+ All Categories
Home > Documents > Prediction Using Propagation: From Flu Trends to...

Prediction Using Propagation: From Flu Trends to...

Date post: 15-Jul-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
5
84 1541-1672/16/$33.00 © 2016 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society PREDICTIVE ANALYTICS Editor: V.S. Subrahmanian, University of Maryland, [email protected] Prediction Using Propagation: From Flu Trends to Cybersecurity situations in real life, such as social systems, cy- bersecurity, epidemiology, and biology, can be modeled using them. They effectively model many phenomena because they simultaneously expose local dependencies and capture large-scale struc- ture. Additionally, propagation (diffusion) pro- cesses—those in which an agent’s state (or action) depends on its neighbors’ states (or actions)—over networks can give rise to a wide array of macro- scopic behavior, leading to challenging and excit- ing research problems. How do contagions like Eb- ola and influenza spread in population networks? 1 Which group should we market to for maximiz- ing product penetration? How do we place sensors in a water-distribution network? How do rumors spread on Twitter or Facebook? All of these ques- tions are related to propagation phenomena on networks. Social network websites like Facebook count millions in users and revenue. Hospital-acquired infections take thousands of lives and cost billions of dollars per year. The societal impacts of net- worked collaboration during political events such as the Arab Spring have been well documented, too. Cybersecurity is also a serious national eco- nomic issue right now. Hence, research in this area, helping us answer questions like how infor- mation spreads through social media 2 and how to distribute antibiotics across hospitals, 3,4 holds great scientific, social, and commercial value. This article will examine recent efforts at utiliz- ing propagation-based concepts for predicting flu trends using public Twitter data. 5,6 In addition, we will also briefly discuss leveraging propagation for malware count prediction 7,8 using extensive field datasets. Syndromic Surveillance of Flu Machine learning techniques for “nowcasting” the flu have made significant inroads into correlating social media trends to case counts and the preva- lence of epidemics in a population. Web searches and social media sources such as Twitter and Facebook have emerged as surrogate data sources for monitoring and forecasting the rise of public health epidemics. The celebrated example of such surrogate sources is arguably Google Flu Trends (GFT), which harnessed user query volume for a handcrafted vocabulary of keywords in order to yield estimates of flu case counts. Such surrogates thus provide an easy to observe, indirect approach to understanding population-level health events. However, recent research has noted GFT’s lacklus- ter performance, 9 which could be attributed to it not accounting for the evolving nature of the vo- cabulary, and a lack of transparency about which keywords are used, which affects verification. Motivated by such considerations, we aim to bet- ter bridge the gap between syndromic surveillance strategies and contagion-based epidemiological modeling. We focus on Twitter data from 15 South American countries for this purpose. Diseases such as the flu have been traditionally modeled as a prop- agation process on population contact networks using models such as SI (Susceptible-Infected) and SEIS (Susceptible-Exposed-Infected-Susceptible). 1 Current methods do not use this observation for prediction. Using just keywords to track infected users on Twitter cannot distinguish between users belonging to these different epidemiological phases. For example, tweets such as “Down with flu. Not going to school.” and “Recovered from flu after 5 days, now going to the beach” denote the users’ G raphs or networks are ubiquitous, from on- line social networks, communication net- works, hospital networks, and gene-regulatory networks to router graphs. Many processes and B. Aditya Prakash, Virginia Tech
Transcript
Page 1: Prediction Using Propagation: From Flu Trends to Cybersecuritybadityap/papers/prediction-ieeeis16.pdf · Google Flu Trends 5,000 4,000 Case count3,000 2,000 1,000 Date 0 Jan. 2013

84 1541-1672/16/$33.00 © 2016 IEEE Ieee InTeLLIGenT SySTeMSPublished by the IEEE Computer Society

P R E D I C T I V E A N A L Y T I C SEditor: V.S. Subrahmanian, University of Maryland, [email protected]

Prediction Using Propagation: From Flu Trends to Cybersecurity

situations in real life, such as social systems, cy-bersecurity, epidemiology, and biology, can be modeled using them. They effectively model many phenomena because they simultaneously expose local dependencies and capture large-scale struc-ture. Additionally, propagation (diffusion) pro-cesses—those in which an agent’s state (or action) depends on its neighbors’ states (or actions)—over networks can give rise to a wide array of macro-scopic behavior, leading to challenging and excit-ing research problems. How do contagions like Eb-ola and infl uenza spread in population networks?1

Which group should we market to for maximiz-ing product penetration? How do we place sensors in a water-distribution network? How do rumors spread on Twitter or Facebook? All of these ques-tions are related to propagation phenomena on networks.

