Top Banner
1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011
26

1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Dec 18, 2015

Download

Documents

Stanley Kennedy
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

1

Seepage as a model of counter-terrorism

Anthony BonatoRyerson University

CMS Winter MeetingDecember 2011

Page 2: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

2

Good guys vs bad guys games in graphs

slow medium fast helicopter

slow traps, tandem-win

medium robot vacuum Cops and Robbers edge searching eternal security

fast cleaning distance k Cops and Robbers

Cops and Robbers on disjoint edge sets

The Angel and Devil

helicopter seepage Helicopter Cops and Robbers, Marshals, The Angel and Devil,Firefighter

Hex

badgood

Page 3: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 3

Seepage

• motivated by the 1973 eruption of the Eldfell volcano in Iceland

• to protect the harbour, the inhabitants poured water on the lava in order to solidify and halt it

Page 4: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 4

Seepage (Clarke,Finbow,Fitzpatrick,Messinger,Nowakowski,2009)

• greens and sludge, played on a directed acylic graph (DAG) with one source s

• the players take turns, with the sludge going first by contaminating s• on subsequent moves sludge contaminates a non-protected vertex

that is adjacent to a contaminated vertex• the greens, on their turn, choose some non-protected, non-

contaminated vertex to protect– once protected or contaminated, a vertex stays in that state to

the end of the game

• sludge wins if some sink is contaminated; otherwise, the greens win

Page 5: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 5

Example 1: G1

S

GG

S

GG

S

Page 6: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 6

Example 2: G2

S

GG

S

x

Page 7: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 7

Green number

• green number of a DAG G, gr(G), is the minimum number of greens needed to win– gr(G) = 1: G is green-win– previous examples: gr(G1) = 3, gr(G2) = 1

• (CFFMN,2009): – characterized green-win trees– bounds given on green number of truncated

Cartesian products of paths

Page 8: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 8

Characterizing trees

• in a rooted tree T with vertex x, Tx is the subtree rooted at x

• a rooted tree T is green-reduced to T − Tx if x has out-degree at 1 and every ancestor of x has out-degree greater than 1– T − Tx is a green reduction of T

Theorem (CFFMN,2009)

A rooted tree T is green-win if and only if T can be reduced to one vertex by a sequence of green-reductions.

Page 9: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 9

Mathematical counter-terrorism

• (Farley et al. 2003-): ordered sets as simplified models of terrorist networks– the maximal elements of the poset are

the leaders– submit plans down via the edges to the

foot soldiers or minimal nodes – only one messenger needs to receive

the message for the plan to be executed.

– considered finding minimum order cuts: neutralize operatives in the network

Page 10: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 10

Seepage as a counter-terrorism model?

• seepage has a similar paradigm to model of (Farley, et al)

• main difference: seepage is dynamic– as messages move down the network towards

foot soldiers, operatives are neutralized over time

Page 11: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 11

Structure of terrorist networks

• competing views; for eg (Xu et al, 06), (Memon, Hicks, Larsen, 07), (Medina,Hepner,08):

• complex network: power law degree distribution– some members more influential

and have high out-degree

• regular network: members have constant out-degree– members are all about equally

influential

Page 12: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 12

Our model

• we consider a stochastic DAG model• total expected degrees of vertices are

specified–directed analogue of the G(w) model of

Chung and Lu

Page 13: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 13

• let w = (w1, …, wn) be a sequence

• G(w): probability space of graphs on [n], where i and j are joined independently with probability

• G(w) is the space of random graphs with given expected degree sequence w

• if w = (pn,…,pn), then G(w) is just G(n,p)

• if w follows a power law: random power law graphs

Random graphs with given expected degree sequence (Chung, Lu, 2003)

n

ii

jiij

w

wwp

1

Page 14: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 14

General setting for the model

• given a DAG G with levels Lj, source v, c > 0

• game G(G,v,j,c): – nodes in Lj are sinks

– sequence of discrete time-steps t– nodes protected at time-step t

• grj(G,v) = inf{c ϵ N: greens win G(G,v,j,c)}

)1( tcct

Page 15: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 15

Random DAG model (Bonato, Mitsche, Prałat,11+)

