Optimal Edge Weight Perturbations to Attack Shortest Paths Benjamin A

Optimal Edge Weight Perturbations to Attack Shortest Paths Benjamin A

Optimal Edge Weight Perturbations to Attack Shortest Paths Benjamin A. Miller1 , Zohair Shafi1 , Wheeler Ruml2 , Yevgeniy Vorobeychik3 , Tina Eliassi-Rad1 and Scott Alfeld4 1Northeastern University, Boston, MA, USA 2University of New Hampshire, Durham, NH, USA 3Washington University in St. Louis, St. Louis, MO, USA 4Amherst College, Amherst, MA, USA {miller.be, shafi.z, t.eliassirad}@northeastern.edu, [email protected], [email protected], [email protected] Abstract the computational complexity of the problem. While Force Path Cut is NP-complete, we show in this paper that Force Finding shortest paths in a given network (e.g., a Path can be solved within arbitrary precision in polynomial computer network or a road network) is a well- time. We demonstrate that Force Path can be formulated as studied task with many applications. We consider a linear program with a constraint set that is potentially fac- this task under the presence of an adversary, who torial in the number of nodes. There is, however, a natural can manipulate the network by perturbing its edge polynomial-time oracle to find violated constraints in any can- weights to gain an advantage over others. Specifi- didate solution (which we use to include a subset of constraints cally, we introduce the Force Path Problem as fol- as necessary). We propose the PATHPERTURB algorithm that lows. Given a network, the adversary’s goal is to uses the oracle to iteratively refine the graph perturbations make a specific path the shortest by adding weights until the target path is the shortest.1 to edges in the network. The version of this problem The main contributions of the paper are as follows: in which the adversary can cut edges is NP-complete. However, we show that Force Path can be solved • We formally define the Force Path problem: an adversar- to within arbitrary numerical precision in polyno- ial attack on shortest paths. mial time. We propose the PATHPERTURB algorithm, • We formulate an oracle to identify the most violated which uses constraint generation to build a set of constraint at any given point, the existence of which constraints that require paths other than the adver- implies that Force Path can be optimized within arbitrary sary’s target to be sufficiently long. Across a highly precision in polynomial time. varied set of synthetic and real networks, we show that the optimal solution often reduces the required • We propose the PATHPERTURB algorithm, which uses the perturbation budget by about half when compared oracle to minimize the required perturbation budget. to a greedy baseline method. • We present the results of experiments on synthetic and real networks, in which PATHPERTURB reliably reduces 1 Introduction the required perturbation budget compared to a greedy baseline method. The shortest path problem is a seminal task in graph theory with numerous real-world applications in computer networks, transportation networks, etc. Given two nodes in a network, 2 Force Path Problem Definition the shortest path between them is the set of edges that connects Consider a graph G = (V; E), with a set of nodes V and arXiv:2107.03347v1 [cs.SI] 7 Jul 2021 the two nodes with the minimum sum of edge weights. For edges E, where jV j = N and jEj = M. The edges in E a given network, two nodes can have more than one shortest are undirected and have nonnegative weights w : E ! R≥0. path; and the network can be directed or undirected. Here we The edge weights denote distances (a.k.a. lengths) between only consider undirected networks. the adjacent nodes. In addition to the weighted graph, we are In this paper, we present the Force Path Problem, where given a pair of source and destination nodes s; t 2 V . The there is a specific path that the adversary wants to be the adversary’s goal is to make a specific path, p∗, the shortest shortest path between a pair of source and destination nodes. path from s to t in G. The adversary can achieve this by arbi- The adversary can increase weights of edges and has a fixed trarily increasing the weight of any edge in G, all of which are budget with which to achieve this goal. The Force Path Prob- visible to him/her. Within a budget constraint b, the adversary lem is similar to the Force Path Cut Problem [Miller et al., increases edge weights to obtain new weights w0 such that 2021]. The difference is in the