-
Quickest Change Detection with Confusing Change
Authors:
Yu-Zhen Janice Chen,
Jinhang Zuo,
Venugopal V. Veeravalli,
Don Towsley
Abstract:
In the problem of quickest change detection (QCD), a change occurs at some unknown time in the distribution of a sequence of independent observations. This work studies a QCD problem where the change is either a bad change, which we aim to detect, or a confusing change, which is not of our interest. Our objective is to detect a bad change as quickly as possible while avoiding raising a false alarm…
▽ More
In the problem of quickest change detection (QCD), a change occurs at some unknown time in the distribution of a sequence of independent observations. This work studies a QCD problem where the change is either a bad change, which we aim to detect, or a confusing change, which is not of our interest. Our objective is to detect a bad change as quickly as possible while avoiding raising a false alarm for pre-change or a confusing change. We identify a specific set of pre-change, bad change, and confusing change distributions that pose challenges beyond the capabilities of standard Cumulative Sum (CuSum) procedures. Proposing novel CuSum-based detection procedures, S-CuSum and J-CuSum, leveraging two CuSum statistics, we offer solutions applicable across all kinds of pre-change, bad change, and confusing change distributions. For both S-CuSum and J-CuSum, we provide analytical performance guarantees and validate them by numerical results. Furthermore, both procedures are computationally efficient as they only require simple recursive updates.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Covert Cycle Stealing in a Single FIFO Server
Authors:
Bo Jiang,
Philippe Nain,
Don Towsley
Abstract:
Consider a setting where Willie generates a Poisson stream of jobs and routes them to a single server that follows the first-in first-out discipline. Suppose there is an adversary Alice, who desires to receive service without being detected. We ask the question: what is the number of jobs that she can receive covertly, i.e. without being detected by Willie? In the case where both Willie and Alice…
▽ More
Consider a setting where Willie generates a Poisson stream of jobs and routes them to a single server that follows the first-in first-out discipline. Suppose there is an adversary Alice, who desires to receive service without being detected. We ask the question: what is the number of jobs that she can receive covertly, i.e. without being detected by Willie? In the case where both Willie and Alice jobs have exponential service times with respective rates $μ_1$ and $μ_2$, we demonstrate a phase-transition when Alice adopts the strategy of inserting a single job probabilistically when the server idles : over $n$ busy periods, she can achieve a covert throughput, measured by the expected number of jobs covertly inserted, of $\mathcal{O}(\sqrt{n})$ when $μ_1 < 2μ_2$, $\mathcal{O}(\sqrt{n/\log n})$ when $μ_1 = 2μ_2$, and $\mathcal{O}(n^{μ_2/μ_1})$ when $μ_1 > 2μ_2$. When both Willie and Alice jobs have general service times we establish an upper bound for the number of jobs Alice can execute covertly. This bound is related to the Fisher information. More general insertion policies are also discussed.
△ Less
Submitted 4 May, 2021; v1 submitted 11 March, 2020;
originally announced March 2020.
-
Decentralized gradient methods: does topology matter?
Authors:
Giovanni Neglia,
Chuan Xu,
Don Towsley,
Gianmarco Calbi
Abstract:
Consensus-based distributed optimization methods have recently been advocated as alternatives to parameter server and ring all-reduce paradigms for large scale training of machine learning models. In this case, each worker maintains a local estimate of the optimal parameter vector and iteratively updates it by averaging the estimates obtained from its neighbors, and applying a correction on the ba…
▽ More
Consensus-based distributed optimization methods have recently been advocated as alternatives to parameter server and ring all-reduce paradigms for large scale training of machine learning models. In this case, each worker maintains a local estimate of the optimal parameter vector and iteratively updates it by averaging the estimates obtained from its neighbors, and applying a correction on the basis of its local dataset. While theoretical results suggest that worker communication topology should have strong impact on the number of epochs needed to converge, previous experiments have shown the opposite conclusion. This paper sheds lights on this apparent contradiction and show how sparse topologies can lead to faster convergence even in the absence of communication delays.
△ Less
Submitted 28 February, 2020;
originally announced February 2020.
