Skip to main content
Top

2019 | OriginalPaper | Chapter

12. Identifying Propagation Source in Large-Scale Networks

Authors : Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Published in: Malicious Attack Propagation and Source Identification

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The global diffusion of epidemics, rumors and computer viruses causes great damage to our society. It is critical to identify the diffusion sources and promptly quarantine them. However, one critical issue of current methods is that they are far are unsuitable for large-scale networks due to the computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce a community structure based approach to efficiently identify diffusion sources in large networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference A. Agaskar and Y. M. Lu. A fast monte carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013. A. Agaskar and Y. M. Lu. A fast monte carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013.
3.
go back to reference Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann. Link communities reveal multiscale complexity in networks. Nature, 466(7307):761–764, 2010.CrossRef Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann. Link communities reveal multiscale complexity in networks. Nature, 466(7307):761–764, 2010.CrossRef
7.
go back to reference F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 112(11):118701, 2014. F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 112(11):118701, 2014.
8.
go back to reference L. A. N. Amaral, A. Scala, M. Barthelemy, and H. E. Stanley. Classes of small-world networks. Proceedings of the National Academy of Sciences, 97(21):11149–11152, 2000.CrossRef L. A. N. Amaral, A. Scala, M. Barthelemy, and H. E. Stanley. Classes of small-world networks. Proceedings of the National Academy of Sciences, 97(21):11149–11152, 2000.CrossRef
10.
go back to reference R. M. Anderson, R. M. May, and B. Anderson. Infectious diseases of humans: dynamics and control, volume 28. Wiley Online Library, 1992. R. M. Anderson, R. M. May, and B. Anderson. Infectious diseases of humans: dynamics and control, volume 28. Wiley Online Library, 1992.
17.
go back to reference A. Beuhring and K. Salous. Beyond blacklisting: Cyberdefense in the era of advanced persistent threats. Security & Privacy, IEEE, 12(5):90–93, 2014.CrossRef A. Beuhring and K. Salous. Beyond blacklisting: Cyberdefense in the era of advanced persistent threats. Security & Privacy, IEEE, 12(5):90–93, 2014.CrossRef
19.
go back to reference V. Blue. Cryptolocker’s crimewave: A trail of millions in laundered bitcoin.[en línea] 22 de diciembre de 2013.[citado el: 22 de enero de 2014.]. V. Blue. Cryptolocker’s crimewave: A trail of millions in laundered bitcoin.[en línea] 22 de diciembre de 2013.[citado el: 22 de enero de 2014.].
24.
go back to reference D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef
34.
go back to reference C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011. C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011.
35.
go back to reference M. Conover, J. Ratkiewicz, M. Francisco, B. Gonçalves, F. Menczer, and A. Flammini. Political polarization on twitter. In ICWSM, 2011. M. Conover, J. Ratkiewicz, M. Francisco, B. Gonçalves, F. Menczer, and A. Flammini. Political polarization on twitter. In ICWSM, 2011.
42.
go back to reference B. Doerr, M. Fouz, and T. Friedrich. Why rumors spread so quickly in social networks. Commun. ACM, 55(6):70–75, June 2012.CrossRef B. Doerr, M. Fouz, and T. Friedrich. Why rumors spread so quickly in social networks. Commun. ACM, 55(6):70–75, June 2012.CrossRef
58.
go back to reference V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef
62.
go back to reference C. Fraser, C. A. Donnelly, S. Cauchemez, W. P. Hanage, M. D. Van Kerkhove, T. D. Hollingsworth, J. Griffin, R. F. Baggaley, H. E. Jenkins, E. J. Lyons, et al. Pandemic potential of a strain of influenza a (h1n1): early findings. science, 324(5934):1557–1561, 2009.CrossRef C. Fraser, C. A. Donnelly, S. Cauchemez, W. P. Hanage, M. D. Van Kerkhove, T. D. Hollingsworth, J. Griffin, R. F. Baggaley, H. E. Jenkins, E. J. Lyons, et al. Pandemic potential of a strain of influenza a (h1n1): early findings. science, 324(5934):1557–1561, 2009.CrossRef
63.
go back to reference M. L. Fredman and R. E. Tarjan. Fibonacci heaps and their uses in improved network optimization algorithms. Journal of the ACM (JACM), 34(3):596–615, 1987.MathSciNetCrossRef M. L. Fredman and R. E. Tarjan. Fibonacci heaps and their uses in improved network optimization algorithms. Journal of the ACM (JACM), 34(3):596–615, 1987.MathSciNetCrossRef
72.
go back to reference M. Girvan and M. E. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821–7826, 2002.MathSciNetCrossRef M. Girvan and M. E. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821–7826, 2002.MathSciNetCrossRef
