-
Generating realistic scaled complex networks
Authors:
Christian L. Staudt,
Michael Hamann,
Alexander Gutfraind,
Ilya Safro,
Henning Meyerhenke
Abstract:
Research on generative models is a central project in the emerging field of network science, and it studies how statistical patterns found in real networks could be generated by formal rules. Output from these generative models is then the basis for designing and evaluating computational methods on networks, and for verification and simulation studies. During the last two decades, a variety of mod…
▽ More
Research on generative models is a central project in the emerging field of network science, and it studies how statistical patterns found in real networks could be generated by formal rules. Output from these generative models is then the basis for designing and evaluating computational methods on networks, and for verification and simulation studies. During the last two decades, a variety of models has been proposed with an ultimate goal of achieving comprehensive realism for the generated networks. In this study, we (a) introduce a new generator, termed ReCoN; (b) explore how ReCoN and some existing models can be fitted to an original network to produce a structurally similar replica, (c) use ReCoN to produce networks much larger than the original exemplar, and finally (d) discuss open problems and promising research directions. In a comparative experimental study, we find that ReCoN is often superior to many other state-of-the-art network generation methods. We argue that ReCoN is a scalable and effective tool for modeling a given network while preserving important properties at both micro- and macroscopic scales, and for scaling the exemplar data by orders of magnitude in size.
△ Less
Submitted 23 March, 2017; v1 submitted 7 September, 2016;
originally announced September 2016.
-
Operational resilience: concepts, design and analysis
Authors:
Alexander A. Ganin,
Emanuele Massaro,
Alexander Gutfraind,
Nicolas Steen,
Jeffrey M. Keisler,
Alexander Kott,
Rami Mangoubi,
Igor Linkov
Abstract:
Building resilience into today's complex infrastructures is critical to the daily functioning of society and its ability to withstand and recover from natural disasters, epidemics, and cyber-threats. This study proposes quantitative measures that implement the definition of engineering resilience advanced by the National Academy of Sciences. The approach is applicable across physical, information,…
▽ More
Building resilience into today's complex infrastructures is critical to the daily functioning of society and its ability to withstand and recover from natural disasters, epidemics, and cyber-threats. This study proposes quantitative measures that implement the definition of engineering resilience advanced by the National Academy of Sciences. The approach is applicable across physical, information, and social domains. It evaluates the critical functionality, defined as a performance function of time set by the stakeholders. Critical functionality is a source of valuable information, such as the integrated system resilience over a time interval, and its robustness. The paper demonstrates the formulation on two classes of models: 1) multi-level directed acyclic graphs, and 2) interdependent coupled networks. For both models synthetic case studies are used to explore trends. For the first class, the approach is also applied to the Linux operating system. Results indicate that desired resilience and robustness levels are achievable by trading off different design parameters, such as redundancy, node recovery time, and backup supply available. The nonlinear relationship between network parameters and resilience levels confirms the utility of the proposed approach, which is of benefit to analysts and designers of complex systems and networks.
△ Less
Submitted 5 August, 2015;
originally announced August 2015.
-
Multiscale Network Generation
Authors:
Alexander Gutfraind,
Lauren Ancel Meyers,
Ilya Safro
Abstract:
Networks are widely used in science and technology to represent relationships between entities, such as social or ecological links between organisms, enzymatic interactions in metabolic systems, or computer infrastructure. Statistical analyses of networks can provide critical insights into the structure, function, dynamics, and evolution of those systems. However, the structures of real-world netw…
▽ More
Networks are widely used in science and technology to represent relationships between entities, such as social or ecological links between organisms, enzymatic interactions in metabolic systems, or computer infrastructure. Statistical analyses of networks can provide critical insights into the structure, function, dynamics, and evolution of those systems. However, the structures of real-world networks are often not known completely, and they may exhibit considerable variation so that no single network is sufficiently representative of a system. In such situations, researchers may turn to proxy data from related systems, sophisticated methods for network inference, or synthetic networks. Here, we introduce a flexible method for synthesizing realistic ensembles of networks starting from a known network, through a series of map**s that coarsen and later refine the network structure by randomized editing. The method, MUSKETEER, preserves structural properties with minimal bias, including unknown or unspecified features, while introducing realistic variability at multiple scales. Using examples from several domains, we show that MUSKETEER produces the intended stochasticity while achieving greater fidelity across a suite of network properties than do other commonly used network generation algorithms.
△ Less
Submitted 18 July, 2012;
originally announced July 2012.
-
Targeting by Transnational Terrorist Groups
Authors:
Alexander Gutfraind
Abstract:
Many successful terrorist groups operate across international borders where different countries host different stages of terrorist operations. Often the recruits for the group come from one country or countries, while the targets of the operations are in another. Stop** such attacks is difficult because intervention in any region or route might merely shift the terrorists elsewhere. Here we prop…
▽ More
Many successful terrorist groups operate across international borders where different countries host different stages of terrorist operations. Often the recruits for the group come from one country or countries, while the targets of the operations are in another. Stop** such attacks is difficult because intervention in any region or route might merely shift the terrorists elsewhere. Here we propose a model of transnational terrorism based on the theory of activity networks. The model represents attacks on different countries as paths in a network. The group is assumed to prefer paths of lowest cost (or risk) and maximal yield from attacks. The parameters of the model are computed for the Islamist-Salafi terrorist movement based on open source data and then used for estimation of risks of future attacks. The central finding is that the USA has an enduring appeal as a target, due to lack of other nations of matching geopolitical weight or openness. It is also shown that countries in Africa and Asia that have been overlooked as terrorist bases may become highly significant threats in the future. The model quantifies the dilemmas facing countries in the effort to cut such networks, and points to a limitation of deterrence against transnational terrorists.
△ Less
Submitted 27 August, 2010;
originally announced August 2010.
-
Monotonic and Non-Monotonic Epidemiological Models on Networks
Authors:
Alexander Gutfraind
Abstract:
Contact networks can significantly change the course of epidemics, affecting the rate of new infections and the mean size of an outbreak. Despite this dependence, some characteristics of epidemics are not contingent on the contact network and are probably predictable based only on the pathogen. Here we consider SIR-like pathogens and give an elementary proof that for any network increasing the pro…
▽ More
Contact networks can significantly change the course of epidemics, affecting the rate of new infections and the mean size of an outbreak. Despite this dependence, some characteristics of epidemics are not contingent on the contact network and are probably predictable based only on the pathogen. Here we consider SIR-like pathogens and give an elementary proof that for any network increasing the probability of transmission increases the mean outbreak size. We also introduce a simple model, termed 2FleeSIR, in which susceptibles protect themselves by avoiding contacts with infectees. The 2FleeSIR model is non-monotonic: for some networks, increasing transmissibility actually decreases the final extent. The dynamics of 2FleeSIR are fundamentally different from SIR because 2FleeSIR exhibits no outbreak transition in densely-connected networks. We show that in non-monotonic epidemics, public health officials might be able to intervene in a fundamentally new way to change the network so as to control the effect of unexpectedly-high virulence. However, interventions that decrease transmissibility might actually cause more people to become infected.
△ Less
Submitted 25 May, 2011; v1 submitted 19 May, 2010;
originally announced May 2010.