• parameters: sequence (wi : i > 0), integer n

• L0 = {v}; assume Lj defined

• S: set of n new vertices• directed edges point from Lj to Lj+1 a subset of S

• each vi in Lj generates max{wi -deg-(vi),0} randomly chosen edges to S

• edges generated independently• nodes of S chosen at least once form Lj+1

• parallel edges possible (though rare in sparse case)

Page 16: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 16

d-regular case

• for all i, wi = d > 2 a constant– call these random d-regular DAGs

• in this case, |Lj| ≤ d(d-1)j-1

• we give bounds on grj(G,v) as a function of the levels j of the sinks

Page 17: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 17

Main results

Theorem (BMP,11+) :If G is a random d-regular DAG, then a.a.s. the following hold.

1) If 2 ≤ j ≤ O(1), then grj(G,v) = d-2+1/j.

2) If ω is any function tending to infinity with n and ω ≤ j ≤ logd-1n- ωloglog n, then grj(G,v) ≤ d-2.

3) If logd-1n- ωloglog n ≤ j ≤ logd-1n - 5/2klog2log n + logd-1log n-O(1) for some integer k>0, then

d-2-1/k ≤ grj(G,v) ≤ d-2.

Page 18: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 18

• grj(G,v) is smaller for larger j

Theorem (BMP,11+) For a random d-regular DAG G, for s ≥ 4 there is a constant Cs > 0, such that if

j ≥ logd-1n + Cs,

then a.a.s.

grj(G,v) ≤ d - 2 - 1/s.

• proof uses a combinatorial-game theory type argument

Page 19: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 19

Sketch of proof

• greens protect d-2 vertices on some layers; other layers (every si steps, for i ≥ 0) they protect d-3

• greens play greedily: protect vertices adjacent to the sludge

• ≤1 choice for sludge when the greens protect d-2; at most 2, otherwise

• greens can move sludge to any vertex in the d-2 layers

• bad vertex: in-degree at least 2• if there is a bad vertex in the d-2

layers, greens can directs sludge there and sludge loses– greens protect all children

t = si+1d-3

Page 20: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 20

Sketch of proof, continued• sludge wins implies that there are no bad

vertices in d-2 layers, and all vertices in the d-3 layers either have in-degree 1 and all but at most one child are sludge-win, or in-degree 2 and all children are sludge-win

• allows for a cut proceeding inductively from the source to a sink:– in a given d-3 layer, if a vertex has in-degree 1,

then we cut away any out-neighbour and all vertices not reachable from the source (after the out-neighbour is removed)

• if sludge wins, then there is cut which gives a (d-1,d-2)-regular graph

• the probability that there is such a cut is o(1)

d-3

Page 21: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 21

Power law case

• fix d, exponent β > 2, and maximum degree M = nα for some α in (0,1)

• wi = ci-1/β-1 for suitable c and range of i

– power law sequence with average degree d

• ideas:– high degree nodes closer to source, decreasing

degree from left to right– greens prevent sludge from moving to the highest

degree nodes at each time-step

Page 22: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 22

Theorem (BMP,11+)

In a random power law DAG:

Page 23: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 23

Contrasting the cases

• hard to compare d-regular and power law random DAGs, as the number of vertices and average degree are difficult to control

• consider the first case when there is Cn vertices in the d-regular and power law random DAGs– many high degree vertices in power law case– green number higher than in d-regular case

• interpretation: in random power law DAGs, more difficult to disrupt the network

Page 24: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 24

Open problems

• in d-regular case, green number for j between logd-1n - 5/2log2log n + logd-1log n-O(1) and logd-1n + c?

• other sequences?• infinite case:

– grj(G,v) is non-increasing with j and bounded, so has a limit g(G,v)

– seepage on:• infinite acyclic random oriented graph (Diestel et al, 07)• infinite semi-directed graphs with constant out-degree

(B, Delic, Wang,11+)

Page 25: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 25

• preprints, reprints, contact:

search: “Anthony Bonato”

Page 26: 1 Seepage as a model of counter-terrorism Anthony Bonato Ryerson University CMS Winter Meeting December 2011.

Seepage 26