77
Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote Talk, BEAMS Workshop, ICDM, Nov 14, 2015

Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Embed Size (px)

Citation preview

Page 1: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Understanding and Predicting Human Behavior using

Propagation: From Flu-trends to Cyber-

Security B. Aditya Prakash

Computer ScienceVirginia Tech.

Keynote Talk, BEAMS Workshop, ICDM, Nov 14, 2015

Page 2: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 2

Thanks!

• Reza Zafarani

• Huan Liu

Page 3: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 3

Networks are everywhere!

Human Disease Network [Barabasi 2007]

Gene Regulatory Network [Decourty 2008]

Facebook Network [2010]

The Internet [2005]

Page 4: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 4

Dynamical Processes over networks are also everywhere!

Page 5: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 5

Why do we care?• Social collaboration• Information Diffusion• Viral Marketing• Epidemiology and Public Health• Cyber Security• Human mobility • Games and Virtual Worlds • Ecology........

Page 6: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 6

Why do we care? (1: Epidemiology)

• Dynamical Processes over networks[AJPH 2007]

CDC data: Visualization of the first 35 tuberculosis (TB) patients and their 1039 contacts

Diseases over contact networks

SI Model

Page 7: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 7

Why do we care? (1: Epidemiology)

• Dynamical Processes over networks

• Each circle is a hospital• ~3000 hospitals• More than 30,000 patients transferred

[US-MEDICARE NETWORK 2005]

Problem: Given k units of disinfectant, whom to immunize?

Page 8: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 8

Why do we care? (1: Epidemiology)

CURRENT PRACTICE OUR METHOD

~6x fewer!

[US-MEDICARE NETWORK 2005]

Hospital-acquired inf. took 99K+ lives, cost $5B+ (all per year)

Page 9: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 9

Why do we care? (2: Online Diffusion)

> 800m users, ~$1B revenue [WSJ 2010]

~100m active users

> 50m users

Page 10: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 10

Why do we care? (2: Online Diffusion)

• Dynamical Processes over networks

Celebrity

Buy Versace™!

Followers

Social Media Marketing

Page 11: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 11

Why do we care? (3: To change the world?)

• Dynamical Processes over networks

Social networks and Collaborative Action

Page 12: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 12

High Impact – Multiple Settings

Q. How to squash rumors faster?

Q. How do opinions spread?

Q. How to market better?

epidemic out-breaks

products/viruses

transmit s/w patches

Page 13: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 13

Research Theme

DATALarge real-world

networks & processes

ANALYSISUnderstanding

POLICY/ ACTIONManaging/

Utilizing

Page 14: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 14

Research Theme – Public Health

DATAModeling # patient

transfers

ANALYSISWill an epidemic

happen?

POLICY/ ACTION

How to control out-breaks?

Page 15: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 15

Research Theme – Social Media

DATAModeling Tweets

spreading

POLICY/ ACTION

How to market better?

ANALYSIS# cascades in

future?

Page 16: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 16

In this talk

DATALarge real-world

networks & processes

Q1: How to predict Flu- trends better?

Q2: How does information evolve over time?

Page 17: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 17

In this talk

DATALarge real-world

networks & processes

Q3: How do malware attacks evolve over time?

Page 18: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 18

Outline

• Motivation• Part 1: Learning Models (Empirical Studies)

– Q1: How to predict Flu-trends better?– Q2: How does information evolve over time?– Q3: How does malware attacks evolve over time?

• Conclusion

Page 19: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

Surveillance• How to estimate and predict flu trends?

19

Population survey

Hospital record

Lab survey

Surveillance Report

[Chen et. al. ICDM 2014]

Page 20: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

GFT & Twitter• Estimate flu trends using online electronic

sources

20

So cold today, I’m catching cold.

I have headache, sore throat, I can’t go to school today.

My nose is totally congested, I havea hard time understanding what I’msaying.

