Thank you! NetMine Data mining on networks IIS AWSOM. Outline. Proposed method. Goals

Size: px
Start display at page:

Download "Thank you! NetMine Data mining on networks IIS -0209107 AWSOM. Outline. Proposed method. Goals"

Transcription

1 NetMine Data mining on networks IIS Christos Faloutsos (CMU) Michalis Faloutsos (UCR) Peggy Agouris George Kollios Fillia Makedon Betty Salzberg Anthony Stefanidis Thank you! NSF-IDM 04 C. Faloutsos & M. Faloutsos 1 NSF-IDM 04 C. Faloutsos & M. Faloutsos 2 Single-link traffic characterization AWSOM Given: a semi-infinite time sequence x 1, x 2, x t, Find: patterns, outliers, and forecast (Traffic matrix) NSF-IDM 04 C. Faloutsos & M. Faloutsos 3 Periodicity? (daily) NSF-IDM 04 C. Faloutsos & M. Faloutsos 4 Goals AUTOMATIC Adapt and handle arbitrary periodic components No human intervention/tuning STREAMING Single pass over the data Limited memory (logarithmic) Any-time frequency Proposed method W l,t W l,t-2 W l,t = b l,1 W l,t-1 + b l,2 W l,t-2 + W l,t-1 W W W l,t -2 l,t -1 l,t W l,t = b l,1 W l,t -1 + b l,2 W l,t -2 + time [VLDB 03] Math NSF-IDM 04 C. Faloutsos & M. Faloutsos 5 NSF-IDM 04 C. Faloutsos & M. Faloutsos 6 1

2 Results Real data Automobile Results Real data Sunspot Automobile traffic Daily periodicity with rush-hour peaks AR fails to capture any trend (average) Seasonal AR estimation fails AWSOM captures periodicity automatically Sunspot intensity Slightly time-varying period AR captures wrong trend (average) Seasonal ARIMA Captures immediate wrong downward trend Requires human to determine seasonal component period (fixed) NSF-IDM 04 C. Faloutsos & M. Faloutsos 7 NSF-IDM 04 C. Faloutsos & M. Faloutsos 8 The SELFIS tool Traffic characterization Is it Poisson? Is there long range dependency (~ self-similarity)? Which of the 4+ methods for LRD should we use? NSF-IDM 04 C. Faloutsos & M. Faloutsos 9 NSF-IDM 04 C. Faloutsos & M. Faloutsos 10 The SELFIS tool Traffic characterization LRD analysis tool by Karagiannis at UCR downloads, from around the world NSF-IDM 04 C. Faloutsos & M. Faloutsos 11 NSF-IDM 04 C. Faloutsos & M. Faloutsos 12 2

3 Introduction Framework Given a graph, (computer/social/ etc network) Will a virus/rumor/fad take over? Needle exchange networks of drug users [Weeks et al. 2002] Susceptible-Infected-Susceptible (SIS) model (like, say, flu ) Cured nodes immediately become susceptible β : (virus) birth rate = prob. an infected neighbor attacks me δ : (virus) death rate = prob. I heal NSF-IDM 04 C. Faloutsos & M. Faloutsos 13 NSF-IDM 04 C. Faloutsos & M. Faloutsos 14 t Defined as the value of τ, such that if β / δ < τ an epidemic can not happen Thus, given a graph compute its epidemic threshold t What should τ depend on? avg. degree? and/or highest degree? and/or variance of degree? and/or something else? NSF-IDM 04 C. Faloutsos & M. Faloutsos 15 NSF-IDM 04 C. Faloutsos & M. Faloutsos 16 Homogeneous graphs: 1/<k> BA (γ=3) <k> / <k 2 > more complicated graphs? arbitrary, REAL graphs? [Theorem] We have no epidemic, if ß/d <t = 1/? 1,A how many parameters?? NSF-IDM 04 C. Faloutsos & M. Faloutsos 17 NSF-IDM 04 C. Faloutsos & M. Faloutsos 18 3