82.
go back to reference H. Jeong, S. P. Mason, A. L. Barabasi, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, May 2001.CrossRef H. Jeong, S. P. Mason, A. L. Barabasi, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, May 2001.CrossRef
87.
go back to reference J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communications Surveys and Tutorials, accepted, in press. J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communications Surveys and Tutorials, accepted, in press.
104.
go back to reference I. Lawrence and K. Lin. A concordance correlation coefficient to evaluate reproducibility. Biometrics, pages 255–268, 1989. I. Lawrence and K. Lin. A concordance correlation coefficient to evaluate reproducibility. Biometrics, pages 255–268, 1989.
132.
go back to reference M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005.CrossRef M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005.CrossRef
138.
go back to reference N. P. Nguyen, T. N. Dinh, S. Tokala, and M. T. Thai. Overlapping communities in dynamic networks: their detection and mobile applications. In Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom ’11, pages 85–96. ACM, 2011. N. P. Nguyen, T. N. Dinh, S. Tokala, and M. T. Thai. Overlapping communities in dynamic networks: their detection and mobile applications. In Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom ’11, pages 85–96. ACM, 2011.
139.
go back to reference G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043):814–818, 2005.CrossRef G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043):814–818, 2005.CrossRef
140.
go back to reference G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435:814–818, 2005.CrossRef G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435:814–818, 2005.CrossRef
142.
go back to reference C. Pash. The lure of naked hollywood star photos sent the internet into meltdown in new zealand. Business Insider Australia, September 7 2014, 4:21 PM. C. Pash. The lure of naked hollywood star photos sent the internet into meltdown in new zealand. Business Insider Australia, September 7 2014, 4:21 PM.
146.
go back to reference P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012. P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012.
152.
go back to reference M. Rosvall and C. T. Bergstrom. An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 104(18):7327–7331, 2007.CrossRef M. Rosvall and C. T. Bergstrom. An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 104(18):7327–7331, 2007.CrossRef
153.
go back to reference M. Rosvall and C. T. Bergstrom. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences, 105(4):1118–1123, 2008.CrossRef M. Rosvall and C. T. Bergstrom. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences, 105(4):1118–1123, 2008.CrossRef
155.
go back to reference M. Sales-Pardo, R. Guimera, A. A. Moreira, and L. A. N. Amaral. Extracting the hierarchical organization of complex systems. Proceedings of the National Academy of Sciences, 104(39):15224–15229, 2007.CrossRef M. Sales-Pardo, R. Guimera, A. A. Moreira, and L. A. N. Amaral. Extracting the hierarchical organization of complex systems. Proceedings of the National Academy of Sciences, 104(39):15224–15229, 2007.CrossRef
158.
go back to reference E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, volume 8389, 2012. E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, volume 8389, 2012.
161.
go back to reference D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef
168.
go back to reference W. E. R. Team. Ebola virus disease in west africathe first 9 months of the epidemic and forward projections. N Engl J Med, 371(16):1481–95, 2014.CrossRef W. E. R. Team. Ebola virus disease in west africathe first 9 months of the epidemic and forward projections. N Engl J Med, 371(16):1481–95, 2014.CrossRef
180.
go back to reference D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.CrossRef D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.CrossRef
188.
go back to reference L. Weng, F. Menczer, and Y.-Y. Ahn. Virality prediction and community structure in social networks. Scientific reports, 3, 2013. L. Weng, F. Menczer, and Y.-Y. Ahn. Virality prediction and community structure in social networks. Scientific reports, 3, 2013.
201.
go back to reference K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013. K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013.
208.
go back to reference C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on Dependable and Secure Computing, 4(2):105–118, 2007.CrossRef C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on Dependable and Secure Computing, 4(2):105–118, 2007.CrossRef
Metadata
Title
Identifying Propagation Source in Large-Scale Networks
Authors
Jiaojiao Jiang
Sheng Wen
Shui Yu
Bo Liu
Yang Xiang
Wanlei Zhou
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-02179-5_12

Premium Partner