Page 21: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

Observation 1: States

• There are different states in an infection cycle.• SEIR model:

1. Susceptible 2. Exposed3. Infected 4. Recovered

21

Page 22: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

Observation 2: Ep. & So. Gap

• Infection cases drop exponentially in epidemiology (Hethcote 2000)

• Keyword mentions drop in a power-law pattern in social media (Matsubara 2012)

22

Page 23: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

HFSTM Model• Hidden Flu-State from Tweet Model (HFSTM)

– Each word (w) in a tweet (Oi) can be generated by:• A background topic• Non-flu related topics• State related topics

23

Binary background switch

Binary non-flu related switch

Word distribution

Latent stateInitial

prob.

Transit. prob.

Transit. switch

Page 24: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

HFSTM Model• Generating tweets

24

Generate the state for a tweetGenerate the topic for a word

State: [S,E,I] Topic: [Background,Non-flu,State]

S: goodThis restaurant is really

E: Themoviewas

goodbut it

wasfreezing

I: I think I have flu

Page 25: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

• EM-based algorithm: HFSTM-FIT– E-step:

• At(i)=P(O1,O2,…,Ot,St=i)

• Bt(i)=P(Ot+1,…,OTu|St=i)

• γt(i)=P(St=i|Ou)

– M-step:• Other parameters such as state transition probabilities,

topic distributions, etc.

– Parameters learned:

Inference

25

Page 26: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

A possible issue with HFSTM

• Suffers from large, noisy vocabulary. • Semi-supervision for improvement

– Introduce weak supervision into HFSTM.

26

Page 27: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

HFSTM-A

• HFSTM-A(spect)– Introduce an aspect variable y, expressing our belief on

whether a word is flu-related or not.– The value of y biases the switch variables s.t. flu-related

words are more likely to be explained by state topics.

27

When the aspect value (y) is introduced, the switching probability are updated accordingly.

Page 28: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

Vocabulary & Dataset• Vocabulary (230 words):

– Flu-related keyword list by Chakraborty SDM 2014

– Extra state-related keyword list• Dataset (34,000 tweets):

– Identify infected users and collect their tweets– Train on data from Jun 20, 2013-Aug 06, 2013– Test on two time period:

• Dec 01, 2012- July 08, 2013• Nov 10, 2013-Jan 26, 2014

28

Page 29: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

Learned word distributions• The most probable words learned in each state

29

Probably healthy: S Having symptons: E Definitely sick: I

Page 30: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

Learned state transitionTransition probabilities Transition in real tweets

30

Not directly flu-related, yet correctly identified

Learned by HFSTM:

Page 31: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

Flu trend fitting

• Ground-truth: – The Pan American Health Organization (PAHO)

• Algorithms:– Baseline:

• Count the number of keywords weekly as features, and regress to the ground-truth curve.

– Google flu trend:• Take the google flu trend data as input, regress to the PAHO curve.

– HFSTM:• Distinguish different states of keyword, and only use the number

of keywords in I state. Again regress to PAHO.

31

Page 32: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

Flu trend fitting• Linear regression to the case count

reported by PAHO (the ground-truth)

32

Page 33: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015

HFSTM-A

• Results are qualitatively similar with HFSTM, when the vocabulary is 10 times larger.

33

Page 34: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 34

Outline

• Motivation• Part 1: Learning Models (Empirical Studies)

– Q1: How to predict Flu-trends better?– Q2: How does information evolve over time?– Q3: How does malware attacks evolve over time?

• Conclusion

Page 35: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 35

Google Search Volume

e.g., given (1) first spike, (2) release date of two sequel movies (3) access volume before the release date

? ?

(1) First spike (2) Release date (3) Two weeks before release

Page 36: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 36

Patterns

X

Y

Page 37: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 37

Patterns

X

Y

More Data

Page 38: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 38

Patterns

X

YAnomaly

?

Page 39: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 39

Patterns

X

YAnomaly

?