4 [Theorem] We have no epidemic, if recovery prob. attack prob. Proof: [Wang+03] epidemic threshold ß/d <t = 1/? 1,A largest eigenvalue of adj. matrix A Experiments 2 graphs Star network: one hub + 99 spokes Oregon Internet AS graph: 10,900 nodes, edges topology.eecs.umich.edu/data.html NSF-IDM 04 C. Faloutsos & M. Faloutsos 19 NSF-IDM 04 C. Faloutsos & M. Faloutsos 20 Number of Infected Nodes Experiments (Star) Star ß= Time d: ß/d > t (above threshold) ß/d = t (at the threshold) ß/d < t (below threshold) NSF-IDM 04 C. Faloutsos & M. Faloutsos 21 Number of Infected Nodes Experiments (Oregon) Oregon ß = Time d: ß/d > t (above threshold) ß/d = t (at the threshold) ß/d < t (below threshold) NSF-IDM 04 C. Faloutsos & M. Faloutsos 22 Overall conclusions Automatic stream mining: AWSOM; Tool for Long Range Dependencies (LRD): SELFIS graphs and virus propagation: eigenvalue Related work Network traffic network tomography [w/ Airoldi +] Graphs and topology graph partitioning [w/ Deepay+] important subgraphs [w/ Tomkins + McCurley] graph generators [RMAT, w/ Deepay] NSF-IDM 04 C. Faloutsos & M. Faloutsos 23 NSF-IDM 04 C. Faloutsos & M. Faloutsos 24 4

5 SpirosPapadimitriou, Anthony Brockwell and Christos Faloutsos Adaptive, Hands-Off Stream Mining VLDB 2003, Berlin, Germany, Sept (invited for fast track publication to VLDB-Journal) Yasushi Sakurai, Spiros Papadimitriou, Christos Faloutsos AutoLag: Automatic Discovery of Lag Correlations in Stream Data. ICDE 2005 Thomas Karagiannis, Mart Molle, Michalis Faloutsos, Andre Broido A Nonstationary Poisson View of Internet Traffic IEEE INFOCOM, Hong Kong, March Thomas Karagiannis, Michalis Faloutsos, Mart Molle A User-Friendly Self-Similarity Analysis Tool Special Section on Tools and Technologies for Networking Research and Education, ACM SIGCOMM Computer Communication Review, NSF-IDM 04 C. Faloutsos & M. Faloutsos 25 NSF-IDM 04 C. Faloutsos & M. Faloutsos 26 [Wang+03] Yang Wang, Deepayan Chakrabarti, Chenxi Wang and Christos Faloutsos: Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint, SRDS 2003, Florence, Italy. Additional References Christos Faloutsos, Kevin McCurley and Andrew Tomkins, Fast Discovery of 'Connection Subgraphs' KDD 2004, Seattle, WA, Aug Deepayan Chakrabarti, Spiros Papadimitriou, Dharmendra Modha and Christos Faloutsos Fully Automatic Cross-Assocations KDD 2004, Seattle, WA, Aug Edoardo Airoldiand Christos Faloutsos Recovering Latent Time- Series from their Observed Sums: Network Tomography with Particle Filters KDD 2004, Seattle, WA, Aug RMAT: A recursive graph generator, D. Chakrabarti, Y. Zhan, C. Faloutsos, SIAM-DM 2004 NSF-IDM 04 C. Faloutsos & M. Faloutsos 27 NSF-IDM 04 C. Faloutsos & M. Faloutsos 28 Thank you! Contact info: google christos faloutsos cs.cmu.edu NSF-IDM 04 C. Faloutsos & M. Faloutsos 29 5

School of Computer Science Carnegie Mellon Graph Mining, self-similarity and power laws

School of Computer Science Carnegie Mellon Graph Mining, self-similarity and power laws Graph Mining, self-similarity and power laws Christos Faloutsos University Overview Achievements global patterns and laws (static/dynamic) generators influence propagation communities; graph partitioning

More information

The Internet Is Like A Jellyfish

The Internet Is Like A Jellyfish The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU) Big Picture: Modeling the Internet Topology Traffic Protocols Routing,

More information

Network protection against worms and cascading failures using modularity partitioning

Network protection against worms and cascading failures using modularity partitioning Network protection against worms and cascading failures using modularity partitioning Jasmina Omić Network Architectures and Services Delft University of Technology Delft, Netherlands Email: J.Omic@tudelft.nl

More information

Mining Large Graphs. ECML/PKDD 2007 tutorial. Part 2: Diffusion and cascading behavior

Mining Large Graphs. ECML/PKDD 2007 tutorial. Part 2: Diffusion and cascading behavior Mining Large Graphs ECML/PKDD 2007 tutorial Part 2: Diffusion and cascading behavior Jure Leskovec and Christos Faloutsos Machine Learning Department Joint work with: Lada Adamic, Deepay Chakrabarti, Natalie

More information

Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks

Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu

More information

The Effect of Network Topology on the Spread of Epidemics

The Effect of Network Topology on the Spread of Epidemics 1 The Effect of Network Topology on the Spread of Epidemics A. Ganesh, L. Massoulié, D. Towsley Microsoft Research Dept. of Computer Science 7 J.J. Thomson Avenue University of Massachusetts CB3 0FB Cambridge,

More information

Time Series Analysis of Network Traffic

Time Series Analysis of Network Traffic Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace

More information

Analysis of Internet Topologies: A Historical View

Analysis of Internet Topologies: A Historical View Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Network Monitoring Using Traffic Dispersion Graphs (TDGs)

Network Monitoring Using Traffic Dispersion Graphs (TDGs) Network Monitoring Using Traffic Dispersion Graphs (TDGs) Marios Iliofotou Joint work with: Prashanth Pappu (Cisco), Michalis Faloutsos (UCR), M. Mitzenmacher (Harvard), Sumeet Singh(Cisco) and George

More information

A Game Theoretic Model for Network Virus Protection

A Game Theoretic Model for Network Virus Protection A Game Theoretic Model for Network Virus Protection Iyed Khammassi, Rachid Elazouzi, Majed Haddad and Issam Mabrouki University of Avignon, 84 Avignon, FRANCE Email: firstname.lastname@univ-avignon.fr

More information

Graph Mining and Social Network Analysis. Data Mining; EECS 4412 Darren Rolfe + Vince Chu 11.06.14

Graph Mining and Social Network Analysis. Data Mining; EECS 4412 Darren Rolfe + Vince Chu 11.06.14 Graph Mining and Social Network nalysis Data Mining; EES 4412 Darren Rolfe + Vince hu 11.06.14 genda Graph Mining Methods for Mining Frequent Subgraphs priori-based pproach: GM, FSG Pattern-Growth pproach:

More information

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies..

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies.. The Shape of the Internet Slides assembled by Jeff Chase Duke University (thanks to and ) The Shape of the Network Characterizing shape : AS-level topology: who connects to whom Router-level topology:

More information

Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer

Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer 1 Content What is Community Detection? Motivation Defining a community Methods to find communities Overlapping communities

More information

COS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks

COS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks COS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks You learned in lecture about computer viruses and worms. In this lab you will study virus propagation at the quantitative

More information

Ahmed Metwally Google Inc. 1600 Amphitheatre Pkwy Mountain View, CA 94043 (805) 403-9725 ametwally@gmail.com

Ahmed Metwally Google Inc. 1600 Amphitheatre Pkwy Mountain View, CA 94043 (805) 403-9725 ametwally@gmail.com Education: Ahmed Metwally Google Inc. 1600 Amphitheatre Pkwy Mountain View, CA 94043 (805) 403-9725 ametwally@gmail.com 2002-2007: PhD; UC Santa Barbara, Department of Computer Science. Advisors: Prof.