-
Quickest Detection of Growing Dynamic Anomalies in Networks
Authors:
Georgios Rovatsos,
Venugopal V. Veeravalli,
Don Towsley,
Ananthram Swami
Abstract:
The problem of quickest growing dynamic anomaly detection in sensor networks is studied. Initially, the observations at the sensors, which are sampled sequentially by the decision maker, are generated according to a pre-change distribution. At some unknown but deterministic time instant, a dynamic anomaly emerges in the network, affecting a different set of sensors as time progresses. The observat…
▽ More
The problem of quickest growing dynamic anomaly detection in sensor networks is studied. Initially, the observations at the sensors, which are sampled sequentially by the decision maker, are generated according to a pre-change distribution. At some unknown but deterministic time instant, a dynamic anomaly emerges in the network, affecting a different set of sensors as time progresses. The observations of the affected sensors are generated from a post-change distribution. It is assumed that the number of affected sensors increases with time, and that only the initial and the final size of the anomaly are known by the decision maker. The goal is to detect the emergence of the anomaly as quickly as possible while guaranteeing a sufficiently low frequency of false alarm events. This detection problem is posed as a stochastic optimization problem by using a delay metric that is based on the worst possible path of the anomaly. A detection rule is proposed that is asymptotically optimal as the mean time to false alarm goes to infinity. Finally, numerical results are provided to validate our theoretical analysis.
△ Less
Submitted 2 February, 2020; v1 submitted 21 October, 2019;
originally announced October 2019.
-
Planting trees in graphs, and finding them back
Authors:
Laurent Massoulié,
Ludovic Stephan,
Don Towsley
Abstract:
In this paper we study detection and reconstruction of planted structures in Erdős-Rényi random graphs. Motivated by a problem of communication security, we focus on planted structures that consist in a tree graph. For planted line graphs, we establish the following phase diagram. In a low density region where the average degree $λ$ of the initial graph is below some critical value $λ_c=1$, detect…
▽ More
In this paper we study detection and reconstruction of planted structures in Erdős-Rényi random graphs. Motivated by a problem of communication security, we focus on planted structures that consist in a tree graph. For planted line graphs, we establish the following phase diagram. In a low density region where the average degree $λ$ of the initial graph is below some critical value $λ_c=1$, detection and reconstruction go from impossible to easy as the line length $K$ crosses some critical value $f(λ)\ln(n)$, where $n$ is the number of nodes in the graph. In the high density region $λ>λ_c$, detection goes from impossible to easy as $K$ goes from $o(\sqrt{n})$ to $ω(\sqrt{n})$, and reconstruction remains impossible so long as $K=o(n)$. For $D$-ary trees of varying depth $h$ and $2\le D\le O(1)$, we identify a low-density region $λ<λ_D$, such that the following holds. There is a threshold $h*=g(D)\ln(\ln(n))$ with the following properties. Detection goes from feasible to impossible as $h$ crosses $h*$. We also show that only partial reconstruction is feasible at best for $h\ge h*$. We conjecture a similar picture to hold for $D$-ary trees as for lines in the high-density region $λ>λ_D$, but confirm only the following part of this picture: Detection is easy for $D$-ary trees of size $ω(\sqrt{n})$, while at best only partial reconstruction is feasible for $D$-ary trees of any size $o(n)$. These results are in contrast with the corresponding picture for detection and reconstruction of {\em low rank} planted structures, such as dense subgraphs and block communities: We observe a discrepancy between detection and reconstruction, the latter being impossible for a wide range of parameters where detection is easy. This property does not hold for previously studied low rank planted structures.
△ Less
Submitted 25 June, 2019; v1 submitted 5 November, 2018;
originally announced November 2018.
-
Towards Provably Invisible Network Flow Fingerprints
Authors:
Ramin Soltani,
Dennis Goeckel,
Don Towsley,
Amir Houmansadr
Abstract:
Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a wa…
▽ More
Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a watchful adversary Willie. Bob, who receives the set of fingerprinted flows after they pass through the network modeled as a collection of independent and parallel $M/M/1$ queues, wishes to extract Alice's embedded fingerprints to infer the connection between input and output links of the network. We consider two scenarios: 1) Alice embeds fingerprints in all of the flows; 2) Alice embeds fingerprints in each flow independently with probability $p$. Assuming that the flow rates are equal, we calculate the maximum number of flows in which Alice can invisibly embed fingerprints while having those fingerprints successfully decoded by Bob. Then, we extend the construction and analysis to the case where flow rates are distinct, and discuss the extension of the network model.