Extrapolation

Page 40: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 40

Patterns

X

YAnomalyImputation

Extrapolation

Page 41: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 41

Patterns

AnomalyImputation

Extrapolation

Compression

Page 42: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 42

• Meme (# of mentions in blogs)– short phrases Sourced from U.S. politics in 2008

“you can put lipstick on a pig”

“yes we can”

Rise and fall patterns in social media

Page 43: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 43

Rise and fall patterns in social media

• Can we find a unifying model, which includes these patterns?

• four classes on YouTube [Crane et al. ’08]• six classes on Meme [Yang et al. ’11]

Page 44: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 44

Rise and fall patterns in social media

• Answer: YES!

• We can represent all patterns by single model

In Matsubara, Sakurai, Prakash+ SIGKDD 2012

Page 45: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 45

Main idea - SpikeM- 1. Un-informed bloggers (uninformed about rumor)- 2. External shock at time nb (e.g, breaking news)- 3. Infection (word-of-mouth)

Infectiveness of a blog-post at age n:

- Strength of infection (quality of news)

- Decay function (how infective a blog posting is)

Time n=0 Time n=nb Time n=nb+1

β

Power Law

Page 46: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 46

-1.5 slopeJ. G. Oliveira et. al. Human Dynamics: The

Correspondence Patterns of Darwin and Einstein. Nature 437, 1251 (2005) . [PDF]

(also in Leskovec, McGlohon+, SDM 2007)

Page 47: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 47

SpikeM - with periodicity

• Full equation of SpikeM

Periodicity

12pmPeak activity 3am

Low activity

Time n

Bloggers change their activity over time

(e.g., daily, weekly, yearly)

activity

Details

Page 48: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 48

Tail-part forecasts

• SpikeM can capture tail part

Page 49: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 49

“What-if” forecasting

e.g., given (1) first spike, (2) release date of two sequel movies (3) access volume before the release date

? ?

(1) First spike (2) Release date (3) Two weeks before release

Page 50: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 50

“What-if” forecasting

–SpikeM can forecast not only tail-part, but also rise-part!

• SpikeM can forecast upcoming spikes

(1) First spike (2) Release date (3) Two weeks before release

Page 51: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 51

Bonus: Protest Predictions

• Can Twitter provide a lead time?• South American twitter dataset

– Language: Spanish/Portuguese– Idea

1. Look for trending keywords.2. Predict event type for protest using SpikeMparameters!

A political tweet

Violent Protest (VP)

Non Violent Protest (P)

[Sundereisan et al. ASONAM 2014][Jin et al. SIGKDD 2014]

VP

P

Page 52: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 52

Outline

• Motivation• Part 1: Learning Models (Empirical Studies)

– Q1: How to predict Flu-trends better?– Q2: How does information evolve over time?– Q3: How does malware attacks evolve over time?

• Conclusion

Page 53: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 53

Modeling Malware Penetration

• Worldwide Intelligence Network– Which machine got which malware (or legitimate files)– 1 Billion nodes– 37 Billion edges

• Q: Temporal patterns?

Page 54: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 54

Q: Temporal Patterns

Looks familiar?

Page 55: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 55

SpikeM again (or SharkFin)

7 parameters only!

~ 400 points ~ 400 points

[Papalexakakis et. al. ASONAM 2013]

Page 56: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 56

Latent Propagation Patterns

Page 57: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 57

BUT

• Does not take into account differences between detections vs actual infections.

Page 58: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

58

Domain-based approach: Data

• Looked at the entire 2 years of WINE data.• Augmented with vulnerability and patch data

from NIST’s National Vulnerability Database (NVD)

• Considered all machines from 40 countries – study still ongoing. Considered the 50 most commonly occurring malware.

Prakash 2015

[Chan et. al. WSDM 2016]

Page 59: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

59

Study Approach: Main Steps

Prakash 2015

Page 60: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

60

Study Approach: Patch & Detection Incompetence

Prakash 2015

• Incompetence : 4 base variables to measure hosts' incompetence in detecting malware and incompetence in patching (absolute and relative) w.r.t. various time period. How much time each host took in detecting or patching for each malware

• For each time tick, we built a directed bipartite graph capturing normalized detection/patching incompetence between malware and hosts

Page 61: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

61

FBP Model

• Dependent variable: For each (c,m) pair, the % of hosts in the country c attacked by malware m.