More information

Spread of Viruses on a Computer Network

Spread of Viruses on a Computer Network Spread of Viruses on a Computer Network New Mexico Supercomputing Challenge Final Report March 31, 2015 Team Number: 63 Los Alamos Middle School Team: Christie Djidjev Teacher: Project Mentors: Hristo

More information

Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point

Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point Nicholas C. Valler 1, B. Aditya Prakash 2, Hanghang Tong 3, Michalis Faloutsos 1, and Christos Faloutsos 2 1 Dept. of Computer Science

More information

Computer Network Topologies: Models and Generation Tools

Computer Network Topologies: Models and Generation Tools Consiglio Nazionale delle Ricerche Technical Report n. 5/200 Computer Network Topologies: Models and Generation Tools Giuseppe Di Fatta, Giuseppe Lo Presti 2, Giuseppe Lo Re CE.R.E. Researcher 2 CE.R.E.,

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns

More information

Existence Theorems and Approximation Algorithms for Generalized Network Security Games

Existence Theorems and Approximation Algorithms for Generalized Network Security Games Existence Theorems and Approximation Algorithms for Generalized Network Security Games V.S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun, Ravi Sundaram, College of Computer & Information Science, Northeastern

More information

Foundations of Multidimensional Network Analysis

Foundations of Multidimensional Network Analysis 2 International Conference on Advances in Social Networks Analysis and Mining Foundations of Multidimensional Network Analysis Michele Berlingerio Michele Coscia 2 Fosca Giannotti Anna Monreale 2 Dino

More information

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

June Zhang (Zhong-Ju Zhang)

June Zhang (Zhong-Ju Zhang) (Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: junez@andrew.cmu.edu http://users.ece.cmu.edu/~junez

More information

Univariate and Multivariate Methods PEARSON. Addison Wesley

Univariate and Multivariate Methods PEARSON. Addison Wesley Time Series Analysis Univariate and Multivariate Methods SECOND EDITION William W. S. Wei Department of Statistics The Fox School of Business and Management Temple University PEARSON Addison Wesley Boston

More information

CMU SCS Mining Large Graphs and Tensors - Patterns, Tools and Discoveries.

CMU SCS Mining Large Graphs and Tensors - Patterns, Tools and Discoveries. Mining Large Graphs and Tensors - Patterns, Tools and Discoveries. Christos Faloutsos CMU Thank you! Nikos Sidiropoulos Kuo-Chu Chang Zhi (Gerry) Tian C. Faloutsos (CMU) 2 Roadmap Introduction Motivation

More information

Yale University Department of Computer Science

Yale University Department of Computer Science Yale University Department of Computer Science Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Aspnes 1 2 Kevin Chang 1 3 Aleksandr Yampolskiy 1 4 YALEU/DCS/TR-1295

More information

Graph Mining Techniques for Social Media Analysis

Graph Mining Techniques for Social Media Analysis Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented

More information

Optimization of network protection against virus spread

Optimization of network protection against virus spread Optimization of network protection against virus spread Eric Gourdin Orange Labs, Issy-les-Moulineaux, France Email: eric.gourdin@orange-ftgroup.com Jasmina Omic and Piet Van Mieghem Faculty of Electrical

More information

The Impacts of Link Failure on Routing Dynamics

The Impacts of Link Failure on Routing Dynamics The Impacts of Link Failure Location on Routing Dynamics: A Formal Analysis Xiaoliang Zhao, Beichuan Zhang, Daniel Massey, Andreas Terzis, Lixia Zhang ABSTRACT One approach to understanding the complex

More information

Storm Prediction in a Cloud. Ian Davis, Hadi Hemmati, Ric Holt, Mike Godfrey Douglas Neuse, Serge Mankovskii

Storm Prediction in a Cloud. Ian Davis, Hadi Hemmati, Ric Holt, Mike Godfrey Douglas Neuse, Serge Mankovskii Storm Prediction in a Cloud Ian Davis, Hadi Hemmati, Ric Holt, Mike Godfrey Douglas Neuse, Serge Mankovskii Load Balancing in Clouds The goal / balancing act: Want to maximise delivery of cloud services

More information

Phishing Training Strategies: Useful or Wasteful?

