analysis.rs 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434
  1. use crate::{BridgeInfo, BridgeInfoType};
  2. use lox_library::proto::{level_up::LEVEL_INTERVAL, trust_promotion::UNTRUSTED_INTERVAL};
  3. use nalgebra::DVector;
  4. use statrs::distribution::{Continuous, MultivariateNormal, Normal};
  5. use std::{
  6. cmp::min,
  7. collections::{BTreeMap, HashSet},
  8. };
  9. /// Provides a function for predicting which countries block this bridge
  10. pub trait Analyzer {
  11. /// Evaluate open-entry bridge. Returns true if blocked, false otherwise.
  12. fn stage_one(
  13. &self,
  14. confidence: f64,
  15. bridge_ips: &[u32],
  16. bridge_ips_today: u32,
  17. negative_reports: &[u32],
  18. negative_reports_today: u32,
  19. ) -> bool;
  20. /// Evaluate invite-only bridge without positive reports. Return true if
  21. /// blocked, false otherwise.
  22. fn stage_two(
  23. &self,
  24. confidence: f64,
  25. bridge_ips: &[u32],
  26. bridge_ips_today: u32,
  27. negative_reports: &[u32],
  28. negative_reports_today: u32,
  29. ) -> bool;
  30. /// Evaluate invite-only bridge with positive reports. Return true if
  31. /// blocked, false otherwise.
  32. fn stage_three(
  33. &self,
  34. confidence: f64,
  35. bridge_ips: &[u32],
  36. bridge_ips_today: u32,
  37. negative_reports: &[u32],
  38. negative_reports_today: u32,
  39. positive_reports: &[u32],
  40. positive_reports_today: u32,
  41. ) -> bool;
  42. }
  43. /// Accepts an analyzer, information about a bridge, and a confidence value.
  44. /// Returns a set of country codes where the bridge is believed to be blocked.
  45. pub fn blocked_in(
  46. analyzer: &dyn Analyzer,
  47. bridge_info: &BridgeInfo,
  48. confidence: f64,
  49. date: u32,
  50. ) -> HashSet<String> {
  51. let mut blocked_in = HashSet::<String>::new();
  52. let today = date;
  53. let age = today - bridge_info.first_seen;
  54. for (country, info) in &bridge_info.info_by_country {
  55. if info.blocked {
  56. // Assume bridges never become unblocked
  57. blocked_in.insert(country.to_string());
  58. } else {
  59. // Get today's values
  60. let new_map_binding = BTreeMap::<BridgeInfoType, u32>::new();
  61. // TODO: Evaluate on yesterday if we don't have data for today?
  62. let today_info = match info.info_by_day.get(&today) {
  63. Some(v) => v,
  64. None => &new_map_binding,
  65. };
  66. let bridge_ips_today = match today_info.get(&BridgeInfoType::BridgeIps) {
  67. Some(&v) => v,
  68. None => 0,
  69. };
  70. let negative_reports_today = match today_info.get(&BridgeInfoType::NegativeReports) {
  71. Some(&v) => v,
  72. None => 0,
  73. };
  74. let positive_reports_today = match today_info.get(&BridgeInfoType::PositiveReports) {
  75. Some(&v) => v,
  76. None => 0,
  77. };
  78. let num_days = min(age, UNTRUSTED_INTERVAL);
  79. // Get time series for last num_days
  80. let mut bridge_ips = vec![0; num_days as usize];
  81. let mut negative_reports = vec![0; num_days as usize];
  82. let mut positive_reports = vec![0; num_days as usize];
  83. for i in 0..num_days {
  84. let date = today - num_days + i - 1;
  85. let new_map_binding = BTreeMap::<BridgeInfoType, u32>::new();
  86. let day_info = match info.info_by_day.get(&date) {
  87. Some(v) => v,
  88. None => &new_map_binding,
  89. };
  90. bridge_ips[i as usize] = match day_info.get(&BridgeInfoType::BridgeIps) {
  91. Some(&v) => v,
  92. None => 0,
  93. };
  94. negative_reports[i as usize] = match day_info.get(&BridgeInfoType::NegativeReports)