Social network websites like Facebook count millions in users and revenue. Hospital-acquired infections take thousands of lives and cost billions of dollars per year. The societal impacts of net-worked collaboration during political events such as the Arab Spring have been well documented, too. Cybersecurity is also a serious national eco-nomic issue right now. Hence, research in this area, helping us answer questions like how infor-mation spreads through social media2 and how to distribute antibiotics across hospitals,3,4 holds great scientifi c, social, and commercial value.

This article will examine recent efforts at utiliz-ing propagation-based concepts for predicting fl u trends using public Twitter data.5,6 In addition, we will also briefl y discuss leveraging propagation for

malware count prediction7,8 using extensive fi eld datasets.

Syndromic Surveillance of FluMachine learning techniques for “nowcasting” the fl u have made signifi cant inroads into correlating social media trends to case counts and the preva-lence of epidemics in a population. Web searches and social media sources such as Twitter and Facebook have emerged as surrogate data sources for monitoring and forecasting the rise of public health epidemics. The celebrated example of such surrogate sources is arguably Google Flu Trends (GFT), which harnessed user query volume for a handcrafted vocabulary of keywords in order to yield estimates of fl u case counts. Such surrogates thus provide an easy to observe, indirect approach to understanding population-level health events. However, recent research has noted GFT’s lacklus-ter performance,9 which could be attributed to it not accounting for the evolving nature of the vo-cabulary, and a lack of transparency about which keywords are used, which affects verifi cation.

Motivated by such considerations, we aim to bet-ter bridge the gap between syndromic surveillance strategies and contagion-based epidemiological modeling. We focus on Twitter data from 15 South American countries for this purpose. Diseases such as the fl u have been traditionally modeled as a prop-agation process on population contact networks using models such as SI (Susceptible-Infected) and SEIS (Susceptible-Exposed-Infected-Susceptible).1

Current methods do not use this observation for prediction. Using just keywords to track infected users on Twitter cannot distinguish between users belonging to these different epidemiological phases. For example, tweets such as “Down with fl u. Not going to school.” and “Recovered from fl u after 5 days, now going to the beach” denote the users’

Graphs or networks are ubiquitous, from on-

line social networks, communication net-

works, hospital networks, and gene-regulatory

networks to router graphs. Many processes and

B. Aditya Prakash, Virginia Tech

Page 2: Prediction Using Propagation: From Flu Trends to Cybersecuritybadityap/papers/prediction-ieeeis16.pdf · Google Flu Trends 5,000 4,000 Case count3,000 2,000 1,000 Date 0 Jan. 2013

January/February 2016 www.computer.org/intelligent 85

different epidemiological states (see also Figure 1a).

We show that we can separate out these states from the tweets using a temporal topic model. This not only helps in interpretability, but it also leads to more accurate predictions of flu-case counts robust to noisy vo-cabularies. The key idea is to assume different generating topic distribu-tions for users in each epidemiologi-cal phase, and then assume Markov-chain-style transitions between the states. We also assume the presence of background topics and non-flu-re-lated topics that do not denote any flu-related state. We can then fit this model to training data using stan-dard methods (we used Expectation-maximization; others, such as Gibbs-

sampling, could also be used). We show the state transition learned by our model HFSTM (Hidden Flu State from Tweet Model) automatically on the real data in Figure 1b; it matches well with the standard SEIS model.

Figure 2 shows the most frequent words for each learned state distri-bution via a word cloud. Again, the words meaningfully correspond to the states. In addition, thanks to the finer-grained modeling, our ap-proach gets better predictions of the incidence of flu cases than direct key-word counting and also sometimes gets better predictions of flu peaks than sophisticated methods such as GFT (see Figure 3). Our original model used unsupervised topic mod-eling, so it needed an initial clean

flu-related vocabulary. However, we extended it by using semisupervised models in which words in the vo-cabulary can have different aspects (for example, flu or non-flu related). Intuitively, this way words get a soft assignment instead of the hard as-signment we had originally. As a re-sult, we could robustly learn states and topics even with an enlarged and noisier vocabulary,6 which will also help mitigate the effects of the chang-ing nature of the vocabulary in real deployment.