Phishing Training Strategies: Useful or Wasteful? Phishing Training Strategies: Useful or Wasteful? Elizabeth Walkup Stanford University ewalkup@stanford.edu 1. INTRODUCTION In the security community, it is commonly known that, no matter how well-built

More information

Part 1: Link Analysis & Page Rank

Part 1: Link Analysis & Page Rank Chapter 8: Graph Data Part 1: Link Analysis & Page Rank Based on Leskovec, Rajaraman, Ullman 214: Mining of Massive Datasets 1 Exam on the 5th of February, 216, 14. to 16. If you wish to attend, please

More information

AN EFFICIENT SELECTIVE DATA MINING ALGORITHM FOR BIG DATA ANALYTICS THROUGH HADOOP

AN EFFICIENT SELECTIVE DATA MINING ALGORITHM FOR BIG DATA ANALYTICS THROUGH HADOOP AN EFFICIENT SELECTIVE DATA MINING ALGORITHM FOR BIG DATA ANALYTICS THROUGH HADOOP Asst.Prof Mr. M.I Peter Shiyam,M.E * Department of Computer Science and Engineering, DMI Engineering college, Aralvaimozhi.

More information

Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro

Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro Subgraph Patterns: Network Motifs and Graphlets Pedro Ribeiro Analyzing Complex Networks We have been talking about extracting information from networks Some possible tasks: General Patterns Ex: scale-free,

More information

Anomaly Detection and Predictive Maintenance

Anomaly Detection and Predictive Maintenance Anomaly Detection and Predictive Maintenance Rosaria Silipo Iris Adae Christian Dietz Phil Winters Rosaria.Silipo@knime.com Iris.Adae@uni-konstanz.de Christian.Dietz@uni-konstanz.de Phil.Winters@knime.com

More information

A Study of YouTube recommendation graph based on measurements and stochastic tools

A Study of YouTube recommendation graph based on measurements and stochastic tools A Study of YouTube recommendation graph based on measurements and stochastic tools Yonathan Portilla, Alexandre Reiffers, Eitan Altman, Rachid El-Azouzi ABSTRACT The Youtube recommendation is one the most

More information

Why Rumors Spread Fast in Social Networks

Why Rumors Spread Fast in Social Networks Why Rumors Spread Fast in Social Networks Benjamin Doerr 1, Mahmoud Fouz 2, and Tobias Friedrich 1,2 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany 2 Universität des Saarlandes, Saarbrücken,

More information

Clustering Data Streams

Clustering Data Streams Clustering Data Streams Mohamed Elasmar Prashant Thiruvengadachari Javier Salinas Martin gtg091e@mail.gatech.edu tprashant@gmail.com javisal1@gatech.edu Introduction: Data mining is the science of extracting

More information

Characterizing and Modelling Clustering Features in AS-Level Internet Topology

Characterizing and Modelling Clustering Features in AS-Level Internet Topology Characterizing and Modelling Clustering Features in AS-Level Topology Yan Li, Jun-Hong Cui, Dario Maggiorini and Michalis Faloutsos yan.li@uconn.edu, jcui@engr.uconn.edu, dario@dico.unimi.it, michalis@cs.ucr.edu

More information

Graph Processing and Social Networks

Graph Processing and Social Networks Graph Processing and Social Networks Presented by Shu Jiayu, Yang Ji Department of Computer Science and Engineering The Hong Kong University of Science and Technology 2015/4/20 1 Outline Background Graph

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AUTONOMOUS NETWORK SECURITY FOR UNSUPERVISED DETECTION OF NETWORK ATTACKS MS. PRITI

More information

Lecture 10: Regression Trees

Lecture 10: Regression Trees Lecture 10: Regression Trees 36-350: Data Mining October 11, 2006 Reading: Textbook, sections 5.2 and 10.5. The next three lectures are going to be about a particular kind of nonlinear predictive model,

More information

Temporal Data Mining for Small and Big Data. Theophano Mitsa, Ph.D. Independent Data Mining/Analytics Consultant

Temporal Data Mining for Small and Big Data. Theophano Mitsa, Ph.D. Independent Data Mining/Analytics Consultant Temporal Data Mining for Small and Big Data Theophano Mitsa, Ph.D. Independent Data Mining/Analytics Consultant What is Temporal Data Mining? Knowledge discovery in data that contain temporal information.