• Independent variables for each (c,m) pair:– ADI, API, RDI, RPI, AADI, ARDI,AAPI, ARPI, ADA, RDA, APA

and RPA of hosts in country c, APH and RPH of malware m– Six similarity measures for hosts in two different

countries– Per Capita GDP and HDI of countries– Found k-nearest neighbors of each (c,m) pair according to

different similarity measures and used features of those countries as well.

Prakash 2015

Page 62: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 62

• Infection rate • Patching rates:

– Susceptible hosts: – Detected hosts:

DIPS and DIPS-EXP Model

Developed algorithm to learn best parameters for DIPS and DIPS-Exp model by minimizing error terms.

Page 63: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

63

Learning DIPS, DIPS-Exp Parameters

Prakash 2015

Page 64: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

64

Ensemble Models

Prakash 2015

Page 65: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

65

Experiments : Overall• We predict infection ratios of hosts in each country for each malware • Test all country-malware pairs for top 50 malware and top 40 GDP countries w.r.t.

# of infections • NRMSE is important because infections ratios over countries are very different

Prakash 2015

FBP shows better performance than FUNNEL w.r.t. all performance measures

The MAE* values were computed with |# of ground true infected hosts – the expected # of infected hosts|

DIPS shows better performance than FBP w.r.t. all performance measures

ESM0 is the best w.r.t. NRMSE

FBP + FUNNEL does not workFUNNEL*: disease infection prediction model

Page 66: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

66

Experiments

Prakash 2015

Page 67: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

67

Summary of Forecasting Experiments

• FBP, DIPS and ESM showed better performance when there were lots of infection attempts.

• FBP showed reliable performance across the board

• DIPS was very accurate when infectiousness level is high

• ESM takes both advantages of FBP and DIPS and shows very accurate and reliable performance

Prakash 2015

Page 68: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 68

Outline

• Motivation• Part 1: Learning Models (Empirical Studies)

– Q1: How to predict Flu-trends better?– Q2: How does information evolve over time?– Q3: How does malware attacks evolve over time?

• Conclusion

Page 69: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Future Plans

DATALarge real-world

networks & processes

ANALYSISUnderstanding

POLICY/ ACTIONManaging

Prakash 2015 69

Page 70: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Scalability – Big Data

• Datasets of unprecedented scale– High dimensionality and sample size!

• Need scalable algorithms for – Learning Models– Developing Policy

• Leverage parallel systems– Map-Reduce clusters (like Hadoop) for data-intensive

jobs (more than 6000 machines) – Parallelized compute-intensive simulations (like Condor)

Prakash 2015 70

Page 71: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Uncertain Data in Cascade analysis (more implementable policies)

Original, Nodes sampled off

Culprits, and missing nodes filled in

Sundereisan, Vreeken, Prakash. 2014

Correcting for missing data Designing More Robust Immunization Policies

Zhang and Prakash. CIKM 2014

Prakash 2015 71

Page 72: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Summarization

• Automatic segmentation?

• Segment flu cascades?

Prakash 2015 72

…….

Page 73: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 73

References1. Scalable Vaccine Distribution in Large Graphs given Uncertain Data (Yao Zhang and B. Aditya Prakash) -- In

CIKM 2014.2. Fast Influence-based Coarsening for Large Networks (Manish Purohit, B. Aditya Prakash, Chahhyun Kang, Yao

Zhang and V. S. Subrahmanian) – In SIGKDD 20143. DAVA: Distributing Vaccines over Large Networks under Prior Information (Yao Zhang and B. Aditya Prakash) --

In SDM 20144. Fractional Immunization on Networks (B. Aditya Prakash, Lada Adamic, Jack Iwashnya, Hanghang Tong, Christos

Faloutsos) – In SDM 20135. Spotting Culprits in Epidemics: Who and How many? (B. Aditya Prakash, Jilles Vreeken, Christos Faloutsos) – In

ICDM 2012, Brussels Vancouver (Invited to KAIS Journal Best Papers of ICDM.)6. Gelling, and Melting, Large Graphs through Edge Manipulation (Hanghang Tong, B. Aditya Prakash, Tina Eliassi-

Rad, Michalis Faloutsos, Christos Faloutsos) – In ACM CIKM 2012, Hawaii (Best Paper Award)7. Rise and Fall Patterns of Information Diffusion: Model and Implications (Yasuko Matsubara, Yasushi Sakurai, B.

