ترغب بنشر مسار تعليمي؟ اضغط هنا

Inferring Multiple Relationships between ASes using Graph Convolutional Network

78   0   0.0 ( 0 )
 نشر من قبل Shu Xincheng
 تاريخ النشر 2021
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

Precisely understanding the business relationships between Autonomous Systems (ASes) is essential for studying the Internet structure. So far, many inference algorithms have been proposed to classify the AS relationships, which mainly focus on Peer-Peer (P2P) and Provider-Customer (P2C) binary classification and achieved excellent results. However, there are other types of AS relationships in actual scenarios, i.e., the businessbased sibling and structure-based exchange relationships, that were neglected in the previous research. These relationships are usually difficult to be inferred by existing algorithms because there is no discrimination on the designed features compared to the P2P or P2C relationships. In this paper, we focus on the multi-classification of AS relationships for the first time. We first summarize the differences between AS relationships under the structural and attribute features, and the reasons why multiple relationships are difficult to be inferred. We then introduce new features and propose a Graph Convolutional Network (GCN) framework, AS-GCN, to solve this multi-classification problem under complex scene. The framework takes into account the global network structure and local link features concurrently. The experiments on real Internet topological data validate the effectiveness of our method, i.e., AS-GCN achieves comparable results on the easy binary classification task, and outperforms a series of baselines on the more difficult multi-classification task, with the overall accuracy above 95%.

قيم البحث

اقرأ أيضاً

The type of business relationships between the Internet autonomous systems (AS) determines the BGP inter-domain routing. Previous works on inferring AS relationships relied on the connectivity information between ASes. In this paper we infer AS relat ionships by analysing the routing polices of ASes encoded in the BGP attributes Communities and the Locpref. We accumulate BGP data from RouteViews, RIPE RIS and the public Route Servers in August 2010 and February 2011. Based on the routing policies extracted from data of the two BGP attributes, we obtain AS relationships for 39% links in our data, which include all links among the Tier-1 ASes and most links between Tier-1 and Tier-2 ASes. We also reveal a number of special AS relationships, namely the hybrid relationship, the partial-transit relationship, the indirect peering relationship and the backup links. These special relationships are relevant to a better understanding of the Internet routing. Our work provides a profound methodological progress for inferring the AS relationships.
In this paper we address the problem of inferring social structure and dominance relationships in a group of rhesus macaques (a species of monkey) using only position data captured using RFID tags. Automatic inference of the social structure in an an imal group enables a number of important capabilities, including: 1) A verifiable measure of how the social structure is affected by an intervention such as a change in the environment, or the introduction of another animal, and 2) A potentially significant reduction in person hours normally used for assessing these changes. Social structure in a group is an important indicator of its members relative level of access to resources and has interesting implications for an individuals health and learning in groups. There are two main quantitative criteria assessed in order to infer the social structure; Time spent close to conspecifics, and displacements. An interaction matrix is used to represent the total duration of events detected as grooming behavior between any two monkeys. This forms an undirected tie-strength (closeness of relationships) graph. A directed graph of hierarchy is constructed by using the well cited assumption of a linear hierarchy for rhesus macaques. Events that contribute to the adjacency matrix for this graph are withdrawals or displacements where a lower ranked monkey moves away from a higher ranked monkey. Displacements are one of the observable behaviors that can act as a strong indication of tie-strength and dominance. To quantify the directedness of interaction during these events we construct histograms of the dot products of motion orientation and relative position. This gives us a measure of how much time a monkey spends in moving towards or away from other group members.
Measuring network flow sizes is important for tasks like accounting/billing, network forensics and security. Per-flow accounting is considered hard because it requires that many counters be updated at a very high speed; however, the large fast memori es needed for storing the counters are prohibitively expensive. Therefore, current approaches aim to obtain approximate flow counts; that is, to detect large elephant flows and then measure their sizes. Recently the authors and their collaborators have developed [1] a novel method for per-flow traffic measurement that is fast, highly memory efficient and accurate. At the core of this method is a novel counter architecture called counter braids. In this paper, we analyze the performance of the counter braid architecture under a Maximum Likelihood (ML) flow size estimation algorithm and show that it is optimal; that is, the number of bits needed to store the size of a flow matches the entropy lower bound. While the ML algorithm is optimal, it is too complex to implement. In [1] we have developed an easy-to-implement and efficient message passing algorithm for estimating flow sizes.
Graph Convolutional Networks (GCNs) have received increasing attention in the machine learning community for effectively leveraging both the content features of nodes and the linkage patterns across graphs in various applications. As real-world graph s are often incomplete and noisy, treating them as ground-truth information, which is a common practice in most GCNs, unavoidably leads to sub-optimal solutions. Existing efforts for addressing this problem either involve an over-parameterized model which is difficult to scale, or simply re-weight observed edges without dealing with the missing-edge issue. This paper proposes a novel framework called Graph-Revised Convolutional Network (GRCN), which avoids both extremes. Specifically, a GCN-based graph revision module is introduced for predicting missing edges and revising edge weights w.r.t. downstream tasks via joint optimization. A theoretical analysis reveals the connection between GRCN and previous work on multigraph belief propagation. Experiments on six benchmark datasets show that GRCN consistently outperforms strong baseline methods by a large margin, especially when the original graphs are severely incomplete or the labeled instances for model training are highly sparse.
143 - Lu Lu , Lizhao You , 2013
This paper proposes and experimentally demonstrates a first wireless local area network (WLAN) system that jointly exploits physical-layer network coding (PNC) and multiuser decoding (MUD) to boost system throughput. We refer to this multiple access mode as Network-Coded Multiple Access (NCMA). Prior studies on PNC mostly focused on relay networks. NCMA is the first realized multiple access scheme that establishes the usefulness of PNC in a non-relay setting. NCMA allows multiple nodes to transmit simultaneously to the access point (AP) to boost throughput. In the non-relay setting, when two nodes A and B transmit to the AP simultaneously, the AP aims to obtain both packet A and packet B rather than their network-coded packet. An interesting question is whether network coding, specifically PNC which extracts packet (A XOR B), can still be useful in such a setting. We provide an affirmative answer to this question with a novel two-layer decoding approach amenable to real-time implementation. Our USRP prototype indicates that NCMA can boost throughput by 100% in the medium-high SNR regime (>=10dB). We believe further throughput enhancement is possible by allowing more than two users to transmit together.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا