Skip to main content

2019 | OriginalPaper | Buchkapitel

9. Comparative Study and Numerical Analysis

verfasst von : Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Erschienen in: Malicious Attack Propagation and Source Identification

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat A. Agaskar and Y. M. Lu. A fast monte carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013. A. Agaskar and Y. M. Lu. A fast monte carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013.
4.
Zurück zum Zitat R. Albert, I. Albert, and G. L. Nakarado. Structural vulnerability of the north american power grid. Physical review E, 69(2):025103, 2004. R. Albert, I. Albert, and G. L. Nakarado. Structural vulnerability of the north american power grid. Physical review E, 69(2):025103, 2004.
7.
Zurück zum Zitat F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 112(11):118701, 2014. F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 112(11):118701, 2014.
14.
Zurück zum Zitat E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. Everyone’s an influencer: Quantifying influence on twitter. In Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, WSDM ’11, pages 65–74, 2011. E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. Everyone’s an influencer: Quantifying influence on twitter. In Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, WSDM ’11, pages 65–74, 2011.
24.
Zurück zum Zitat D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef
34.
Zurück zum Zitat C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011. C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011.
38.
Zurück zum Zitat D. Dagon, C. C. Zou, and W. Lee. Modeling botnet propagation using time zones. In NDSS, volume 6, pages 2–13, 2006. D. Dagon, C. C. Zou, and W. Lee. Modeling botnet propagation using time zones. In NDSS, volume 6, pages 2–13, 2006.
44.
Zurück zum Zitat W. Dong, W. Zhang, and C. W. Tan. Rooting out the rumor culprit from suspects. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 2671–2675. IEEE, 2013. W. Dong, W. Zhang, and C. W. Tan. Rooting out the rumor culprit from suspects. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 2671–2675. IEEE, 2013.
58.
Zurück zum Zitat V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef
61.
Zurück zum Zitat M. Fossi and J. Blackbird. Symantec internet security threat report 2010. Technical report, Symantec Corporation, March, 2011. M. Fossi and J. Blackbird. Symantec internet security threat report 2010. Technical report, Symantec Corporation, March, 2011.
75.
Zurück zum Zitat P. D. Grünwald. The minimum description length principle. MIT press, 2007. P. D. Grünwald. The minimum description length principle. MIT press, 2007.
76.
Zurück zum Zitat S. L. Hakimi, M. L. Labbé, and E. Schmeichel. The voronoi partition of a network and its implications in location theory. ORSA journal on computing, 4(4):412–417, 1992.MathSciNetCrossRef S. L. Hakimi, M. L. Labbé, and E. Schmeichel. The voronoi partition of a network and its implications in location theory. ORSA journal on computing, 4(4):412–417, 1992.MathSciNetCrossRef
88.
Zurück zum Zitat S. Jitesh and A. Jafar. The enron email dataset database schema and brief statistical report. Technical report, University of Southern California, 2009. S. Jitesh and A. Jafar. The enron email dataset database schema and brief statistical report. Technical report, University of Southern California, 2009.
89.
Zurück zum Zitat N. Karamchandani and M. Franceschetti. Rumor source detection under probabilistic sampling. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 2184–2188, 2013. N. Karamchandani and M. Franceschetti. Rumor source detection under probabilistic sampling. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 2184–2188, 2013.
90.
Zurück zum Zitat B. Karrer and M. E. J. Newman. Message passing approach for general epidemic models. Phys. Rev. E, 82:016101, Jul 2010. B. Karrer and M. E. J. Newman. Message passing approach for general epidemic models. Phys. Rev. E, 82:016101, Jul 2010.
111.
Zurück zum Zitat A. Y. Lokhov, M. Mézard, H. Ohta, and L. Zdeborová. Inferring the origin of an epidemy with dynamic message-passing algorithm. arXiv preprint arXiv:1303.5315, 2013. A. Y. Lokhov, M. Mézard, H. Ohta, and L. Zdeborová. Inferring the origin of an epidemy with dynamic message-passing algorithm. arXiv preprint arXiv:1303.5315, 2013.
112.