attack vector: in this case the P 0 ∗ e2E (w (e) − w(e)) ≤ b and p is the (possibly exclusive) adversary makes edges more expensive (by increasing edge shortest path from s to t. weights) rather than removing edges. This difference may seem relatively minor, but it has a profound implication for 1We use the terms graph and network interchangeably. In the next section, we will show that the Force Path Prob- Algorithm 1 ConstraintOracle lem can be formulated as a linear program (LP), which implies Input: graph G, weights w, target path p∗, buffer δ a polynomial time algorithm to get a solution within any spec- Output: A path p from s to t in G ified precision, despite a very large number of constraints. 1: s first node in p∗ 2: t last node in p∗ 3: p shortest path from s to t in G 3 Force Path LP Formulation 4: if p is p∗ then M 5: p second shortest path from s to t in G Let w 2 R≥0 be a vector of edge weights in the original graph 6: hhp will be ; with length 1 if p∗ is the only pathii M G and ∆ 2 R≥0 be a vector of edge-weight perturbations. 7: end if M ∗ For any path p from s to t in G, let xp 2 f0; 1g be an edge 8: if length(p) ≥ length(p ) + δ then indicator vector for p: the entries for xp associated with the 9: p ; edges that comprise p are 1, while all other entries are 0. Thus, 10: end if > > w xp is the length of p in the original graph and (w+∆) xp 11: return p is its length in the perturbed graph. The linear program formulation of Force Path is based on 2 two key observations. First, any path p that is not longer path . We formulate the linear program as follows: ∗ ∗ than p must be perturbed to be longer than p . This is clear ^ > ∗ ∆ = arg min 1 ∆ (3) from the fact that, if it were not the case, p would not be the ∆ ∗ shortest path. Second, we do not perturb p , formalized as s.t. ∆i ≥ 0; 1 ≤ i ≤ M (4) follows: > ∗ (w + ∆) xp ≥ ` + δ; 8p 2 P`+δ n fp g (5) Proposition 1. The minimum-budget solution to Force Path > x ∗ ∆ = 0: (6) includes no perturbation of any edge along p∗. p As with the approximate version of Force Path Cut dis- cussed in [Miller et al., 2021], the number of paths in P`+δ may be too large to enumerate all constraints. In an N-node Proof. Let ∆^ be the minimum-budget solution. Suppose that clique, for example, the number of paths of length N − 1 the claim is not true—i.e., there is an edge e, which is part of between any two nodes is (N − 2)!. Thus, specifying all con- ∗ ^ ^ p , where ∆(e) > 0. Since ∆ is the solution to Force Path, straints in the linear program is computationally intractable. p∗ is the shortest path when ∆^ is added to the edge weights. We use constraint generation to iteratively incorporate con- Let ∆0 be the same vector with the entry at e reduced to 0, i.e., straints as they are needed (see, e.g., [Ben-Ameur and Neto, ∆0(e0) = ∆(^ e0) for e0 2 E n feg and ∆0(e) = 0. Since e is 2006; Letchford and Vorobeychik, 2013]). In order to use ∗ > ^ > 0 ^ part of p , xp∗ ∆ − xp∗ ∆ = ∆(e). For any path p, since xp constraint generation, however, there must be an oracle that consists of only zeros and ones, we have returns a constraint being violated at a given point. There is, fortunately, a natural oracle for the constraints x>∆^ − x>∆0 ≤ ∆(^ e): (1) specified in (5), which not only returns a violated constraint, p p but the constraint most violated at the proposed solution. We find this constraint as follows. The candidate solution is a ∗ ^ Again, p must be the shortest path using ∆, and, therefore, perturbation to the edge weights, ∆^ . We apply the perturbation > ^ > 0 0 for any path p from s to t, xp ∆ ≥ xp∗ ∆ . Combining this to get the new edge weights w , where with (1), we have, for any path p w0(e) = w(e) + ∆(^ e): (7) > 0 > ^ ^ > ^ ^ > 0 xp∗ ∆ = xp∗ ∆ − ∆(e) ≤ xp∗ ∆ − ∆(e) ≤ xp ∆ : (2) Using w0 as distances, we find the shortest path p from s to t in G. If p is p∗, we find the second shortest path if it exists. Thus, if ∆^ were replaced with ∆0, p∗ would still be the shortest If there is no such path, there is no violated constraint. If path. This implies that the total perturbation could be reduced there is, we let p be this path. If p is at least δ longer than p∗, by ∆(^ e) > 0 and still achieve the objective, so ∆^ is not the there is no violated constraint. If not, the length of p needs minimum-budget solution. Thus, we have a contradiction, and to be incorporated as a constraint. Algorithm 1 provides the the proof is complete.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us