Malware SurveillanceSimilarly, propagation-based concepts can also play an important role in cybersecurity. In the security sphere, such problems include understanding

Figure 1. Comparison between expected state transition and the state transitions learned by our model. (a) A toy example showing possible user states and a tweet associated with each state. (b) State transition probabilities learned by our method.5 Note that the state transition probabilities learned by our method match with the expected epidemiological SEIS model.

Had a good sleep this morning!Going to see my favorite band

(a)

(b)

My neck hurts

I am in bed with the worst fluI should have gotten the vaccine

Starting to feel better

S/R

S E I

.98

.02

.04

.47

.95

.01 .53

IES

Going to the concert tonightNo word can describe theamount of pain I am in

Page 3: Prediction Using Propagation: From Flu Trends to Cybersecuritybadityap/papers/prediction-ieeeis16.pdf · Google Flu Trends 5,000 4,000 Case count3,000 2,000 1,000 Date 0 Jan. 2013

86 www.computer.org/intelligent Ieee InTeLLIGenT SySTeMS

the propagation of malware (such as estimating the number of machines

infected) or characteristics of benign files. These questions have numerous

implications for cybersecurity, from designing better antivirus software to designing and implementing targeted patches to more accurately measuring the economic impact of breaches. These problems are compounded by the fact that, as externals, we can only detect a fraction of actual malware infections.

To answer such problems, security researchers and analysts are increas-ingly using comprehensive, field-gath-ered data that highlights the current trends in the cyber-threat landscape. We have been working on Symantec’s Worldwide Intelligence Network En-vironment (WINE) data for precisely this purpose. This data is collected from real-world hosts running their consumer antivirus software. Users of Symantec’s consumer product line can opt in to report telemetry about the security events (for example, exe-cutable file downloads or virus detec-tions) that occur on their hosts. The events included in WINE are repre-sentative of events that Symantec ob-serves around the world, and they do not include personally identifiable information.

Our approach has been to leverage generative propagation-based mod-els, sometimes in conjunction with careful feature engineering, to better predict trends and actual estimates of malware infections.7,8 As the mod-els are generative, their parameters can also serve as features for further analytics tasks such as anomaly de-tection. Our ideas included having specific phases matching domain-based constraints (for example, hav-ing different “infected” versus “de-tected” versus “patched” states), or exploring nonexponential residence times in each state. After building the model, we fit it by minimizing the least-square errors using standard nonlinear numerical methods (see Fig-ure 4). One lesson we learned was

(a)

(b)

(c)

Figure 2. The translated word cloud for the most probable words in the (a) S, (b) E, and (c) I state-topic distributions, as learned by our method. Words are originally learned and inferred in Spanish; we then translate the result using Google Translate for ease of understanding. The size of a word is proportional to its probability in the corresponding topic distribution. Our model can tease out the differences in the word distributions between them.

Page 4: Prediction Using Propagation: From Flu Trends to Cybersecuritybadityap/papers/prediction-ieeeis16.pdf · Google Flu Trends 5,000 4,000 Case count3,000 2,000 1,000 Date 0 Jan. 2013

January/February 2016 www.computer.org/intelligent 87

that such models typically work for high-volume files (that is, files that have enough samples such that any form of meaningful modeling is pos-sible). For low-prevalence files, fea-ture-based approaches tend to give

low prediction errors. Thus, we fur-ther improved our predictions and made them more robust by building ensemble methods that combine the best of both generative and feature-based models.8

This is a diverse area, because prop-agation and networks occur in many different applications. The recent ex-plosion in the availability of large-scale datasets presents a unique opportunity to conduct large-scale predictive studies

(a)

6,000PAHO case countBaseline modelHFSTMGoogle Flu Trends

5,000

4,000

3,000

Case

cou

nt

2,000

1,000

Date

0

Jan. 2013

Feb. 2013

Mar. 2013

Apr. 2013

May 2013

June 2013

July 2013

1,800

1,600

1,400

1,200

1,000

800

600

400

200

0

Case

cou

nt

(b)Date

24 Nov. 2013

8 Dec. 2013

22 Dec. 2013

5 Jan. 2014

19 Jan. 2014

2 Feb. 2014

PAHO case countBaseline modelHFSTMGoogle Flu Trends

0 100 200 300 400 500 600 700 8000

1

2

3

4

5

6

7

8

9

10 x 104

Time (hours)