Zurück zum Zitat A. Louni and K. Subbalakshmi. A two-stage algorithm to estimate the source of information diffusion in social media networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, pages 329–333. IEEE, 2014. A. Louni and K. Subbalakshmi. A two-stage algorithm to estimate the source of information diffusion in social media networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, pages 329–333. IEEE, 2014.
114.
Zurück zum Zitat W. Luo and W. P. Tay. Finding an infection source under the sis model. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, pages 2930–2934, 2013. W. Luo and W. P. Tay. Finding an infection source under the sis model. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, pages 2930–2934, 2013.
115.
Zurück zum Zitat W. Luo, W. P. Tay, and M. Leng. Identifying infection sources and regions in large networks. Signal Processing, IEEE Transactions on, 61(11):2850–2865, 2013.MathSciNetCrossRef W. Luo, W. P. Tay, and M. Leng. Identifying infection sources and regions in large networks. Signal Processing, IEEE Transactions on, 61(11):2850–2865, 2013.MathSciNetCrossRef
116.
Zurück zum Zitat W. Luo, W. P. Tay, and M. Leng. How to identify an infection source with limited observations. IEEE Journal of Selected Topics in Signal Processing, 8(4):586–597, 2014.CrossRef W. Luo, W. P. Tay, and M. Leng. How to identify an infection source with limited observations. IEEE Journal of Selected Topics in Signal Processing, 8(4):586–597, 2014.CrossRef
126.
Zurück zum Zitat D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security and Privacy, 1(4):33–39, July 2003.CrossRef D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security and Privacy, 1(4):33–39, July 2003.CrossRef
146.
Zurück zum Zitat P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012. P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012.
147.
Zurück zum Zitat B. A. Prakash, J. Vreeken, and C. Faloutsos. Spotting culprits in epidemics: How many and which ones? In Proceedings of the 2012 IEEE 12th International Conference on Data Mining, ICDM ’12, pages 11–20, Washington, DC, USA, 2012. IEEE Computer Society. B. A. Prakash, J. Vreeken, and C. Faloutsos. Spotting culprits in epidemics: How many and which ones? In Proceedings of the 2012 IEEE 12th International Conference on Data Mining, ICDM ’12, pages 11–20, Washington, DC, USA, 2012. IEEE Computer Society.
148.
Zurück zum Zitat B. A. Prakash, J. Vreeken, and C. Faloutsos. Efficiently spotting the starting points of an epidemic in a large graph. Knowledge and Information Systems, 38(1):35–59, 2014.CrossRef B. A. Prakash, J. Vreeken, and C. Faloutsos. Efficiently spotting the starting points of an epidemic in a large graph. Knowledge and Information Systems, 38(1):35–59, 2014.CrossRef
150.
Zurück zum Zitat J. G. Restrepo, E. Ott, and B. R. Hunt. Characterizing the dynamical importance of network nodes and links. Phys. Rev. Lett., 97:094102, Sep 2006. J. G. Restrepo, E. Ott, and B. R. Hunt. Characterizing the dynamical importance of network nodes and links. Phys. Rev. Lett., 97:094102, Sep 2006.
157.
Zurück zum Zitat V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter, and H. Zhang. Toward a framework for internet forensic analysis. In ACM HotNets-III, 2004. V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter, and H. Zhang. Toward a framework for internet forensic analysis. In ACM HotNets-III, 2004.
158.
Zurück zum Zitat E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, volume 8389, 2012. E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, volume 8389, 2012.
160.
Zurück zum Zitat D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010. D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010.
161.
Zurück zum Zitat D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef
162.
Zurück zum Zitat D. Shah and T. Zaman. Rumor centrality: A universal source detector. SIGMETRICS Perform. Eval. Rev., 40(1):199–210, June 2012.CrossRef D. Shah and T. Zaman. Rumor centrality: A universal source detector. SIGMETRICS Perform. Eval. Rev., 40(1):199–210, June 2012.CrossRef
176.
Zurück zum Zitat Y. Wang, S. Wen, Y. Xiang, and W. Zhou. Modeling the propagation of worms in networks: A survey. Communications Surveys Tutorials, IEEE, PP(99):1–19, 2013. Y. Wang, S. Wen, Y. Xiang, and W. Zhou. Modeling the propagation of worms in networks: A survey. Communications Surveys Tutorials, IEEE, PP(99):1–19, 2013.
