Locating Optimal Destabilization Strategies

Similar documents
CS Machine Learning

BMBF Project ROBUKOM: Robust Communication Networks

Python Machine Learning

Introduction to Causal Inference. Problem Set 1. Required Problems

System Implementation for SemEval-2017 Task 4 Subtask A Based on Interpolated Deep Neural Networks

Measurement & Analysis in the Real World

Lecture 1: Machine Learning Basics

Probability and Statistics Curriculum Pacing Guide

Telekooperation Seminar

Towards a Collaboration Framework for Selection of ICT Tools

Australian Journal of Basic and Applied Sciences

Axiom 2013 Team Description Paper

Understanding and Interpreting the NRC s Data-Based Assessment of Research-Doctorate Programs in the United States (2010)

Knowledge Transfer in Deep Convolutional Neural Nets

Machine Learning and Data Mining. Ensembles of Learners. Prof. Alexander Ihler

On-the-Fly Customization of Automated Essay Scoring

Moderator: Gary Weckman Ohio University USA

15 th ICCRTS THE EVOLUTION OF C2. Suggested Topics: Experimentation and Analysis; Modeling and Simulation; C2 Architectures and Technologies

Commanding Officer Decision Superiority: The Role of Technology and the Decision Maker

Lahore University of Management Sciences. FINN 321 Econometrics Fall Semester 2017

CSC200: Lecture 4. Allan Borodin

Expert Reference Series of White Papers. Mastering Problem Management

Active Learning. Yingyu Liang Computer Sciences 760 Fall

Massachusetts Institute of Technology Tel: Massachusetts Avenue Room 32-D558 MA 02139

*Net Perceptions, Inc West 78th Street Suite 300 Minneapolis, MN

Interaction Design Considerations for an Aircraft Carrier Deck Agent-based Simulation

The Good Judgment Project: A large scale test of different methods of combining expert predictions

On the Combined Behavior of Autonomous Resource Management Agents

Assignment 1: Predicting Amazon Review Ratings

Radius STEM Readiness TM

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

WE GAVE A LAWYER BASIC MATH SKILLS, AND YOU WON T BELIEVE WHAT HAPPENED NEXT

Evidence for Reliability, Validity and Learning Effectiveness

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses

Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I

Why Did My Detector Do That?!

An Introduction to Simio for Beginners

Fragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing

AN EXAMPLE OF THE GOMORY CUTTING PLANE ALGORITHM. max z = 3x 1 + 4x 2. 3x 1 x x x x N 2

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

Rule Learning With Negation: Issues Regarding Effectiveness

Probabilistic Mission Defense and Assurance

The Enterprise Knowledge Portal: The Concept

WHEN THERE IS A mismatch between the acoustic

Generative models and adversarial training

Learning From the Past with Experiment Databases

Computer Emergency Response Team (CERT)

Practice Examination IREB

Time series prediction

Title:A Flexible Simulation Platform to Quantify and Manage Emergency Department Crowding

Improving Fairness in Memory Scheduling

Networks and the Diffusion of Cutting-Edge Teaching and Learning Knowledge in Sociology

Software Development Plan

An empirical study of learning speed in backpropagation

University of Groningen. Systemen, planning, netwerken Bosman, Aart

Seminar - Organic Computing

Rule Learning with Negation: Issues Regarding Effectiveness

While you are waiting... socrative.com, room number SIMLANG2016

Quantitative analysis with statistics (and ponies) (Some slides, pony-based examples from Blase Ur)

Team Formation for Generalized Tasks in Expertise Social Networks

Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge

Executive Guide to Simulation for Health

Truth Inference in Crowdsourcing: Is the Problem Solved?

