Loading…
Worst-case scenarios for greedy, centrality-based network protection strategies
The task of allocating preventative resources to a computer network in order to protect against the spread of viruses is addressed. Virus spreading dynamics are described by a linearized SIS model and protection is framed by an optimization problem which maximizes the rate at which a virus in the ne...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 6 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Zarghamy, Michael Preciadoy, Victor |
description | The task of allocating preventative resources to a computer network in order to protect against the spread of viruses is addressed. Virus spreading dynamics are described by a linearized SIS model and protection is framed by an optimization problem which maximizes the rate at which a virus in the network is contained given finite resources. One approach to problems of this type involve greedy heuristics which allocate all resources to the nodes with large centrality measures. We address the worst case performance of such greedy algorithms be constructing networks for which these greedy allocations are arbitrarily inefficient. An example application is presented in which such a worst case network might arise naturally and our results are verified numerically by leveraging recent results which allow the exact optimal solution to be computed via geometric programming. |
doi_str_mv | 10.1109/CISS.2014.6814076 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6814076</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6814076</ieee_id><sourcerecordid>6814076</sourcerecordid><originalsourceid>FETCH-LOGICAL-i208t-54b26c5b214e0794e2804a70bdc1a733fab13fd3b2ae40c7058fc813d3cfb8e93</originalsourceid><addsrcrecordid>eNotj01LAzEYhONBUGt_gHjJD3DXNx-7SY6y-FEo9FDFY0myb0q0bkoSkP57F-xphpmHgSHkjkHLGJjHYbXdthyYbHvNJKj-gtwwqYwRAKy_IstSvmC2Zq5BX5PNZ8qlNt4WpMXjZHNMhYaU6T4jjqcHOoc120Osp8bN1EgnrL8pf9NjThV9jWmiZSYq7iOWW3IZ7KHg8qwL8vHy_D68NevN62p4WjeRg65NJx3vfec4kwjKSOQapFXgRs-sEiJYx0QYheMWJXgFnQ5eMzEKH5xGIxbk_n83IuLumOOPzafd-bP4A6AUTmc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Worst-case scenarios for greedy, centrality-based network protection strategies</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zarghamy, Michael ; Preciadoy, Victor</creator><creatorcontrib>Zarghamy, Michael ; Preciadoy, Victor</creatorcontrib><description>The task of allocating preventative resources to a computer network in order to protect against the spread of viruses is addressed. Virus spreading dynamics are described by a linearized SIS model and protection is framed by an optimization problem which maximizes the rate at which a virus in the network is contained given finite resources. One approach to problems of this type involve greedy heuristics which allocate all resources to the nodes with large centrality measures. We address the worst case performance of such greedy algorithms be constructing networks for which these greedy allocations are arbitrarily inefficient. An example application is presented in which such a worst case network might arise naturally and our results are verified numerically by leveraging recent results which allow the exact optimal solution to be computed via geometric programming.</description><identifier>EISBN: 1479930016</identifier><identifier>EISBN: 9781479930012</identifier><identifier>DOI: 10.1109/CISS.2014.6814076</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computers ; Eigenvalues and eigenfunctions ; Equations ; Immune system ; Resource management ; Tin ; Vectors</subject><ispartof>2014 48th Annual Conference on Information Sciences and Systems (CISS), 2014, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6814076$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6814076$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zarghamy, Michael</creatorcontrib><creatorcontrib>Preciadoy, Victor</creatorcontrib><title>Worst-case scenarios for greedy, centrality-based network protection strategies</title><title>2014 48th Annual Conference on Information Sciences and Systems (CISS)</title><addtitle>CISS</addtitle><description>The task of allocating preventative resources to a computer network in order to protect against the spread of viruses is addressed. Virus spreading dynamics are described by a linearized SIS model and protection is framed by an optimization problem which maximizes the rate at which a virus in the network is contained given finite resources. One approach to problems of this type involve greedy heuristics which allocate all resources to the nodes with large centrality measures. We address the worst case performance of such greedy algorithms be constructing networks for which these greedy allocations are arbitrarily inefficient. An example application is presented in which such a worst case network might arise naturally and our results are verified numerically by leveraging recent results which allow the exact optimal solution to be computed via geometric programming.