skip to main content
10.1145/2783258.2783386acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Virus Propagation in Multiple Profile Networks

Published:10 August 2015Publication History

ABSTRACT

Suppose we have a virus or one competing idea/product that propagates over a multiple profile (e.g., social) network. Can we predict what proportion of the network will actually get "infected" (e.g., spread the idea or buy the competing product), when the nodes of the network appear to have different sensitivity based on their profile? For example, if there are two profiles A and B in a network and the nodes of profile A and profile B are susceptible to a highly spreading virus with probabilities βA and βB respectively, what percentage of both profiles will actually get infected from the virus at the end? To reverse the question, what are the necessary conditions so that a predefined percentage of the network is infected? We assume that nodes of different profiles can infect one another and we prove that under realistic conditions, apart from the weak profile (great sensitivity), the stronger profile (low sensitivity) will get infected as well. First, we focus on cliques with the goal to provide exact theoretical results as well as to get some intuition as to how a virus affects such a multiple profile network. Then, we move to the theoretical analysis of arbitrary networks. We provide bounds on certain properties of the network based on the probabilities of infection of each node in it when it reaches the steady state. Finally, we provide extensive experimental results that verify our theoretical results and at the same time provide more insight on the problem.

Skip Supplemental Material Section

Supplemental Material

p975.mp4

mp4

111.7 MB

References

  1. R. M. Anderson and R. M. May". "Infectious Diseases of Humans". "Oxford University Press", "1991".Google ScholarGoogle Scholar
  2. S. Aral and D. Walker. Identifying influential and susceptible members of social networks. Science, 337, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  3. N. Bailey". "The Mathematical Theory of Infectious Diseases and its Applications". "Griffin", "London", "1975".Google ScholarGoogle Scholar
  4. N. Barbieri, F. Bonchi, and G. Manco. Topic-aware social influence propagation models. In 12th IEEE International Conference on Data Mining, ICDM 2012, Brussels, Belgium, December 10-13, 2012, pages 81--90, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Beutel, B. A. Prakash, R. Rosenfeld, and C. Faloutsos. Interacting viruses in networks: Can both survive? In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '12, pages 426--434, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Chazelle. Analytical tools for natural algorithms. In A. C.-C. Yao, editor, ICS, pages 32--41. Tsinghua University Press, 2010.Google ScholarGoogle Scholar
  7. P. Domingos and M. Richardson. Mining the network value of customers. In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '01, pages 57--66, New York, NY, USA, 2001. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Ganesh, L. Massoulie, and D. Towsley. The effect of network topology on the spread of epidemics. In INFOCOM, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  9. H. Gould and J. Tobochnik. Statistical and Thermal Physics: With Computer Applications. Princeton University Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Granovetter. Threshold models of collective behavior. Am. Journal of Sociology, 6(83):1420--1443, 1978.Google ScholarGoogle Scholar
  11. H. W. Hethcote. The mathematics of infectious diseases. SIAM Rev., 42(4):599--653, Dec. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. W. Hirsch and S. Smale". "Differential Equations, Dynamical Systems and Linear Algebra". "Academic Press", "1974".Google ScholarGoogle Scholar
  13. D. Kempe, J. M. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In KDD, pages 137--146, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. O. Kephart and S. R. White. Measuring and modeling computer virus prevalence. In IEEE Computer Society Symposium on Research in Security and Privacy, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Kimura, K. Saito, and H. Motoda. Efficient estimation of influence functions for SIS model on social networks. In IJCAI 2009, Proceedings of the 21st International Joint Conference on Artificial Intelligence, Pasadena, California, USA, July 11-17, 2009, pages 2046--2051, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics, 6(1):29--123, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  17. E. S. G. Lum Kristian, Swarup Samarth and H. James. The contagious nature of imprisonment: An agent-based model to explain racial disparities in incarceration rates. J. R. Soc. Interface, 11(98):201404090, June 2014.Google ScholarGoogle Scholar
  18. A. G. McKendrick. Applications of mathematics to medical problems. In Proceedings of Edin. Math. Society, volume 14, pages 98--130, 2011.Google ScholarGoogle Scholar
  19. R. Pastor-Santorras and A. Vespignani. Epidemic spreading in scale-free networks. Physical Review Letters, 86(14), 2001.Google ScholarGoogle Scholar
  20. B. A. Prakash, A. Beutel, R. Rosenfeld, and C. Faloutsos. Winner takes all: Competing viruses or ideas on fair-play networks. In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages 1037--1046, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. A. Prakash, D. Chakrabarti, M. Faloutsos, N. Valler, and C. Faloutsos. Threshold conditions for arbitrary cascade models on arbitrary networks. In Proceedings of the 2011 IEEE 11th International Conference on Data Mining, ICDM '11, pages 537--546, Washington, DC, USA, 2011. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. K. Saito, M. Kimura, and H. Motoda. Discovering influential nodes for SIS models in social networks. In Discovery Science, 12th International Conference, DS 2009, Porto, Portugal, October 3-5, 2009, pages 302--316, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. X. Wei, N. Valler, B. A. Prakash, I. Neamtiu, M. Faloutsos, and C. Faloutsos. Competing memes propagation on networks: A case study of composite networks. IEEE Journal on Selected Areas in Communications, 6(31):1049--1060, 2013.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Virus Propagation in Multiple Profile Networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      KDD '15: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
      August 2015
      2378 pages
      ISBN:9781450336642
      DOI:10.1145/2783258

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 August 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      KDD '15 Paper Acceptance Rate160of819submissions,20%Overall Acceptance Rate1,133of8,635submissions,13%

      Upcoming Conference

      KDD '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader