scholarly journals Directional Laplacian Centrality for Cyber Situational Awareness

Author(s):  
Sinan Aksoy ◽  
Emilie Purvine ◽  
Stephen Young

Cyber operations is drowning in diverse, high-volume, multi-source data. In order to get a full picture of current operations and identify malicious events and actors analysts must see through data generated by a mix of human activity and benign automated processes. Although many monitoring and alert systems exist, they typically use signature-based detection methods. We introduce a general method rooted in spectral graph theory to discover patterns and anomalies without a priori knowledge of signatures. We derive and propose a new graph-theoretic centrality measure based on the derivative of the graph Laplacian matrix in the direction of a vertex. While our proposed Directional Laplacian Centrality may be applied to any graph, we study its effectiveness in identifying important Internet Protocol addresses in network flow data. Using both real and synthetic network flow data, we conduct several experiments to test our measure's sensitivity to two types of injected attack profiles.

Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1747
Author(s):  
Hansaka Angel Dias Edirisinghe Kodituwakku ◽  
Alex Keller ◽  
Jens Gregor

The complexity and throughput of computer networks are rapidly increasing as a result of the proliferation of interconnected devices, data-driven applications, and remote working. Providing situational awareness for computer networks requires monitoring and analysis of network data to understand normal activity and identify abnormal activity. A scalable platform to process and visualize data in real time for large-scale networks enables security analysts and researchers to not only monitor and study network flow data but also experiment and develop novel analytics. In this paper, we introduce InSight2, an open-source platform for manipulating both streaming and archived network flow data in real time that aims to address the issues of existing solutions such as scalability, extendability, and flexibility. Case-studies are provided that demonstrate applications in monitoring network activity, identifying network attacks and compromised hosts and anomaly detection.


Author(s):  
Masood Ghasemi ◽  
Sergey G. Nersesov

In this paper, we develop a coordination control technique for a group of agents described by a general class of underactuated dynamics. The objective is for the agents to reach and maintain a desired formation characterized by steady-state distances between the neighboring agents. We use graph theoretic notions to characterize communication topology in the network determined by the information flow directions and captured by the graph Laplacian matrix. Furthermore, using sliding mode control approach, we design decentralized controllers for individual agents that use only data from the neighboring agents which directly communicate their state information to the current agent in order to drive the current agent to the desired steady state. Finally, we show the efficacy of our theoretical results on the example of a system of wheeled mobile robots that reach and maintain the desired formation.


2017 ◽  
Author(s):  
Aurélie Pirayre ◽  
Camille Couprie ◽  
Laurent Duval ◽  
Jean-Christophe Pesquet

AbstractDiscovering meaningful gene interactions is crucial for the identification of novel regulatory processes in cells. Building accurately the related graphs remains challenging due to the large number of possible solutions from available data. Nonetheless, enforcing a priori on the graph structure, such as modularity, may reduce network indeterminacy issues. BRANE Clust (Biologically-Related A priori Network Enhancement with Clustering) refines gene regulatory network (GRN) inference thanks to cluster information. It works as a post-processing tool for inference methods (i.e. CLR, GENIE3). In BRANE Clust, the clustering is based on the inversion of a system of linear equations involving a graph-Laplacian matrix promoting a modular structure. Our approach is validated on DREAM4 and DREAM5 datasets with objective measures, showing significant comparative improvements. We provide additional insights on the discovery of novel regulatory or co-expressed links in the inferred Escherichia coli network evaluated using the STRING database. The comparative pertinence of clustering is discussed computationally (SIMoNe, WGCNA, X-means) and biologically (RegulonDB). BRANE Clust software is available at: http://www-syscom.univ-mlv.fr/∼pirayre/Codes-GRN-BRANE-clust.html


2021 ◽  
Author(s):  
Hansi Hettiarachchi ◽  
Mariam Adedoyin-Olowe ◽  
Jagdev Bhogal ◽  
Mohamed Medhat Gaber

AbstractSocial media is becoming a primary medium to discuss what is happening around the world. Therefore, the data generated by social media platforms contain rich information which describes the ongoing events. Further, the timeliness associated with these data is capable of facilitating immediate insights. However, considering the dynamic nature and high volume of data production in social media data streams, it is impractical to filter the events manually and therefore, automated event detection mechanisms are invaluable to the community. Apart from a few notable exceptions, most previous research on automated event detection have focused only on statistical and syntactical features in data and lacked the involvement of underlying semantics which are important for effective information retrieval from text since they represent the connections between words and their meanings. In this paper, we propose a novel method termed Embed2Detect for event detection in social media by combining the characteristics in word embeddings and hierarchical agglomerative clustering. The adoption of word embeddings gives Embed2Detect the capability to incorporate powerful semantical features into event detection and overcome a major limitation inherent in previous approaches. We experimented our method on two recent real social media data sets which represent the sports and political domain and also compared the results to several state-of-the-art methods. The obtained results show that Embed2Detect is capable of effective and efficient event detection and it outperforms the recent event detection methods. For the sports data set, Embed2Detect achieved 27% higher F-measure than the best-performed baseline and for the political data set, it was an increase of 29%.


2015 ◽  
Vol 26 (03) ◽  
pp. 367-380 ◽  
Author(s):  
Xingqin Qi ◽  
Edgar Fuller ◽  
Rong Luo ◽  
Guodong Guo ◽  
Cunquan Zhang

In spectral graph theory, the Laplacian energy of undirected graphs has been studied extensively. However, there has been little work yet for digraphs. Recently, Perera and Mizoguchi (2010) introduced the directed Laplacian matrix [Formula: see text] and directed Laplacian energy [Formula: see text] using the second spectral moment of [Formula: see text] for a digraph [Formula: see text] with [Formula: see text] vertices, where [Formula: see text] is the diagonal out-degree matrix, and [Formula: see text] with [Formula: see text] whenever there is an arc [Formula: see text] from the vertex [Formula: see text] to the vertex [Formula: see text] and 0 otherwise. They studied the directed Laplacian energies of two special families of digraphs (simple digraphs and symmetric digraphs). In this paper, we extend the study of Laplacian energy for digraphs which allow both simple and symmetric arcs. We present lower and upper bounds for the Laplacian energy for such digraphs and also characterize the extremal graphs that attain the lower and upper bounds. We also present a polynomial algorithm to find an optimal orientation of a simple undirected graph such that the resulting oriented graph has the minimum Laplacian energy among all orientations. This solves an open problem proposed by Perera and Mizoguchi at 2010.


2016 ◽  
Vol 8 (3) ◽  
pp. 327-333 ◽  
Author(s):  
Rimas Ciplinskas ◽  
Nerijus Paulauskas

New and existing methods of cyber-attack detection are constantly being developed and improved because there is a great number of attacks and the demand to protect from them. In prac-tice, current methods of attack detection operates like antivirus programs, i. e. known attacks signatures are created and attacks are detected by using them. These methods have a drawback – they cannot detect new attacks. As a solution, anomaly detection methods are used. They allow to detect deviations from normal network behaviour that may show a new type of attack. This article introduces a new method that allows to detect network flow anomalies by using local outlier factor algorithm. Accom-plished research allowed to identify groups of features which showed the best results of anomaly flow detection according the highest values of precision, recall and F-measure. Kibernetinių atakų gausa ir įvairovė bei siekis nuo jų apsisaugoti verčia nuolat kurti naujus ir tobulinti jau esamus atakų aptikimo metodus. Kaip rodo praktika, dabartiniai atakų atpažinimo metodai iš esmės veikia pagal antivirusinių programų principą, t.y. sudaromi žinomų atakų šablonai, kuriais remiantis yra aptinkamos atakos, tačiau pagrindinis tokių metodų trūkumas – negalėjimas aptikti naujų, dar nežinomų atakų. Šiai problemai spręsti yra pasitelkiami anomalijų aptikimo metodai, kurie leidžia aptikti nukrypimus nuo normalios tinklo būsenos. Straipsnyje yra pateiktas naujas metodas, leidžiantis aptikti kompiuterių tinklo paketų srauto anomalijas taikant lokalių išskirčių faktorių algoritmą. Atliktas tyrimas leido surasti požymių grupes, kurias taikant anomalūs tinklo srautai yra atpažįstami geriausiai, t. y. pasiekiamos didžiausios tikslumo, atkuriamumo ir F-mato reikšmės.


