported by the National Natural Science Foundation of China (61772503).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Power grid, soc-douban are available in [konect.uni-koblenz.de/networks]; ca-GrQc, ca-HepPh, astro-ph, Enron, NotreDame are available in [snap.stanford.edu]; OL_road, TG_road, CA_road, San_road are available in [www.cs.utah.edu/~lifeifei]; ca-citeseer is available in [www.networkrepository.com].
- 3.
Running times are based on experiments performed on a server with a 96 Core Intel Xeon CPU E7540 2.40Â GHz. Algorithms are implemented using Python 2.6.6, which is available at [https://github.com/networkmonitor2019/Code].
- 4.
- 5.
Abundant linear topologies in CA_road or San_road prevent IC from outbreaking, which makes all algorithms indistinguishable.
- 6.
References
Arya, V., Garg, N., Khandekar, R., Meyerson, A., Munagala, K., Pandit, V.: Local search heuristics for k-median and facility location problems. SIAM J. Comput. 33(3), 544–562 (2004)
Awasthi, P., Bandeira, A.S., Charikar, M., Krishnaswamy, R., Villar, S., Ward, R.: Relax, no need to round: Integrality of clustering formulations. In: Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, pp. 191–200. ACM (2015)
Charikar, M., Guha, S., Tardos, É., Shmoys, D.B.: A constant-factor approximation algorithm for the k-median problem. In: Proceedings of the Thirty-First Annual ACM Symposium on Theory of computing, pp. 1–10. ACM (1999)
Charikar, M., Li, S.: A dependent LP-rounding approach for the k-median problem. In: Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. (eds.) ICALP 2012. LNCS, vol. 7391, pp. 194–205. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31594-7_17
Chen, D., Lü, L., Shang, M.S., Zhang, Y.C., Zhou, T.: Identifying influential nodes in complex networks. Phys. A 391(4), 1777–1787 (2012)
Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings SIGKDD 2009, pp. 199–208. ACM (2009)
Chen, Z., Gao, L., Kwiat, K.: Modeling the spread of active worms. In: Proceedings INFOCOM 2003, vol. 3, pp. 1890–1900. IEEE (2003)
Gilbert, E.N.: Random plane networks. J. Soc. Ind. Appl. Math. 9(4), 533–543 (1961)
Jain, K., Mahdian, M., Markakis, E., Saberi, A., Vazirani, V.V.: Greedy facility location algorithms analyzed using dual fitting with factor-revealing LP. J. ACM (JACM) 50(6), 795–824 (2003)
Kariv, O., Hakimi, S.L.: An algorithmic approach to network location problems. i: the p-centers. SIAM J. Appl. Math. 37(3), 513–538 (1979)
Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM (2007)
Moores, G., Shakarian, P., Macdonald, B., Howard, N.: Finding near-optimal groups of epidemic spreaders in a complex network. PLoS ONE 9(4), e90303 (2014)
Moskvina, A., Liu, J.: How to build your network? a structural analysis. In: Proceedings IJCAI-16, pp. 2597–2603. AAAI Press (2016)
Nagarajan, C., Williamson, D.P.: An experimental evaluation of incremental and hierarchical k-median algorithms. In: Pardalos, P.M., Rebennack, S. (eds.) SEA 2011. LNCS, vol. 6630, pp. 169–180. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20662-7_15
Nekovee, M., Moreno, Y., Bianconi, G., Marsili, M.: Theory of rumour spreading in complex social networks. Phys. A 374(1), 457–470 (2007)
Thorup, M.: Quick k-median, k-center, and facility location for sparse graphs. SIAM Journal on Computing 34(2), 405–432 (2005)
Tsai, J., Nguyen, T.H., Tambe, M.: Security Games for Controlling Contagion. AAAI (2012)
Wang, D.E.J.: Fast approximation of centrality. Graph Algorithms. Appl. 5(5), 39 (2006)
Yan, B., Chen, Y., Liu, J.: Dynamic relationship building: exploitation versus exploration on a social network. In: Bouguettaya, A., et al. (eds.) WISE 2017. LNCS, vol. 10569, pp. 75–90. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68783-4_6
Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings CCS 2003, pp. 190–199. ACM (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Hu, Q., Li, A., Liu, J., Liu, J. (2019). Time-Efficient Network Monitoring Through Confined Search and Adaptive Evaluation. In: Nayak, A., Sharma, A. (eds) PRICAI 2019: Trends in Artificial Intelligence. PRICAI 2019. Lecture Notes in Computer Science(), vol 11671. Springer, Cham. https://doi.org/10.1007/978-3-030-29911-8_49
Download citation
DOI: https://doi.org/10.1007/978-3-030-29911-8_49
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29910-1
Online ISBN: 978-3-030-29911-8
eBook Packages: Computer ScienceComputer Science (R0)