2013 IEEE International Congress on Big Data 2013
DOI: 10.1109/bigdata.congress.2013.53
|View full text |Cite
|
Sign up to set email alerts
|

Fast Quasi-biclique Mining with Giraph

Abstract: Quasi-biclique mining for bipartite graphs has found important applications in providing security services. However, the standard MapReduce algorithm for mining quasibicliques does not scale well due to the need of shuffling and reducing a huge number of map outputs. To cope with web-scale graphs, we propose a scalable algorithm with the use of Giraph, which is a new rising large-scale graph processing platform following the bulk synchronous parallel (BSP) model. Experimental results on real world domain-IP gr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Existing studies of quasi-bicliques focus on finding the maximum quasi-biclique [23,24,30,45]. There are some other studies which find subgraphs with a certain density and degree [29,33]. In this paper, we focus on 𝑘-biplex for reasons as discussed in Section 1 (i.e., 𝑘-biplex imposes strict enough requirements on connections within a subgraph, tolerates some disconnections, and satisfies the hereditary property).…”
Section: Related Workmentioning
confidence: 99%
“…Existing studies of quasi-bicliques focus on finding the maximum quasi-biclique [23,24,30,45]. There are some other studies which find subgraphs with a certain density and degree [29,33]. In this paper, we focus on 𝑘-biplex for reasons as discussed in Section 1 (i.e., 𝑘-biplex imposes strict enough requirements on connections within a subgraph, tolerates some disconnections, and satisfies the hereditary property).…”
Section: Related Workmentioning
confidence: 99%
“…There have been few works connecting biclique mining and DNS security. For example, in [ 43 ], the authors suggest to use a DNS bipartite graph (like our graph model as presented in Section 2.4 ) to detect anomalies. Similarly, in [ 44 ], the authors propose to use social structures to detect DDoS attack on DNS server, and present some insights about this approach.…”
Section: Related Workmentioning
confidence: 99%
“…and ( 2) 𝛾-quasi-biclique [47,53] is a bipartite graph 𝐺 (𝐿, 𝑅, 𝐸) that can miss at most ). Existing works of quasi-bicliques focus on finding subgraphs with a certain density and degree [54,55]. In summary, we compare the above cohesive models, in terms of (1) structure cohesiveness and (2) computational efficiency of solutions for finding cohesive subgraphs.…”
Section: Chapter 2 Literature Reviewmentioning
confidence: 99%