Removing Malicious Nodes from Networks

12/30/2018
by   Sixie Yu, et al.
0

A fundamental challenge in networked systems is detection and removal of suspected malicious nodes. In reality, detection is always imperfect, and the decision about which potentially malicious nodes to remove must trade off false positives (erroneously removing benign nodes) and false negatives (mistakenly failing to remove malicious nodes). However, in network settings this conventional tradeoff must now account for node connectivity. In particular, malicious nodes may exert malicious influence, so that mistakenly leaving some of these in the network may cause damage to spread. On the other hand, removing benign nodes causes direct harm to these, and indirect harm to their benign neighbors who would wish to communicate with them. We formalize the problem of removing potentially malicious nodes from a network under uncertainty through an objective that takes connectivity into account. We show that optimally solving the resulting problem is NP-Hard. We then propose a tractable solution approach based on a convex relaxation of the objective. Finally, we experimentally demonstrate that our approach significantly outperforms both a simple baseline that ignores network structure, as well as a state-of-the-art approach for a related problem, on both synthetic and real-world datasets.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/31/2019

Distributionally Robust Removal of Malicious Nodes from Networks

An important problem in networked systems is detection and removal of su...
research
09/09/2023

A Fast Algorithm for Moderating Critical Nodes via Edge Removal

Critical nodes in networks are extremely vulnerable to malicious attacks...
research
01/24/2018

Adversarial Classification on Social Networks

The spread of unwanted or malicious content through social media has bec...
research
10/25/2019

Manipulating Node Similarity Measures in Network

Node similarity measures quantify how similar a pair of nodes are in a n...
research
12/02/2020

Defending against Contagious Attacks on a Network with Resource Reallocation

In classic network security games, the defender distributes defending re...
research
09/14/2019

Local Voting Games for Misbehavior Detection in VANETs in Presence of Uncertainty

Cooperation between neighboring vehicles is an effective solution to the...
research
08/28/2023

Spread Control Method on Unknown Networks Based on Hierarchical Reinforcement Learning

The spread of infectious diseases, rumors, and harmful speech in network...

Please sign up or login with your details

Forgot password? Click here to reset