More information

The Usage Analysis of Web and Email Traffic on the University Internet Backbone Links

The Usage Analysis of Web and Email Traffic on the University Internet Backbone Links Universal Journal of Communications and Network 3(1): 26-33, 2015 DOI: 10.13189/ujcn.2015.030104 http://www.hrpub.org The Usage Analysis of Web and Email Traffic on the University Internet Backbone Links

More information

STATISTICAL ANALYSIS AND MODELING OF INTERNET TRAFFIC IP- BASED NETWORK FOR TELE-TRAFFIC ENGINEERING

STATISTICAL ANALYSIS AND MODELING OF INTERNET TRAFFIC IP- BASED NETWORK FOR TELE-TRAFFIC ENGINEERING STATISTICAL ANALYSIS AND MODELING OF INTERNET TRAFFIC IP- BASED NETWORK FOR TELE-TRAFFIC ENGINEERING Murizah Kassim 1, 2, Mahamod Ismail 1 and Mat Ikram Yusof 2 1 Faculty of Engineering and Built Environment,

More information

Traffic Monitoring and Application Classification: A Novel Approach

Traffic Monitoring and Application Classification: A Novel Approach Traffic Monitoring and Application Classification: A Novel Approach Michalis Faloutsos, UC Riverside QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. QuickTime and a TIFF

More information

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Zichao Yang and John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong Abstract.

More information

Dynamics of information spread on networks. Kristina Lerman USC Information Sciences Institute

Dynamics of information spread on networks. Kristina Lerman USC Information Sciences Institute Dynamics of information spread on networks Kristina Lerman USC Information Sciences Institute Information spread in online social networks Diffusion of activation on a graph, where each infected (activated)

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

DualIso: Scalable Subgraph Pattern Matching On Large Labeled Graphs SUPPLEMENT. Computer Science Department

DualIso: Scalable Subgraph Pattern Matching On Large Labeled Graphs SUPPLEMENT. Computer Science Department DualIso: Scalable Subgraph Pattern Matching On Large Labeled Graphs SUPPLEMENT Matthew Saltz, Ayushi Jain, Abhishek Kothari, Arash Fard, John A. Miller and Lakshmish Ramaswamy Computer Science Department

More information

Security Toolsets for ISP Defense

Security Toolsets for ISP Defense Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.

More information

Massive Streaming Data Analytics: A Case Study with Clustering Coefficients. David Ediger, Karl Jiang, Jason Riedy and David A.

Massive Streaming Data Analytics: A Case Study with Clustering Coefficients. David Ediger, Karl Jiang, Jason Riedy and David A. Massive Streaming Data Analytics: A Case Study with Clustering Coefficients David Ediger, Karl Jiang, Jason Riedy and David A. Bader Overview Motivation A Framework for Massive Streaming hello Data Analytics

More information

Can Twitter Predict Royal Baby's Name?

Can Twitter Predict Royal Baby's Name? Summary Can Twitter Predict Royal Baby's Name? Bohdan Pavlyshenko Ivan Franko Lviv National University,Ukraine, b.pavlyshenko@gmail.com In this paper, we analyze the existence of possible correlation between

More information

Analysis of an Artificial Hormone System (Extended abstract)

Analysis of an Artificial Hormone System (Extended abstract) c 2013. This is the author s version of the work. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purpose or for creating

More information

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu

More information

Data Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining

Data Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining Data Mining Cluster Analysis: Advanced Concepts and Algorithms Lecture Notes for Chapter 9 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Botnet Detection by Abnormal IRC Traffic Analysis

Botnet Detection by Abnormal IRC Traffic Analysis Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National

More information

Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

More information

Time Series Analysis and Forecasting Methods for Temporal Mining of Interlinked Documents

Time Series Analysis and Forecasting Methods for Temporal Mining of Interlinked Documents Time Series Analysis and Forecasting Methods for Temporal Mining of Interlinked Documents Prasanna Desikan and Jaideep Srivastava Department of Computer Science University of Minnesota. @cs.umn.edu

More information

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber

More information

Systems and Algorithms for Big Data Analytics

Systems and Algorithms for Big Data Analytics Systems and Algorithms for Big Data Analytics YAN, Da Email: yanda@cse.cuhk.edu.hk My Research Graph Data Distributed Graph Processing Spatial Data Spatial Query Processing Uncertain Data Querying & Mining