A study of speaker adaptation for DNN-based speech synthesis

Speech Recognition by Indexing and Sequencing

GCSE Mathematics B (Linear) Mark Scheme for November Component J567/04: Mathematics Paper 4 (Higher) General Certificate of Secondary Education

Major Milestones, Team Activities, and Individual Deliverables

CHAPTER 4: REIMBURSEMENT STRATEGIES 24

Redirected Inbound Call Sampling An Example of Fit for Purpose Non-probability Sample Design

Circuit Simulators: A Revolutionary E-Learning Platform

Speech Emotion Recognition Using Support Vector Machine

(Sub)Gradient Descent

12- A whirlwind tour of statistics

CUSTOMER EXPERIENCE ASSESSMENT SALES (CEA-S) TEST GUIDE

Testing A Moving Target: How Do We Test Machine Learning Systems? Peter Varhol Technology Strategy Research, USA

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

PAGE(S) WHERE TAUGHT If sub mission ins not a book, cite appropriate location(s))

INPE São José dos Campos

Purdue Data Summit Communication of Big Data Analytics. New SAT Predictive Validity Case Study

JONATHAN H. WRIGHT Department of Economics, Johns Hopkins University, 3400 N. Charles St., Baltimore MD (410)

CHAPTER 2: COUNTERING FOUR RISKY ASSUMPTIONS

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for

Pragmatic Use Case Writing

Introduction to the Practice of Statistics

STRATEGIC GROWTH FROM THE BASE OF THE PYRAMID

Reduce the Failure Rate of the Screwing Process with Six Sigma Approach

DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE. Junior Year. Summer (Bridge Quarter) Fall Winter Spring GAME Credits.

Generating Test Cases From Use Cases

IAT 888: Metacreation Machines endowed with creative behavior. Philippe Pasquier Office 565 (floor 14)

THE VIRTUAL WELDING REVOLUTION HAS ARRIVED... AND IT S ON THE MOVE!

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition

Innovating Toward a Vibrant Learning Ecosystem:

arxiv: v1 [cs.cl] 2 Apr 2017

PATROL OFFICER CQB. A u n i q u e C Q B c o u r s e f o r P o l i c e p e r s o n a l o n l y.

SARDNET: A Self-Organizing Feature Map for Sequences

Introduction to Modeling and Simulation. Conceptual Modeling. OSMAN BALCI Professor

DOCTOR OF PHILOSOPHY HANDBOOK

CHAPTER V: CONCLUSIONS, CONTRIBUTIONS, AND FUTURE RESEARCH

Transcription:

Locating Optimal Destabilization Strategies Il-Chul Moon PhD student School of Computer Science Carnegie Mellon University Jun/ 13/ 27 Center for Computational Analysis of Social and Organizational Systems http://www.casos.cs.cmu.edu/

Problem statement Network destabilization is an important tactic. Counter terrorism destabilize a terrorist network to disrupt its plan Network centric warfare destabilize a C2 structure to disrupt information diffusion Computer network security destabilize a computer network to disrupt its function However, we don t have complete answers to the following questions. How to find an efficient network destabilization strategy (or scenario)? Minimum intervention, maximum destabilization effect If we remove a node (possibly, agent, resource or knowledge) in a network, Which node to target? Agents with many resources and knowledge vs. Agents at the center of an agentto-agent network When to remove the node? Earlier removal of hub agents and later removal of information-control agents Vs. Later removal of hub agents and earlier removal of information-control agents How to assess the located strategy under dynamically changing conditions? Big damage, but still able to recover Or, small damage, but unable to recover Or, big damage and unable to recover June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 2

Introduction We limit ourselves to Destabilization of an organization represented in a network structure Only agent removal strategic intervention Only one agent removal for a single intervention Limited number of interventions We develop a framework Dynamic network analysis on the target network to reveal its vulnerabilities Automatic generation of (optimal) destabilization scenario by using machine learning technique and network analysis results Assess the scenarios by utilizing a multi-agent network simulation model, Dynet, as a test-bed for the developed scenarios We expect to see Better destabilization result from automatically generated scenarios compared to random destabilization scenarios An implied trend of the generated destabilization scenarios June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 3

Analyzed Terrorist Organization A terrorist network from the U.S. Embassy bombing incident in Tanzania The network has 16 Agents, 4 knowledge pieces, 4 resources (5 tasks, too, but not used for this analysis) Only 16 agents will be the target of removal, and each scenario has 1 removal chances. June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 4