  95. {
  96. Some(&v) => v,
  97. None => 0,
  98. };
  99. positive_reports[i as usize] = match day_info.get(&BridgeInfoType::PositiveReports)
  100. {
  101. Some(&v) => v,
  102. None => 0,
  103. };
  104. }
  105. // Evaluate using appropriate stage based on age of the bridge
  106. if age < UNTRUSTED_INTERVAL {
  107. // open-entry bridge
  108. if analyzer.stage_one(
  109. confidence,
  110. &bridge_ips,
  111. bridge_ips_today,
  112. &negative_reports,
  113. negative_reports_today,
  114. ) {
  115. blocked_in.insert(country.to_string());
  116. }
  117. } else if age
  118. < UNTRUSTED_INTERVAL + LEVEL_INTERVAL[1] + LEVEL_INTERVAL[2] + UNTRUSTED_INTERVAL
  119. {
  120. // invite-only bridge without 30+ days of historical data on
  121. // positive reports
  122. if analyzer.stage_two(
  123. confidence,
  124. &bridge_ips,
  125. bridge_ips_today,
  126. &negative_reports,
  127. negative_reports_today,
  128. ) {
  129. blocked_in.insert(country.to_string());
  130. }
  131. } else {
  132. // invite-only bridge that has been up long enough that it
  133. // might have 30+ days of historical data on positive reports
  134. if analyzer.stage_three(
  135. confidence,
  136. &bridge_ips,
  137. bridge_ips_today,
  138. &negative_reports,
  139. negative_reports_today,
  140. &positive_reports,
  141. positive_reports_today,
  142. ) {
  143. blocked_in.insert(country.to_string());
  144. }
  145. }
  146. }
  147. }
  148. blocked_in
  149. }
  150. // Analyzer implementations
  151. /// Dummy example that never thinks bridges are blocked
  152. pub struct ExampleAnalyzer {}
  153. impl Analyzer for ExampleAnalyzer {
  154. fn stage_one(
  155. &self,
  156. _confidence: f64,
  157. _bridge_ips: &[u32],
  158. _bridge_ips_today: u32,
  159. _negative_reports: &[u32],
  160. _negative_reports_today: u32,
  161. ) -> bool {
  162. false
  163. }
  164. fn stage_two(
  165. &self,
  166. _confidence: f64,
  167. _bridge_ips: &[u32],
  168. _bridge_ips_today: u32,
  169. _negative_reports: &[u32],
  170. _negative_reports_today: u32,
  171. ) -> bool {
  172. false
  173. }
  174. fn stage_three(
  175. &self,
  176. _confidence: f64,
  177. _bridge_ips: &[u32],
  178. _bridge_ips_today: u32,
  179. _negative_reports: &[u32],
  180. _negative_reports_today: u32,
  181. _positive_reports: &[u32],
  182. _positive_reports_today: u32,
  183. ) -> bool {
  184. false
  185. }
  186. }
  187. /// Model data as multivariate normal distribution
  188. pub struct NormalAnalyzer {
  189. max_threshold: u32,
  190. scaling_factor: f64,
  191. }
  192. impl NormalAnalyzer {
  193. pub fn new(max_threshold: u32, scaling_factor: f64) -> Self {
  194. Self {
  195. max_threshold,
  196. scaling_factor,
  197. }
  198. }
  199. // Returns the mean vector, vector of individual standard deviations, and
  200. // covariance matrix
  201. fn stats(data: &[&[u32]]) -> (Vec<f64>, Vec<f64>, Vec<f64>) {
  202. let n = data.len();
  203. // Compute mean and standard deviation vectors
  204. let (mean_vec, sd_vec) = {
  205. let mut mean_vec = Vec::<f64>::new();
  206. let mut sd_vec = Vec::<f64>::new();
  207. for var in data {
  208. // Compute mean
  209. let mut sum = 0.0;
  210. for count in *var {
  211. sum += *count as f64;
  212. }
  213. let mean = sum / var.len() as f64;
  214. // Compute standard deviation
  215. let mut sum = 0.0;
  216. for count in *var {
  217. sum += (*count as f64 - mean).powi(2);
  218. }
  219. let sd = (sum / var.len() as f64).sqrt();
  220. mean_vec.push(mean);