More information

Network TrafficBehaviorAnalysisby Decomposition into Control and Data Planes

Network TrafficBehaviorAnalysisby Decomposition into Control and Data Planes Network TrafficBehaviorAnalysisby Decomposition into Control and Data Planes Basil AsSadhan, Hyong Kim, José M. F. Moura, Xiaohui Wang Carnegie Mellon University Electrical and Computer Engineering Department

More information

Every tree contains a large induced subgraph with all degrees odd

Every tree contains a large induced subgraph with all degrees odd Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University

More information

Information Discovery on Electronic Medical Records

Information Discovery on Electronic Medical Records Information Discovery on Electronic Medical Records Vagelis Hristidis, Fernando Farfán, Redmond P. Burke, MD Anthony F. Rossi, MD Jeffrey A. White, FIU FIU Miami Children s Hospital Miami Children s Hospital

More information

Existence of pure Nash equilibria (NE): Complexity of computing pure NE: Approximating the social optimum: Empirical results:

Existence of pure Nash equilibria (NE): Complexity of computing pure NE: Approximating the social optimum: Empirical results: Existence Theorems and Approximation Algorithms for Generalized Network Security Games V.S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun, Ravi Sundaram, College of Computer & Information Science, Northeastern

More information

Mining the Temporal Dimension of the Information Propagation

Mining the Temporal Dimension of the Information Propagation Mining the Temporal Dimension of the Information Propagation Michele Berlingerio, Michele Coscia 2, and Fosca Giannotti 3 IMT-Lucca, Lucca, Italy 2 Dipartimento di Informatica, Pisa, Italy {name.surname}@isti.cnr.it

More information

Analyzing and modelling the AS-level Internet topology

Analyzing and modelling the AS-level Internet topology Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:

More information

Advances in Health Care Predictive Analytics

Advances in Health Care Predictive Analytics Advances in Health Care Predictive Analytics Graphical Models Part I: Intelligent Reasoning with Bayesian Networks Jarrod E. Dalton COLD OR FLU? How do we tell? A Simple Bayesian Network P() Prob. No 70%

More information

OPERATING SYSTEMS DEADLOCKS

OPERATING SYSTEMS DEADLOCKS OPERATING SYSTEMS DEADLOCKS Jerry Breecher 7: Deadlocks OPERATING SYSTEM Deadlocks What is a deadlock? What Is In This Chapter? Staying Safe: Preventing and Avoiding Deadlocks Living Dangerously: Let the

More information

TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 1, NO. 1, MARCH 2014 99

TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 1, NO. 1, MARCH 2014 99 TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 1, NO. 1, MARCH 2014 99 Optimal Resource Allocation for Network Protection Against Spreading Processes Victor M. Preciado, Member, IEEE, Michael Zargham,

More information

Implementing Graph Pattern Mining for Big Data in the Cloud

Implementing Graph Pattern Mining for Big Data in the Cloud Implementing Graph Pattern Mining for Big Data in the Cloud Chandana Ojah M.Tech in Computer Science & Engineering Department of Computer Science & Engineering, PES College of Engineering, Mandya Ojah.chandana@gmail.com

More information

Degree distribution of the FKP network model

Degree distribution of the FKP network model Degree distribution of the FKP network model Noam Berger 1, Béla Bollobás 2,3, Christian Borgs 4, Jennifer Chayes 4, and Oliver Riordan 3 1 Department of Statistics, University of California, Berkeley,

More information

Network Coding for Distributed Storage

Network Coding for Distributed Storage Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and

More information

Dynamic Quarantine of Internet Worms

Dynamic Quarantine of Internet Worms The International Conference on Dependable Systems and Networks (DSN-24). Palazzo dei Congressi, Florence, Italy. June 28th - July, 24. Dynamic Quarantine of Internet Worms Cynthia Wong, Chenxi Wang, Dawn