Overall Framework Description Target Network Dynamic Network Analysis -Calculate network analysis measures Random Scenario Generator -Randomly synthesize a removal scenario Dynet & Near Term Analysis -Assess the effect of a scenario with a simulation Machine Learning Algorithm -Train the algorithm based on random scenario results -Generate the scenario based on the training results Located Optimal Destabilization Scenario - Assess and compare the effectiveness to the random generation case Integration of three different components Dynamic Network Analysis reveal the vulnerability and trend Multi-Agent Simulation Model assess the effect of the scenario Machine Learning train the non-linear results from the scenario and simulation and compose the optimal scenario June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 5

Definition of Destabilization Scenario (Isolation Sequence) In this presentation, a destabilization scenario is equivalent to an isolation (removal) sequence for agents Ten isolations and one agent removal for each isolation The test dataset has 16 agents The first isolation happens at time 2, and the next isolation happens after a gap of two time periods. Start at time 2 and end at time 2 i.e. Random scenario generation Randomly pick an agent for each intervention in a scenario First intervention, isolate al-owahali at time-step 2 Last intervention, isolate sadiq-odeh at time-step 2 June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 6

Dynet and Near-Term Analysis: a multi-agent simulation for assessing the sequence Dynet (a.k.a. Construct) Multi-agent simulation Agent interact based on probability of interaction which is determined by agent-toagent network, relative similarity, relative expertise, etc. Able to simulate node removals in the middle of simulation Various performance metrics, such as knowledge diffusion, task accuracy, etc. Near-Term Analysis A wrapping function for Dynet GUI front-end for Dynet and callable for ORA (a dynamic network analysis tool) Provide a function to setup a sophisticated strategic intervention scenario Easy control of parameters for Dynet June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 7

Evaluation criteria for destabilization events We use a knowledge diffusion measure to see the performance changes Three classes of events Suppression KD Diffusion rate goes up, but not as much as baseline NKwithout intervention Damage Diffusion rate goes down, but can recover in the next time point Break Diffusion rate goes down, and the damage sustained for multiple time points N K i= j= = AK ij June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 8

Dynamic Network Analysis measures Calculate the target network s network-level and node-level metrics based on dynamic network analysis Metrics are responsible for Training the learning algorithm with random isolation sequence Eventually the generation of optimized isolation sequence Metrics are calculated by ORA Used measures Network measure (27 measures) knowledge task completion, knowledge under supply, overall task completion, performance as accuracy, average distance, average speed, betweenness centralization, closeness centralization, clustering coefficient, communicative need, connectedness, density, diameter, efficiency, fragmentation, global efficiency, hierarchy, in degree centralization, lateral edge count, minimum speed, network levels, out degree centralization, reciprocal edge count, sequential edge count, span of control, strong component count, weak component count Node measure (11 measures) cognitive demand, total degree centrality, clique count, row degree centrality, eigen vector centrality, betweenness centrality, high betweenness and low degree, task exclusivity, knowledge exclusivity, resource exclusivity, workload June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 9

Generation of Optimal Isolation Sequence : machine learning approach with DNA measures We create a training set by brief searching in the possible sequence space Record the result of intervention, metrics for node positions, metrics for network topology We train a machine learning algorithm, a variant of Support Vector Machine Result of intervention is a dependent variable Metrics for nodes and networks are an independent variables We use the trained learning algorithm and create possible sequences Get estimates for result by supplying the node and network metrics Synthesize the sequence by choosing the agents with the highest damage estimates June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 1

Result (1) : average destabilization performance Randomly generated isolation sequence vs. learning algorithm generated isolation sequence The learning algorithm generated sequences show more destabilization events and lower overall knowledge diffusion rates. High level comparison of two isolation sequence generation schemes 8 Number of Suppression 4.5 Number of Damage.35 Number of Break Knolwedge Diffusion at End Time-point.9 7 4.3.8 Event Happening 6 5 4 3 2 Event Happening 3.5 3 2.5 2 1.5 1 Event Happening.25.2.15.1 Knowledge Diffusion.7.6.5.4.3.2 1.5.5.1 Random Select Random Select Random Select Random Select June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 11