Aditya Prakash, Lei Li, Christos Faloutsos) – In SIGKDD 2012, Beijing8. Interacting Viruses on a Network: Can both survive? (Alex Beutel, B. Aditya Prakash, Roni Rosenfeld, Christos

Faloutsos) – In SIGKDD 2012, Beijing9. Winner-takes-all: Competing Viruses or Ideas on fair-play networks (B. Aditya Prakash, Alex Beutel, Roni

Rosenfeld, Christos Faloutsos) – In WWW 2012, Lyon10. Threshold Conditions for Arbitrary Cascade Models on Arbitrary Networks (B. Aditya Prakash, Deepayan

Chakrabarti, Michalis Faloutsos, Nicholas Valler, Christos Faloutsos) - In IEEE ICDM 2011, Vancouver (Invited to KAIS Journal Best Papers of ICDM.)

11. Times Series Clustering: Complex is Simpler! (Lei Li, B. Aditya Prakash) - In ICML 2011, Bellevue12. Epidemic Spreading on Mobile Ad Hoc Networks: Determining the Tipping Point (Nicholas Valler, B. Aditya

Prakash, Hanghang Tong, Michalis Faloutsos and Christos Faloutsos) – In IEEE NETWORKING 2011, Valencia, Spain

13. Formalizing the BGP stability problem: patterns and a chaotic model (B. Aditya Prakash, Michalis Faloutsos and Christos Faloutsos) – In IEEE INFOCOM NetSciCom Workshop, 2011.

14. On the Vulnerability of Large Graphs (Hanghang Tong, B. Aditya Prakash, Tina Eliassi-Rad and Christos Faloutsos) – In IEEE ICDM 2010, Sydney, Australia

15. Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms (B. Aditya Prakash, Hanghang Tong, Nicholas Valler, Michalis Faloutsos and Christos Faloutsos) – In ECML-PKDD 2010, Barcelona, Spain

16. MetricForensics: A Multi-Level Approach for Mining Volatile Graphs (Keith Henderson, Tina Eliassi-Rad, Christos Faloutsos, Leman Akoglu, Lei Li, Koji Maruhashi, B. Aditya Prakash and Hanghang Tong) - In SIGKDD 2010, Washington D.C.

Page 74: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 74

Acknowledgements

Collaborators Christos Faloutsos Roni Rosenfeld, Michalis Faloutsos, Lada Adamic, Theodore Iwashyna (M.D.), Dave Andersen, Tina Eliassi-Rad, Iulian Neamtiu,

Varun Gupta, Jilles Vreeken, V. S. Subrahmanian John Brownstein (M.D.)

Deepayan Chakrabarti, Hanghang Tong, Kunal Punera, Ashwin Sridharan, Sridhar Machiraju, Mukund Seshadri, Alice Zheng, Lei Li, Polo Chau, Nicholas Valler, Alex Beutel, Xuetao Wei

Page 75: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 75

Acknowledgements

• Students Liangzhe Chen Shashidhar Sundereisan Benjamin Wang Yao Zhang Sorour Amiri

Page 76: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 76

Acknowledgements

Funding

Page 77: Understanding and Predicting Human Behavior using Propagation: From Flu-trends to Cyber-Security B. Aditya Prakash Computer Science Virginia Tech. Keynote

Prakash 2015 77

Analysis Policy/Action Data

Making Diffusion Work for You

B. Aditya Prakash http://www.cs.vt.edu/~badityap