Cover image for A graph-theoretic approach to enterprise network dynamics
Title:
A graph-theoretic approach to enterprise network dynamics
Series:
Progress in computer science and applied logic ; 24
Publication Information:
Boston : Birkhauser, 2007
Physical Description:
xiii, 225 p. : ill., digital ; 25 cm.
ISBN:
9780817644857

97808176448 (hbk.)
General Note:
Available online version
Added Author:
Electronic Access:
FullText

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010119039 TK5105.7 G72 2007 Open Access Book Book
Searching...
Searching...
30000010150620 TK5105.7 G72 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Networks have become nearly ubiquitous and increasingly complex, and their support of modern enterprise environments has become fundamental. Accordingly, robust network management techniques are essential to ensure optimal performance of these networks. This monograph treats the application of numerous graph-theoretic algorithms to a comprehensive analysis of dynamic enterprise networks. Network dynamics analysis yields valuable information about network performance, efficiency, fault prediction, cost optimization, indicators and warnings.

Based on many years of applied research of generic network dynamics, this work covers a number of elegant applications (including many new and experimental results) of traditional graph theory algorithms and techniques to computationally tractable network dynamics analysis to motivate network analysts, practitioners and researchers alike. The material is also suitable for graduate courses addressing state-of-the-art applications of graph theory in analysis of dynamic communication networks, dynamic databasing, and knowledge management.


Table of Contents

Prefacep. vii
Part I Introduction
1 Intranets and Network Managementp. 3
1.1 Introductionp. 3
1.2 Enterprise Intranetsp. 4
1.3 Network Managementp. 7
1.4 Network Management Systemp. 9
1.5 Network Management in TCP/IP Networksp. 11
1.5.1 Simple Network Management Protocol (SNMP)p. 12
1.5.2 Remote Network Monitoring (RMON) Protocolp. 14
1.6 Network Monitoringp. 16
1.6.1 Active and Passive Monitoringp. 17
1.6.2 Common Monitoring Solutions for Intranetsp. 18
1.6.3 Alternative Methods for Network Monitoringp. 19
1.6.4 Sampling Interval and Polling Ratep. 20
1.6.5 Minimizing Collection Infrastructure and Reducing Data Volumep. 21
1.6.6 Synthesis of Improved Network Measuresp. 21
1.7 Network Anomaly Detection and Network Anomaliesp. 22
1.7.1 Anomaly Detection Methodsp. 23
1.7.2 Network-Wide Approach to Anomaly Detectionp. 25
1.7.3 Examples of Network Anomaliesp. 26
1.8 Summaryp. 28
2 Graph-Theoretic Conceptsp. 31
2.1 Introductionp. 31
2.2 Basic Ideasp. 32
2.3 Connectivity, Walks, and Pathsp. 34
2.4 Treesp. 37
2.5 Factors, or Spanning Subgraphsp. 38
2.6 Directed Graphsp. 38
Part II Event Detection Using Graph Distance
3 Matching Graphs with Unique Node Labelsp. 43
3.1 Introductionp. 43
3.2 Basic Concepts and Notationp. 44
3.3 Graphs with Unique Node Labelsp. 45
3.4 Experimental Resultsp. 51
3.4.1 Synthetic Network Datap. 52
3.4.2 Real Network Datap. 53
3.4.3 Verification of O(n[superscript 2]) Theoretical Computational Complexity for Isomorphism, Subgraph Isomorphism, MCS, and GEOp. 53
3.4.4 Comparison of Computational Times for Real and Synthetic Data Setsp. 57
3.4.5 Verification of Theoretical Computational Times for Median Graphp. 59
3.5 Conclusionsp. 59
4 Graph Similarity Measures for Abnormal Change Detectionp. 63
4.1 Introductionp. 63
4.2 Representing the Communications Network as a Graphp. 64
4.3 Graph Topology-Based Distance Measuresp. 65
4.3.1 Using Maximum Common Subgraphp. 65
4.3.2 Using Graph Edit Distancep. 67
4.4 Traffic-Based Distance Measuresp. 70
4.4.1 Differences in Edge-Weight Valuesp. 70
4.4.2 Analysis of Graph Spectrap. 72
4.5 Measures Using Graph Structurep. 73
4.5.1 Graphs Denoting 2-hop Distancep. 75
4.6 Identifying Regions of Changep. 75
4.6.1 Symmetric Differencep. 76
4.6.2 Vertex Neighborhoodsp. 77
4.7 Conclusionsp. 78
5 Median Graphs for Abnormal Change Detectionp. 79
5.1 Introductionp. 79
5.2 Median Graph for the Generalized Graph Distance Measure d[subscript 2]p. 80
5.3 Median Graphs and Abnonnal Change Detection in Data Networksp. 82
5.3.1 Median vs. Single Graph, Adjacent in Time (msa)p. 83
5.3.2 Median vs. Median Graph, Adjacent in Time (mma)p. 84
5.3.3 Median vs. Single Graph, Distant in Time (msd)p. 84
5.3.4 Median vs. Median Graph, Distant in Time (mmd)p. 84
5.4 Experimental Resultsp. 84
5.4.1 Edit Distance and Single Graph vs. Single Graph Adjacent in Time (ssa)p. 85
5.4.2 Edit Distance and Median Graph vs. Single Graph Adjacent in Time (msa)p. 86
5.4.3 Edit Distance and Median Graph vs. Median Graph Adjacent in Time (mma)p. 87
5.4.4 Edit Distance and Median Graph vs. Single Graph Distant in Time (msd)p. 89
5.4.5 Edit Distance and Median Graph vs. Median Graph Distant in Time (mmd)p. 89
5.5 Conclusionsp. 90
6 Graph Clustering for Abnormal Change Detectionp. 93
6.1 Introductionp. 93
6.2 Clustering Algorithmsp. 94
6.2.1 Hierarchical Clusteringp. 94
6.2.2 Nonhierarchical Clusteringp. 97
6.2.3 Cluster Validationp. 100
6.2.4 Fuzzy Clusteringp. 104
6.3 Clustering in the Graph Domainp. 105
6.4 Clustering Time Series of Graphsp. 112
6.5 Conclusionp. 114
7 Graph Distance Measures based on Intragraph Clustering and Cluster Distancep. 115
7.1 Introductionp. 115
7.2 Basic Teiminology and Intragraph Clusteringp. 116
7.3 Distance of Clusteringsp. 118
7.3.1 Rand Indexp. 118
7.3.2 Mutuai Informationp. 119
7.3.3 Bipartite Graph Matchingp. 122
7.4 Novel Graph Distance Measuresp. 123
7.5 Applications to Computer Network Monitoringp. 128
7.6 Conclusionp. 130
8 Matching Sequences of Graphsp. 131
8.1 Introductionp. 131
8.2 Matching Sequences of Symbolsp. 131
8.2.1 Preliminariesp. 131
8.2.2 Edit Distance of Sequences of Symbolsp. 132
8.3 Graph Sequence Matchingp. 137
8.4 Applications in Network Behavior Analysisp. 139
8.4.1 Anomalous Event Detection Using a Library of Past Time Seriesp. 139
8.4.2 Prediction of Anomalous Eventsp. 141
8.4.3 Recovery of Incomplete Network Knowledgep. 141
8.5 Conclusionsp. 142
Part III Propertaes of the Underlying Graphs
9 Distances, Clustering, and Small Worldsp. 147
9.1 Graph Functionsp. 147
9.1.1 Distancep. 147
9.1.2 Longest Distancesp. 147
9.1.3 Average Distancesp. 148
9.1.4 Characteristic Path Lengthp. 148
9.1.5 Clustering Coefficientp. 149
9.1.6 Directed Graphsp. 149
9.2 Diametersp. 149
9.2.1 A Pseudometricp. 150
9.2.2 Sensitivity Analysisp. 151
9.3 An Example Networkp. 153
9.3.1 Time Series Using fp. 154
9.4 Time Series Using Dp. 155
9.5 Characteristic Path Lengths, Clustering Coefficients, and Small Worldsp. 156
9.5.1 Two Classes of Graphsp. 156
9.5.2 Small-World Graphsp. 158
9.6 Enterprise Graphs and Small Worldsp. 159
9.6.1 Sampling Trafficp. 159
9.6.2 Results on Enterprise Graphsp. 160
9.6.3 Discovering Anomalous Behaviorp. 162
10 Tournament Scoringp. 165
10.1 Introductionp. 165
10.2 Tournamentsp. 165
10.2.1 Definitionsp. 165
10.2.2 Tournament Matricesp. 166
10.3 Ranking Tournamentsp. 166
10.3.1 The Ranking Problemp. 166
10.3.2 Kendall-Wei Rankingp. 167
10.3.3 The Perron-Frobenius Theoremp. 168
10.4 Application to Networksp. 168
10.4.1 Matrix of a Networkp. 168
10.5 Modality Distancep. 169
10.5.1 Defining the Measurep. 169
10.5.2 Applying the Distance Measurep. 170
10.6 Variations in the Weight Functionp. 172
10.7 Conclusionp. 172
Part IV Prediction and Advanced Distance Measures
11 Recovery of Missing Information in Graph Sequencesp. 177
11.1 Introductionp. 177
11.2 Recovery of Missing Information in Computer Networks Using Context in Timep. 177
11.2.1 Basic Concepts and Notationp. 178
11.2.2 Recovery of Missing Information Using a Voting Procedurep. 180
11.2.3 Recovery of Missing Information Using Reference Patternsp. 182
11.2.4 Recovery of Missing Information Using Linear Predictionp. 187
11.3 Recovery of Missing Information Using a Machine Learning Approachp. 189
11.3.1 Decision Tree Classifiersp. 189
11.3.2 Missing Information Recovery by Means of Decision Tree Classifiers: A Basic Schemep. 194
11.3.3 Possible Extensions of the Basic Schemep. 196
11.4 Conclusionsp. 197
12 Matching Hierarchical Graphsp. 199
12.1 Introductionp. 199
12.2 Hierarchical Graph Abstractionp. 200
12.3 Distance Measures for Hierarchical Graph Abstractionp. 201
12.4 Application to Computer Network Monitoringp. 206
12.5 Experimental Resultsp. 207
12.6 Conclusionsp. 210
Referencesp. 211
Indexp. 221