Result (2) : average over time destabilization result Baseline, a case without intervention, shows highest knowledge diffusion rate. Random isolation sequence shows somewhat damaged diffusion rate. Learning algorithm shows very lower diffusion rate. This is the average across 124 scenarios of the random and optimized cases. Avg. Knowledge Diffusion 1.9.8.7.6.5.4.3.2.1 Random Selection Non-isolation Smooth information diffusion curve: fail to destabilize the information flow Avg. Knowledge Diffusion of Random Generation and Selection Generation Some damage events: relative success in preventing information diffusion Almost no difference between nointervention and random interventions Big difference between average results from random interventions and optimized interventions 5 1 15 2 25 3 35 4 45 5 June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 12

Result (3) : best over time destabilization result Baseline, a case without intervention, shows highest knowledge diffusion rate. Same to the previous slide Random isolation sequence shows pretty damaged diffusion rate, but the organization is still able to recover. Also, notice the big variance between the best case and the average case Learning algorithm shows total break-down of the organization in terms of knowledge diffusion. Knowledge Diffusion 1.9.8.7.6.5.4.3.2.1 Random Selection Non-isolation Knowledge Diffusion of Best Destabilization Strategies of Random Generation and Selection Generation Random interventions: Still able to recover Optimized interventions: Total break point, no more network healing Difference between nointervention and random interventions Difference between random interventions and optimized interventions 5 1 15 2 25 3 35 4 45 5 June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 13

Result (4) : a trend about who to target and when Average the Beginning waves of isolations node-level Target nodes measures with of high-degree the first centrality, clique count, selected betweenness agents centrality, etc Next waves of isolations Target nodes with high betweennes and low degree, meaning connecting nodes Isolations of agents with exclusive knowledge are not the first priority. It happens after initial isolation of high degree centrality agents.35.3.25.2.15 cognitive demand.1 5 1 15 2 row degree centrality-knowledge.6.55.5.45.4.35 5 1 15 2 betweenness centrality.4.3.2.1 5 1 15 2 knowledge exclusivity.5.4.3.2.1 5 1 15 2.25.2.15.1.5 total degree centrality 5 1 15 2 row degree centrality-resource.4.3.2.1 124 1.5 1.5 clique count 5 1 15 2 eigenvector centrality.6 5 1 15 2 5 1 15 2 high betweenness and low degree task exclusivity.5.2.4.15.3.1.2 Optimized (or.5.1 5 1 15 2 5 1 15 2 random) : resource exclusivity workload.2.2.15.15 destabilization.1.1.5.5 scenarios 5 1 15 2 5 1 15 2.55.5.45.4.35 June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 14

Conclusion We demonstrated that Machine learning based destabilization scenario creation Destabilization scenario test result based on a multi-agent simulation Better destabilization performance compared to random isolations We examined and found out that Trained learning algorithm have a certain preference in choosing the target Initial attacks, target nodes at the center of the network Last attacks, target nodes at bridging points Isolation of agents with exclusive knowledge may not be a priority, and they can be isolated after the nodes with high degree centrality. This tendency implies that Destabilize the network first Isolate the exclusive knowledge or resource later June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 15

Limitation & Future work Too small dataset, need extensive tests Need to find out the performance changes when we limit the initial training set size. Need to test the robustness of this framework when the network is not fully uncovered. Need to test the scalability in terms of computation time Any improvements in three related areas will enhance the performance of this framework Better social network metrics to represent the network structure accurately Better multi-agent models with better usability, confidence, validation, etc. Better machine learning technique June 25, 27 Copyright 27 Kathleen M. Carley, CASOS, ISRI, SCS, CMU 16

Acknowledgements This work was supported in part by the Office of Naval Research (ONR N11421973-NAVY, N1461921 and N14-6-14), the National Science Foundation (SES-452487), the Army Research Lab, and the AirForce Office of Sponsored Research (MURI: Cultural Modeling of the Adversary, 6322) and the Department of Defense for research in the area of dynamic network analysis. Additional support was provided by CASOS - the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon University. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of the Office of Naval Research, the National Science Foundation, the Army Research Lab or the U.S. government. Center for Computational Analysis of Social and Organizational Systems http://www.casos.cs.cmu.edu/