  221. sd_vec.push(sd);
  222. }
  223. (mean_vec, sd_vec)
  224. };
  225. // Compute covariance matrix
  226. let cov_mat = {
  227. let mut cov_mat = Vec::<f64>::new();
  228. // We don't need to recompute Syx, but we currently do
  229. for i in 0..n {
  230. for j in 0..n {
  231. cov_mat.push({
  232. let var1 = data[i];
  233. let var1_mean = mean_vec[i];
  234. let var2 = data[j];
  235. let var2_mean = mean_vec[j];
  236. assert_eq!(var1.len(), var2.len());
  237. let mut sum = 0.0;
  238. for index in 0..var1.len() {
  239. sum +=
  240. (var1[index] as f64 - var1_mean) * (var2[index] as f64 - var2_mean);
  241. }
  242. sum / (var1.len() - 1) as f64
  243. });
  244. }
  245. }
  246. cov_mat
  247. };
  248. (mean_vec, sd_vec, cov_mat)
  249. }
  250. }
  251. impl Analyzer for NormalAnalyzer {
  252. /// Evaluate open-entry bridge based on only today's data
  253. fn stage_one(
  254. &self,
  255. _confidence: f64,
  256. _bridge_ips: &[u32],
  257. bridge_ips_today: u32,
  258. _negative_reports: &[u32],
  259. negative_reports_today: u32,
  260. ) -> bool {
  261. negative_reports_today > self.max_threshold
  262. || f64::from(negative_reports_today) > self.scaling_factor * f64::from(bridge_ips_today)
  263. }
  264. /// Evaluate invite-only bridge based on last 30 days
  265. fn stage_two(
  266. &self,
  267. confidence: f64,
  268. bridge_ips: &[u32],
  269. bridge_ips_today: u32,
  270. negative_reports: &[u32],
  271. negative_reports_today: u32,
  272. ) -> bool {
  273. assert!(bridge_ips.len() >= UNTRUSTED_INTERVAL as usize);
  274. assert_eq!(bridge_ips.len(), negative_reports.len());
  275. let alpha = 1.0 - confidence;
  276. let (mean_vec, sd_vec, cov_mat) = Self::stats(&[bridge_ips, negative_reports]);
  277. let negative_reports_mean = mean_vec[1];
  278. let bridge_ips_sd = sd_vec[0];
  279. let negative_reports_sd = sd_vec[1];
  280. // Artificially create data for alternative hypothesis
  281. let num_days = bridge_ips.len() as usize;
  282. let mut bridge_ips_blocked = vec![0; num_days];
  283. let mut negative_reports_blocked = vec![0; num_days];
  284. let bridge_ips_deviation = (2.0 * bridge_ips_sd).round() as u32;
  285. for i in 0..num_days {
  286. // Suppose bridge stats will go down by 2 SDs
  287. bridge_ips_blocked[i] = if bridge_ips_deviation > bridge_ips[i] {
  288. 0
  289. } else {
  290. bridge_ips[i] - bridge_ips_deviation
  291. };
  292. // Suppose negative reports will go up by 2 SDs
  293. negative_reports_blocked[i] =
  294. negative_reports[i] + (2.0 * negative_reports_sd).round() as u32;
  295. }
  296. let (mean_vec_blocked, _sd_vec_blocked, cov_mat_blocked) =
  297. Self::stats(&[&bridge_ips_blocked, &negative_reports_blocked]);
  298. let mvn = MultivariateNormal::new(mean_vec, cov_mat).unwrap();
  299. let pdf = mvn.pdf(&DVector::from_vec(vec![
  300. bridge_ips_today as f64,
  301. negative_reports_today as f64,
  302. ]));
  303. let mvn_blocked = MultivariateNormal::new(mean_vec_blocked, cov_mat_blocked).unwrap();
  304. let pdf_blocked = mvn_blocked.pdf(&DVector::from_vec(vec![
  305. bridge_ips_today as f64,
  306. negative_reports_today as f64,
  307. ]));
  308. // Also model negative reports in isolation
  309. let nr_normal = Normal::new(negative_reports_mean, negative_reports_sd).unwrap();
  310. let nr_pdf = nr_normal.pdf(negative_reports_today as f64);
  311. let nr_normal_blocked = Normal::new(
  312. negative_reports_mean + 2.0 * negative_reports_sd,
  313. negative_reports_sd,
  314. )