</description><subject>Computers</subject><subject>Eigenvalues and eigenfunctions</subject><subject>Equations</subject><subject>Immune system</subject><subject>Resource management</subject><subject>Tin</subject><subject>Vectors</subject><isbn>1479930016</isbn><isbn>9781479930012</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2014</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj01LAzEYhONBUGt_gHjJD3DXNx-7SY6y-FEo9FDFY0myb0q0bkoSkP57F-xphpmHgSHkjkHLGJjHYbXdthyYbHvNJKj-gtwwqYwRAKy_IstSvmC2Zq5BX5PNZ8qlNt4WpMXjZHNMhYaU6T4jjqcHOoc120Osp8bN1EgnrL8pf9NjThV9jWmiZSYq7iOWW3IZ7KHg8qwL8vHy_D68NevN62p4WjeRg65NJx3vfec4kwjKSOQapFXgRs-sEiJYx0QYheMWJXgFnQ5eMzEKH5xGIxbk_n83IuLumOOPzafd-bP4A6AUTmc</recordid><startdate>20140301</startdate><enddate>20140301</enddate><creator>Zarghamy, Michael</creator><creator>Preciadoy, Victor</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20140301</creationdate><title>Worst-case scenarios for greedy, centrality-based network protection strategies</title><author>Zarghamy, Michael ; Preciadoy, Victor</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i208t-54b26c5b214e0794e2804a70bdc1a733fab13fd3b2ae40c7058fc813d3cfb8e93</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Computers</topic><topic>Eigenvalues and eigenfunctions</topic><topic>Equations</topic><topic>Immune system</topic><topic>Resource management</topic><topic>Tin</topic><topic>Vectors</topic><toplevel>online_resources</toplevel><creatorcontrib>Zarghamy, Michael</creatorcontrib><creatorcontrib>Preciadoy, Victor</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zarghamy, Michael</au><au>Preciadoy, Victor</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Worst-case scenarios for greedy, centrality-based network protection strategies</atitle><btitle>2014 48th Annual Conference on Information Sciences and Systems (CISS)</btitle><stitle>CISS</stitle><date>2014-03-01</date><risdate>2014</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><eisbn>1479930016</eisbn><eisbn>9781479930012</eisbn><abstract>The task of allocating preventative resources to a computer network in order to protect against the spread of viruses is addressed. Virus spreading dynamics are described by a linearized SIS model and protection is framed by an optimization problem which maximizes the rate at which a virus in the network is contained given finite resources. One approach to problems of this type involve greedy heuristics which allocate all resources to the nodes with large centrality measures. We address the worst case performance of such greedy algorithms be constructing networks for which these greedy allocations are arbitrarily inefficient. An example application is presented in which such a worst case network might arise naturally and our results are verified numerically by leveraging recent results which allow the exact optimal solution to be computed via geometric programming.</abstract><pub>IEEE</pub><doi>10.1109/CISS.2014.6814076</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISBN: 1479930016 |
ispartof | 2014 48th Annual Conference on Information Sciences and Systems (CISS), 2014, p.1-6 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6814076 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computers Eigenvalues and eigenfunctions Equations Immune system Resource management Tin Vectors |
title | Worst-case scenarios for greedy, centrality-based network protection strategies |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T13%3A24%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Worst-case%20scenarios%20for%20greedy,%20centrality-based%20network%20protection%20strategies&rft.btitle=2014%2048th%20Annual%20Conference%20on%20Information%20Sciences%20and%20Systems%20(CISS)&rft.au=Zarghamy,%20Michael&rft.date=2014-03-01&rft.spage=1&rft.epage=6&rft.pages=1-6&rft_id=info:doi/10.1109/CISS.2014.6814076&rft.eisbn=1479930016&rft.eisbn_list=9781479930012&rft_dat=%3Cieee_6IE%3E6814076%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i208t-54b26c5b214e0794e2804a70bdc1a733fab13fd3b2ae40c7058fc813d3cfb8e93%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6814076&rfr_iscdi=true |