Skip to main content
Log in

A cutting-plane algorithm for solving a weighted influence interdiction problem

  • Published:
Computational Optimization and Applications Aims and scope Submit manuscript

Abstract

We consider a two-stage defender-attacker game that takes place on a network, in which the attacker seeks to take control over (or “influence”) as many nodes as possible. The defender acts first in this game by protecting a subset of nodes that cannot be influenced by the attacker. With full knowledge of the defender’s action, the attacker can then influence an initial subset of unprotected nodes. The influence then spreads over a finite number of time stages, where an uninfluenced node becomes influenced at time t if a threshold number of its neighbors are influenced at time t−1. The attacker’s objective is to maximize the weighted number of nodes that are influenced over the time horizon, where the weights depend both on the node and on the time at which that is influenced. This defender-attacker game is especially difficult to optimize, because the attacker’s problem itself is NP-hard, which precludes a standard inner-dualization approach that is common in many interdiction studies. We provide three models for solving the attacker’s problem, and develop a tailored cutting-plane algorithm for solving the defender’s problem. We then demonstrate the computational efficacy of our proposed algorithms on a set of randomly generated instances.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1

Similar content being viewed by others

References

  1. Barabási, A., Albert, R.: Emergence of scaling in random networks. Science 286, 509–512 (1999)

    Article  MathSciNet  Google Scholar 

  2. Blum, J., Ding, M., Thaeler, A., Cheng, X.: Connected dominating set in sensor networks and MANETs. In: Du, D., Pardalos, P.M. (eds.) Handbook of Combinatorial Optimization Supplement Volume B, pp. 329–369. Springer, Berlin (2005)

    Chapter  Google Scholar 

  3. Brown, G.G., Carlyle, W.M., Salmerón, J., Wood, K.: Analyzing the vulnerability of critical infrastructure to attack and planning defenses. In: Greenberg, H.J., Smith, J.C. (eds.) Tutorials in Operations Research: Emerging Theory, Methods, and Applications, pp. 102–123. INFORMS, Hanover (2005)

    Google Scholar 

  4. Brown, G.G., Carlyle, W.M., Salmerón, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)

    Article  Google Scholar 

  5. Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the Twentieth International Conference on World Wide Web. ACM, New York (2011)

    Google Scholar 

  6. Chen, N.: On the approximability of influence in social networks. SIAM J. Discrete Math. 23(3), 1400–1415 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  7. Chung, F.R.K., Lu, L.: Complex Graphs and Networks. Am. Math. Soc., Providence (2006)

    MATH  Google Scholar 

  8. Dinh, T.N., Nguyen, D.T., Thai, M.T.: Cheap, easy, and massively effective viral marketing in social networks: truth or fiction? In: Proceedings of the Twenty Third ACM Conference on Hypertext and Social Media, pp. 165–174. ACM, New York (2012)

    Google Scholar 

  9. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, Princeton (1979)

    MATH  Google Scholar 

  10. Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12, 211–223 (2001)

    Article  Google Scholar 

  11. Guo, J., Niedermeier, R., Raible, D.: Improved algorithms and complexity results for power domination in graphs. In: Liskiewicz, M., Reischuk, R. (eds.) Fundamentals of Computation Theory. Lecture Notes in Computer Science, vol. 3623, pp. 172–184. Springer, Berlin (2005)

    Chapter  Google Scholar 

  12. Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM, New York (2003)

    Chapter  Google Scholar 

  13. Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the Thirteenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM, New York (2007)

    Google Scholar 

  14. Nemhauser, G.L., Wolsey, L.A., Fisher, M.L.: An analysis of the approximations for maximizing submodular set functions. Math. Program. 14, 265–294 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  15. Nguyen, N.P., Yan, G., Thai, M.T., Eidenbenz, S.: Containment of misinformation spread in online social networks. In: Proceedings of the Fourth ACM Web Science (2012)

    Google Scholar 

  16. Nicol, D., Liljenstam, M.: Models and analysis of active worm defense. In: Proceedings of the Third International Workshop on Mathematical Models, Architectures and Protocols for Computer Network Security (MMM-ACNS), pp. 38–53 (2005)

    Google Scholar 

  17. Shen, S.: Domination problems. In: Cochran, J. (ed.) Wiley Encyclopedia of Operations Research and Management Science, pp. 1470–1488. Wiley, Hoboken (2011)

    Google Scholar 

  18. Shen, S., Smith, J.C., Goli, R.: Exact interdiction models and algorithms for disconnecting networks via node deletions. Discrete Optim. 9(3), 172–188 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  19. Shen, Y., Dinh, T.N., Zhang, H., Thai, M.T.: Interest-matching information propagation in online social networks. In: ACM International Conference on Information and Knowledge Management (CIKM) (2012)

    Google Scholar 

  20. Smith, J.C.: Basic interdiction models. In: Cochran, J. (ed.) Wiley Encyclopedia of Operations Research and Management Science, pp. 323–330. Wiley, Hoboken (2011)

    Google Scholar 

  21. Smith, J.C., Lim, C.: Algorithms for network interdiction and fortification games. In: Migdalas, A., Pardalos, P.M., Pitsoulis, L., Chinchuluun, A. (eds.) Pareto Optimality, Game Theory and Equilibria. Nonconvex Optimization and Its Applications Series, pp. 609–644. Springer, New York (2008)

    Chapter  Google Scholar 

  22. Tanachaiwiwat, S., Helmy, A.: Encounter-based worms: analysis and defense. Ad Hoc Netw. 7(7), 1414–1430 (2009)

    Article  Google Scholar 

  23. von Stackelberg, H.: The Theory of the Market Economy. William Hodge & Co., London (1952)

    Google Scholar 

  24. Wood, R.K.: Deterministic network interdiction. Math. Comput. Model. 17(2), 1–18 (1993)

    Article  MATH  Google Scholar 

  25. Wu, J., Cardei, M., Dai, F., Yang, S.: Extended dominating set and its applications in ad hoc networks using cooperative communication. IEEE Trans. Parallel Distrib. Syst. 17(8), 851–864 (2006)

    Article  Google Scholar 

  26. Zhao, M., Kang, L., Chang, G.J.: Power domination in graphs. Discrete Math. 306(15), 1812–1816 (2006)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors are grateful for the comments of two anonymous referees, whose remarks led to an improved version of this paper. The authors also gratefully acknowledge the support of the “National Science Foundation under grants CMMI-1100765 and CAREER 0953284”, the Defense Threat Reduction Agency under grant HDTRA-10-01-0050, the Air Force Office of Scientific Research under grant FA9550-12-1-0353, and the Office of Naval Research under grant N000141310036.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Cole Smith.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hemmati, M., Cole Smith, J. & Thai, M.T. A cutting-plane algorithm for solving a weighted influence interdiction problem. Comput Optim Appl 57, 71–104 (2014). https://doi.org/10.1007/s10589-013-9589-9

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10589-013-9589-9

Keywords

Navigation