2020 ◽  
Vol 4 (3) ◽  
pp. 871-890
Author(s):  
Arseny A. Sokolov ◽  
Peter Zeidman ◽  
Adeel Razi ◽  
Michael Erb ◽  
Philippe Ryvlin ◽  
...  

Bridging the gap between symmetric, direct white matter brain connectivity and neural dynamics that are often asymmetric and polysynaptic may offer insights into brain architecture, but this remains an unresolved challenge in neuroscience. Here, we used the graph Laplacian matrix to simulate symmetric and asymmetric high-order diffusion processes akin to particles spreading through white matter pathways. The simulated indirect structural connectivity outperformed direct as well as absent anatomical information in sculpting effective connectivity, a measure of causal and directed brain dynamics. Crucially, an asymmetric diffusion process determined by the sensitivity of the network nodes to their afferents best predicted effective connectivity. The outcome is consistent with brain regions adapting to maintain their sensitivity to inputs within a dynamic range. Asymmetric network communication models offer a promising perspective for understanding the relationship between structural and functional brain connectomes, both in normalcy and neuropsychiatric conditions.


Author(s):  
Scott N Lieske ◽  
Simone Z Leao ◽  
Lindsey Conrow ◽  
Chris Pettit

In an era of data-driven smart cities, the possibility of using crowdsourced big data to support evidence-based planning and decision-making remains a challenge. Along with the increased availability and potential utility of crowdsourced data, there is a clear need to assess the validity of these data in order to determine their appropriate use for planning and management. Moreover, with growth and rapid urbanization in many cities, there are increasing challenges associated with urban mobility. The goal of this research is to develop an understanding of the geographical representativeness of crowdsourced data in the context of urban mobility through investigation of bicycling in Australian cities. In order to leverage both the geographic distribution and high volume of crowdsourced data for validity assessment, we present a two-stage statistical approach. First, we evaluate flow data through correlation between spatial interaction matrices in the presence of spatial autocorrelation. The second stage evaluates the quantity of information available within the interaction matrices. The approach is demonstrated with crowdsourced bicycling commuting routes recorded by the RiderLog app from 2010 to 2014 that are then correlated with census bicycling journey to work data. Data are from four of Australia’s state capital cities: Adelaide, Brisbane, Melbourne and Perth. These methods assess the representativeness of individual bicycle routes that address the full pattern of flows within multiorigin multidestination systems and incorporate spatial autocorrelation. Results indicate that these crowdsourced data are geographically representative of regional travel where there are higher data volumes, generally in central business districts and occasionally in outlying areas. This research provides insights into both methods for statistical comparison of flow data and the use of crowdsourced bicycling routes for urban planning and management.


2020 ◽  
Vol 6 (6) ◽  
pp. 55
Author(s):  
Gerasimos Arvanitis ◽  
Aris S. Lalos ◽  
Konstantinos Moustakas

Recently, spectral methods have been extensively used in the processing of 3D meshes. They usually take advantage of some unique properties that the eigenvalues and the eigenvectors of the decomposed Laplacian matrix have. However, despite their superior behavior and performance, they suffer from computational complexity, especially while the number of vertices of the model increases. In this work, we suggest the use of a fast and efficient spectral processing approach applied to dense static and dynamic 3D meshes, which can be ideally suited for real-time denoising and compression applications. To increase the computational efficiency of the method, we exploit potential spectral coherence between adjacent parts of a mesh and then we apply an orthogonal iteration approach for the tracking of the graph Laplacian eigenspaces. Additionally, we present a dynamic version that automatically identifies the optimal subspace size that satisfies a given reconstruction quality threshold. In this way, we overcome the problem of the perceptual distortions, due to the fixed number of subspace sizes that is used for all the separated parts individually. Extensive simulations carried out using different 3D models in different use cases (i.e., compression and denoising), showed that the proposed approach is very fast, especially in comparison with the SVD based spectral processing approaches, while at the same time the quality of the reconstructed models is of similar or even better reconstruction quality. The experimental analysis also showed that the proposed approach could also be used by other denoising methods as a preprocessing step, in order to optimize the reconstruction quality of their results and decrease their computational complexity since they need fewer iterations to converge.


Sign in / Sign up

Export Citation Format

Share Document