△ Less
Submitted 22 September, 2018; v1 submitted 27 November, 2017;
originally announced November 2017.
-
On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with Fitness
Authors:
Bo Jiang,
Daniel R. Figueiredo,
Bruno Ribeiro,
Don Towsley
Abstract:
Cumulative advantage (CA) refers to the notion that accumulated resources foster the accumulation of further resources in competitions, a phenomenon that has been empirically observed in various contexts. The oldest and arguably simplest mathematical model that embodies this general principle is the Pólya urn process, which finds applications in a myriad of problems. The original model captures th…
▽ More
Cumulative advantage (CA) refers to the notion that accumulated resources foster the accumulation of further resources in competitions, a phenomenon that has been empirically observed in various contexts. The oldest and arguably simplest mathematical model that embodies this general principle is the Pólya urn process, which finds applications in a myriad of problems. The original model captures the dynamics of competitions between two equally fit agents under linear CA effects, which can be readily generalized to incorporate different fitnesses and nonlinear CA effects. We study two statistics of competitions under the generalized model, namely duration (i.e., time of the last tie) and intensity (i.e., number of ties). We give rigorous mathematical characterizations of the tail distributions of both duration and intensity under the various regimes for fitness and nonlinearity, which reveal very interesting behaviors. For example, fitness superiority induces much shorter competitions in the sublinear regime while much longer competitions in the superlinear regime. Our findings can shed light on the application of Pólya urn processes in more general contexts where fitness and nonlinearity may be present.
△ Less
Submitted 7 April, 2017; v1 submitted 5 April, 2016;
originally announced April 2016.
-
Nonstandard regular variation of in-degree and out-degree in the preferential attachment model
Authors:
Gennady Samorodnitsky,
Sidney Resnick,
Don Towsley,
Richard Davis,
Amy Willis,
Phyllis Wan
Abstract:
For the directed edge preferential attachment network growth model studied by Bollobas et al. (2003) and Krapivsky and Redner (2001), we prove that the joint distribution of in-degree and out-degree has jointly regularly varying tails. Typically the marginal tails of the in-degree distribution and the out-degree distribution have different regular variation indices and so the joint regular variati…
▽ More
For the directed edge preferential attachment network growth model studied by Bollobas et al. (2003) and Krapivsky and Redner (2001), we prove that the joint distribution of in-degree and out-degree has jointly regularly varying tails. Typically the marginal tails of the in-degree distribution and the out-degree distribution have different regular variation indices and so the joint regular variation is non-standard. Only marginal regular variation has been previously established for this distribution in the cases where the marginal tail indices are different.
△ Less
Submitted 19 May, 2014;
originally announced May 2014.
-
On Set Size Distribution Estimation and the Characterization of Large Networks via Sampling
Authors:
Fabricio Murai,
Bruno Ribeiro,
Don Towsley,
Pinghui Wang
Abstract:
In this work we study the set size distribution estimation problem, where elements are randomly sampled from a collection of non-overlapping sets and we seek to recover the original set size distribution from the samples. This problem has applications to capacity planning, network theory, among other areas. Examples of real-world applications include characterizing in-degree distributions in large…
▽ More
In this work we study the set size distribution estimation problem, where elements are randomly sampled from a collection of non-overlapping sets and we seek to recover the original set size distribution from the samples. This problem has applications to capacity planning, network theory, among other areas. Examples of real-world applications include characterizing in-degree distributions in large graphs and uncovering TCP/IP flow size distributions on the Internet. We demonstrate that it is hard to estimate the original set size distribution. The recoverability of original set size distributions presents a sharp threshold with respect to the fraction of elements that remain in the sets. If this fraction remains below a threshold, typically half of the elements in power-law and heavier-than-exponential-tailed distributions, then the original set size distribution is unrecoverable. We also discuss practical implications of our findings.
△ Less
Submitted 2 December, 2012; v1 submitted 4 September, 2012;
originally announced September 2012.