  315. .unwrap();
  316. let nr_pdf_blocked = nr_normal_blocked.pdf(negative_reports_today as f64);
  317. (pdf / pdf_blocked).ln() < alpha || (nr_pdf / nr_pdf_blocked).ln() < alpha
  318. }
  319. /// Evaluate invite-only bridge with lv3+ users submitting positive reports
  320. fn stage_three(
  321. &self,
  322. confidence: f64,
  323. bridge_ips: &[u32],
  324. bridge_ips_today: u32,
  325. negative_reports: &[u32],
  326. negative_reports_today: u32,
  327. positive_reports: &[u32],
  328. positive_reports_today: u32,
  329. ) -> bool {
  330. assert!(bridge_ips.len() >= UNTRUSTED_INTERVAL as usize);
  331. assert_eq!(bridge_ips.len(), negative_reports.len());
  332. assert_eq!(bridge_ips.len(), positive_reports.len());
  333. let alpha = 1.0 - confidence;
  334. let (mean_vec, sd_vec, cov_mat) =
  335. Self::stats(&[bridge_ips, negative_reports, positive_reports]);
  336. let negative_reports_mean = mean_vec[1];
  337. let bridge_ips_sd = sd_vec[0];
  338. let negative_reports_sd = sd_vec[1];
  339. let positive_reports_sd = sd_vec[2];
  340. // Artificially create data for alternative hypothesis
  341. let num_days = bridge_ips.len() as usize;
  342. let mut bridge_ips_blocked = vec![0; num_days];
  343. let mut negative_reports_blocked = vec![0; num_days];
  344. let mut positive_reports_blocked = vec![0; num_days];
  345. let bridge_ips_deviation = (2.0 * bridge_ips_sd).round() as u32;
  346. let positive_reports_deviation = (2.0 * positive_reports_sd).round() as u32;
  347. for i in 0..num_days {
  348. // Suppose positive reports will go down by 2 SDs
  349. positive_reports_blocked[i] = if positive_reports_deviation > positive_reports[i] {
  350. 0
  351. } else {
  352. positive_reports[i] - positive_reports_deviation
  353. };
  354. // Suppose bridge stats will go down by 2 SDs
  355. bridge_ips_blocked[i] = if bridge_ips_deviation > bridge_ips[i] {
  356. 0
  357. } else {
  358. bridge_ips[i] - bridge_ips_deviation
  359. };
  360. // Suppose each user who would have submitted a positive report but
  361. // didn't submits a negative report instead.
  362. negative_reports_blocked[i] =
  363. negative_reports[i] + positive_reports[i] - positive_reports_blocked[i];
  364. }
  365. let (mean_vec_blocked, _sd_vec_blocked, cov_mat_blocked) = Self::stats(&[
  366. &bridge_ips_blocked,
  367. &negative_reports_blocked,
  368. &positive_reports_blocked,
  369. ]);
  370. let mvn = MultivariateNormal::new(mean_vec, cov_mat).unwrap();
  371. let pdf = mvn.pdf(&DVector::from_vec(vec![
  372. bridge_ips_today as f64,
  373. negative_reports_today as f64,
  374. positive_reports_today as f64,
  375. ]));
  376. let mvn_blocked = MultivariateNormal::new(mean_vec_blocked, cov_mat_blocked).unwrap();
  377. let pdf_blocked = mvn_blocked.pdf(&DVector::from_vec(vec![
  378. bridge_ips_today as f64,
  379. negative_reports_today as f64,
  380. positive_reports_today as f64,
  381. ]));
  382. // Also model negative reports in isolation
  383. let nr_normal = Normal::new(negative_reports_mean, negative_reports_sd).unwrap();
  384. let nr_pdf = nr_normal.pdf(negative_reports_today as f64);
  385. // Note we do NOT make this a function of positive signals
  386. let nr_normal_blocked = Normal::new(
  387. negative_reports_mean + 2.0 * negative_reports_sd,
  388. negative_reports_sd,
  389. )
  390. .unwrap();
  391. let nr_pdf_blocked = nr_normal_blocked.pdf(negative_reports_today as f64);
  392. (pdf / pdf_blocked).ln() < alpha || (nr_pdf / nr_pdf_blocked).ln() < alpha
  393. }
  394. }