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

Zipf s law and the Internet

Zipf s law and the Internet Glottometrics 3, 2002,143-150 To honor G.K. Zipf Zipf s law and the Internet Lada A. Adamic 1 Bernardo A. Huberman Abstract. Zipf's law governs many features of the Internet. Observations of Zipf distributions,

More information

Research Statement. Michalis Faloutsos

Research Statement. Michalis Faloutsos Research Statement Michalis Faloutsos My research focuses on computer security and networks and can be grouped into the following, partiallyoverlapping areas: 1. Web security focusing on the detection

More information

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,

More information

Research Article Worms Propagation Modeling and Analysis in Big Data Environment

Research Article Worms Propagation Modeling and Analysis in Big Data Environment Distributed Sensor Networks Volume 2015, Article ID 985856, 8 pages http://dxdoiorg/101155/2015/985856 Research Article Worms Propagation Modeling and Analysis in Big Data Environment Song He, 1 Can Zhang,

More information

Mathematical Challenges in Cybersecurity

Mathematical Challenges in Cybersecurity SANDIA REPORT SAND 2009-0805 Unlimited Release Printed February 2009 Mathematical Challenges in Cybersecurity Daniel M. Dunlavy, Bruce Hendrickson, and Tamara G. Kolda Prepared by Sandia National Laboratories

More information

Investigating Clinical Care Pathways Correlated with Outcomes

Investigating Clinical Care Pathways Correlated with Outcomes Investigating Clinical Care Pathways Correlated with Outcomes Geetika T. Lakshmanan, Szabolcs Rozsnyai, Fei Wang IBM T. J. Watson Research Center, NY, USA August 2013 Outline Care Pathways Typical Challenges

More information

A Study of Mass-mailing Worms

A Study of Mass-mailing Worms A Study of Mass-mailing Worms Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang Carnegie Mellon University 5 Forbes Avenue, Pittsburgh, PA, 15213 {cindywon, bielski, jonmccune, chenxi}@cmu.edu

More information

On Mining Group Patterns of Mobile Users

On Mining Group Patterns of Mobile Users On Mining Group Patterns of Mobile Users Yida Wang 1, Ee-Peng Lim 1, and San-Yih Hwang 2 1 Centre for Advanced Information Systems, School of Computer Engineering Nanyang Technological University, Singapore

More information

Data Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining

Data Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining Data Mining Cluster Analysis: Advanced Concepts and Algorithms Lecture Notes for Chapter 9 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004

More information

Q. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, 100876 Email: yq_10@sohu.

Q. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, 100876 Email: yq_10@sohu. JOURNAL OF NETWORKS, VOL. 3, NO. 7, JULY 28 1 fuser Behavior and Topology Analysis Q. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China,

More information

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of

More information

Time Series Analysis

Time Series Analysis Time Series Analysis Identifying possible ARIMA models Andrés M. Alonso Carolina García-Martos Universidad Carlos III de Madrid Universidad Politécnica de Madrid June July, 2012 Alonso and García-Martos

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

Industry 4.0 market study: demand for connected software solutions

Industry 4.0 market study: demand for connected software solutions Industry 4.0 market study: demand for connected software solutions September 2015 Software Innovations 2 Market Survey Industry 4.0 2015 Introduction Turning data into new knowledge A key raw material

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

Small-World, Scale-Free and Beyond Xiao Fan Wang and Guanrong Chen

Small-World, Scale-Free and Beyond Xiao Fan Wang and Guanrong Chen Feature Complex Networks: Small-World, Scale-Free and Beyond Xiao Fan Wang and Guanrong Chen DIGITAL VISION, LTD. Abstract In the past few years, the discovery of small-world and scale-free properties

More information

Portfolio Distribution Modelling and Computation. Harry Zheng Department of Mathematics Imperial College h.zheng@imperial.ac.uk

Portfolio Distribution Modelling and Computation. Harry Zheng Department of Mathematics Imperial College h.zheng@imperial.ac.uk Portfolio Distribution Modelling and Computation Harry Zheng Department of Mathematics Imperial College h.zheng@imperial.ac.uk Workshop on Fast Financial Algorithms Tanaka Business School Imperial College

More information