178.
Zurück zum Zitat Z. Wang, W. Dong, W. Zhang, and C. W. Tan. Rumor source detection with multiple observations: Fundamental limits and algorithms. In The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’14, pages 1–13. ACM, 2014. Z. Wang, W. Dong, W. Zhang, and C. W. Tan. Rumor source detection with multiple observations: Fundamental limits and algorithms. In The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’14, pages 1–13. ACM, 2014.
180.
Zurück zum Zitat D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.CrossRef D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.CrossRef
181.
Zurück zum Zitat N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A taxonomy of computer worms. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM ’03, pages 11–18, 2003. N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A taxonomy of computer worms. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM ’03, pages 11–18, 2003.
189.
Zurück zum Zitat P. Wood and G. Egan. Symantec internet security threat report 2011. Technical report, Symantec Corporation, April, 2012. P. Wood and G. Egan. Symantec internet security threat report 2011. Technical report, Symantec Corporation, April, 2012.
191.
Zurück zum Zitat Y. Xie, V. Sekar, D. A. Maltz, M. K. Reiter, and H. Zhang. Worm origin identification using random moonwalks. In Security and Privacy, 2005 IEEE Symposium on, pages 242–256. IEEE, 2005. Y. Xie, V. Sekar, D. A. Maltz, M. K. Reiter, and H. Zhang. Worm origin identification using random moonwalks. In Security and Privacy, 2005 IEEE Symposium on, pages 242–256. IEEE, 2005.
197.
Zurück zum Zitat W. Zang, P. Zhang, C. Zhou, and L. Guo. Discovering multiple diffusion source nodes in social networks. Procedia Computer Science, 29:443–452, 2014.CrossRef W. Zang, P. Zhang, C. Zhou, and L. Guo. Discovering multiple diffusion source nodes in social networks. Procedia Computer Science, 29:443–452, 2014.CrossRef
199.
Zurück zum Zitat G.-M. Zhu, H. Yang, R. Yang, J. Ren, B. Li, and Y.-C. Lai. Uncovering evolutionary ages of nodes in complex networks. The European Physical Journal B, 85(3):1–6, 2012.CrossRef G.-M. Zhu, H. Yang, R. Yang, J. Ren, B. Li, and Y.-C. Lai. Uncovering evolutionary ages of nodes in complex networks. The European Physical Journal B, 85(3):1–6, 2012.CrossRef
201.
Zurück zum Zitat K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013. K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013.
202.
Zurück zum Zitat K. Zhu and L. Ying. A robust information source estimator with sparse observations. Computational Social Networks, 1(1):1, 2014. K. Zhu and L. Ying. A robust information source estimator with sparse observations. Computational Social Networks, 1(1):1, 2014.
204.
Zurück zum Zitat Y. Zhu, B. Xu, X. Shi, and Y. Wang. A survey of social-based routing in delay tolerant networks: Positive and negative social effects. Communications Surveys Tutorials, IEEE, 15(1):387–401, Jan 2013.CrossRef Y. Zhu, B. Xu, X. Shi, and Y. Wang. A survey of social-based routing in delay tolerant networks: Positive and negative social effects. Communications Surveys Tutorials, IEEE, 15(1):387–401, Jan 2013.CrossRef
205.
Zurück zum Zitat Z. Zhu, G. Lu, Y. Chen, Z. Fu, P. Roberts, and K. Han. Botnet research survey. In Computer Software and Applications, 2008. COMPSAC ’08. 32nd Annual IEEE International, pages 967–972, July 2008. Z. Zhu, G. Lu, Y. Chen, Z. Fu, P. Roberts, and K. Han. Botnet research survey. In Computer Software and Applications, 2008. COMPSAC ’08. 32nd Annual IEEE International, pages 967–972, July 2008.
206.
Zurück zum Zitat C. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pages 138–147, 2002. C. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pages 138–147, 2002.
Metadaten
Titel
Comparative Study and Numerical Analysis
verfasst von
Jiaojiao Jiang
Sheng Wen
Shui Yu
Bo Liu
Yang Xiang
Wanlei Zhou
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-02179-5_9