File

occ

urre

nces

0 100 200 300 400 500 600 700 8000

0.5

1.0

1.5

2.0

2.5

3.0

3.5

4 x 105

Time (hours)

File

occ

urre

nces

Model after sampling

Model before sampling

Original data

Model after sampling

Model before sampling

Original data

Figure 3. Evaluation for the two test scenarios: (a) test period 1 and (b) test period 2. Comparison of the week-to-week predictions against ground truth Pan American Health Organization (PAHO) case counts using the three models: a baseline model, which does simple keyword counting; our method, HFSTM; and Google Flu Trends (GFT). Our model outperforms the baseline and is comparable to GFT, beating it in test period 2. GFT overestimates the peak in both test periods.

Figure 4. Our propagation-based model7 fits real data from Symantec’s Worldwide Intelligence Network Environment (WINE) database about malware infections per unit time very well, both before and after sampling. The median relative standard error in this case was 0.0741.

Page 5: Prediction Using Propagation: From Flu Trends to Cybersecuritybadityap/papers/prediction-ieeeis16.pdf · Google Flu Trends 5,000 4,000 Case count3,000 2,000 1,000 Date 0 Jan. 2013

88 www.computer.org/intelligent Ieee InTeLLIGenT SySTeMS

using these models. There are many open problems: for example, in the on-line sphere, similar questions can be posed about predicting how memes spread over blogs and websites. Here, too, propagation-inspired models tai-lored to the application (for example, by incorporating the human response-time distributions)2 can be useful in outperforming other standard time-series analysis tools. Overall, there is rich overlap of propagation with many areas in data mining, and we envision many more use cases for such models in the future.

AcknowledgmentsWe thank Symantec for providing ac-cess to the WINE platform. This article is based on work partially supported by the National Science Foundation under grant number IIS-1353346, the Maryland Pro-curement Office under contract H98230-14-C-0127, the Intelligence Advanced Re-search Projects Activity (IARPA) via DoI/NBC contract number D12PC000337, a Facebook Faculty Gift, and the VT Col-lege of Engineering. Any opinions, findings, conclusions, or recommendations expressed in this material are those of the author and do not necessarily reflect the views of the respective funding agencies.

References1. R.M. Anderson and R.M. May,

Infectious Diseases of Humans, Oxford

Univ. Press, 1991.

2. Y. Matsubara et al., “Rise and Fall Patterns

of Information Diffusion: Model and

Implications,” Proc. 18th ACM SIGKDD

Int’l Conf. Knowledge Discovery and Data

Mining, 2012, pp. 6–14.

3. B.A. Prakash et al., “Fractional

Immunization over Large Networks,”

Proc. SIAM Data Mining Conf., 2013,

pp. 659–667.

4. Y. Zhang and B.A. Prakash, “Data-

Aware Vaccine Allocation over Large

Networks,” ACM Trans. Knowledge

Discovery from Data, vol. 10, no. 2,

2015, pp. 20:1–20:32.

5. L. Chen et al., “Flu Gone Viral:

Syndromic Surveillance of Flu on

Twitter Using Temporal Topic Models,”

Proc. IEEE Int’l Conf. Data Mining,

2014, pp. 755–760.

6. L. Chen et al., “Syndromic Surveillance

of Flu on Twitter Using Weakly

Supervised Temporal Topic Models,”

Data Mining and Knowledge

Discovery, 2015, pp. 1–30.

7. E.E. Papalexakis et al., “Spatio-temporal

Mining of Software Adoption &

Penetration,” Proc. IEEE/ACM Int’l

Conf. Advances in Social Networks

Analysis and Mining, 2013, pp. 878–885.

8. C. Kang et al., “Ensemble Models for

Data-Driven Prediction of Malware

Infections,” to be published in Proc.

Int’l Conf. Web Search and Data

Mining, 2016.

9. D.M. Lazer et al., “The Parable

of Google Flu: Traps in Big Data

Analysis,” Science, vol. 343, no. 6176,

2014, pp. 1203–1205.

b. aditya Prakash is an assistant profes-

sor in the Computer Science Department at

Virginia Tech. Contact him at badityap@

cs.vt.edu.

Selected CS articles and columns are also available for free at

http://ComputingNow.computer.org.


Recommended