Skip to main content
Top

2019 | OriginalPaper | Chapter

10. Identifying Propagation Source in Time-Varying Networks

Authors : Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Published in: Malicious Attack Propagation and Source Identification

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Identifying the propagation sources of malicious attacks in complex networks plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However, the temporal variation in the topology of the underlying networks and the ongoing dynamic processes challenge our traditional source identification techniques which are considered in static networks. In this chapter, we introduce an effective approach used in criminology to overcome the challenges. For simplicity, we use rumor source identification to present the approach.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
24.
go back to reference D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef
27.
go back to reference C. Cattuto, W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, and A. Vespignani. Dynamics of person-to-person interactions from distributed rfid sensor networks. PloS one, 5(7):e11596, 2010.CrossRef C. Cattuto, W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, and A. Vespignani. Dynamics of person-to-person interactions from distributed rfid sensor networks. PloS one, 5(7):e11596, 2010.CrossRef
42.
go back to reference B. Doerr, M. Fouz, and T. Friedrich. Why rumors spread so quickly in social networks. Commun. ACM, 55(6):70–75, June 2012.CrossRef B. Doerr, M. Fouz, and T. Friedrich. Why rumors spread so quickly in social networks. Commun. ACM, 55(6):70–75, June 2012.CrossRef
46.
go back to reference N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255–268, 2006.CrossRef N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255–268, 2006.CrossRef
91.
go back to reference M. Karsai, N. Perra, and A. Vespignani. Time varying networks and the weakness of strong ties. Scientific reports, 4, 2014. M. Karsai, N. Perra, and A. Vespignani. Time varying networks and the weakness of strong ties. Scientific reports, 4, 2014.
108.
go back to reference Y. Li, P. Hui, D. Jin, L. Su, and L. Zeng. Optimal distributed malware defense in mobile networks with heterogeneous devices. Mobile Computing, IEEE Transactions on, 2013. Accepted. Y. Li, P. Hui, D. Jin, L. Su, and L. Zeng. Optimal distributed malware defense in mobile networks with heterogeneous devices. Mobile Computing, IEEE Transactions on, 2013. Accepted.
115.
go back to reference W. Luo, W. P. Tay, and M. Leng. Identifying infection sources and regions in large networks. Signal Processing, IEEE Transactions on, 61(11):2850–2865, 2013.MathSciNetCrossRef W. Luo, W. P. Tay, and M. Leng. Identifying infection sources and regions in large networks. Signal Processing, IEEE Transactions on, 61(11):2850–2865, 2013.MathSciNetCrossRef
117.
go back to reference W. Luo, W. P. Tay, and M. Leng. Rumor spreading and source identification: A hide and seek game. arXiv preprint arXiv:1504.04796, 2015. W. Luo, W. P. Tay, and M. Leng. Rumor spreading and source identification: A hide and seek game. arXiv preprint arXiv:1504.04796, 2015.
118.
go back to reference Y. Ma, X. Jiang, M. Li, X. Shen, Q. Guo, Y. Lei, and Z. Zheng. Identify the diversity of mesoscopic structures in networks: A mixed random walk approach. EPL (Europhysics Letters), 104(1):18006, 2013.CrossRef Y. Ma, X. Jiang, M. Li, X. Shen, Q. Guo, Y. Lei, and Z. Zheng. Identify the diversity of mesoscopic structures in networks: A mixed random walk approach. EPL (Europhysics Letters), 104(1):18006, 2013.CrossRef
124.
go back to reference S. Meloni, A. Arenas, S. Gómez, J. Borge-Holthoefer, and Y. Moreno. Modeling epidemic spreading in complex networks: concurrency and traffic. In Handbook of Optimization in Complex Networks, pages 435–462. Springer, 2012. S. Meloni, A. Arenas, S. Gómez, J. Borge-Holthoefer, and Y. Moreno. Modeling epidemic spreading in complex networks: concurrency and traffic. In Handbook of Optimization in Complex Networks, pages 435–462. Springer, 2012.
128.
go back to reference Y. Moreno, M. Nekovee, and A. F. Pacheco. Dynamics of rumor spreading in complex networks. Physical Review E, 69(6):066130, 2004. Y. Moreno, M. Nekovee, and A. F. Pacheco. Dynamics of rumor spreading in complex networks. Physical Review E, 69(6):066130, 2004.
143.
go back to reference F. Peter. ‘bogus’ ap tweet about explosion at the white house wipes billions off us markets, April 23 2013. Washington. F. Peter. ‘bogus’ ap tweet about explosion at the white house wipes billions off us markets, April 23 2013. Washington.
146.
go back to reference P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012. P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012.
151.
go back to reference B. Ribeiro, N. Perra, and A. Baronchelli. Quantifying the effect of temporal resolution on time-varying networks. Scientific reports, 3, 2013. B. Ribeiro, N. Perra, and A. Baronchelli. Quantifying the effect of temporal resolution on time-varying networks. Scientific reports, 3, 2013.
160.
go back to reference D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010. D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010.
164.
go back to reference J. Shetty and J. Adibi. The enron email dataset database schema and brief statistical report. Information Sciences Institute Technical Report, University of Southern California, 4, 2004. J. Shetty and J. Adibi. The enron email dataset database schema and brief statistical report. Information Sciences Institute Technical Report, University of Southern California, 4, 2004.
170.
go back to reference M. P. Viana, D. R. Amancio, and L. d. F. Costa. On time-varying collaboration networks. Journal of Informetrics, 7(2):371–378, 2013.CrossRef M. P. Viana, D. R. Amancio, and L. d. F. Costa. On time-varying collaboration networks. Journal of Informetrics, 7(2):371–378, 2013.CrossRef
171.
go back to reference B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN ’09, pages 37–42, 2009. B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN ’09, pages 37–42, 2009.
178.
go back to reference Z. Wang, W. Dong, W. Zhang, and C. W. Tan. Rumor source detection with multiple observations: Fundamental limits and algorithms. In The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’14, pages 1–13. ACM, 2014. Z. Wang, W. Dong, W. Zhang, and C. W. Tan. Rumor source detection with multiple observations: Fundamental limits and algorithms. In The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’14, pages 1–13. ACM, 2014.
201.
go back to reference K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013. K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013.
207.
go back to reference C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on dependable and secure computing, 4(2):105–118, 2007.CrossRef C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on dependable and secure computing, 4(2):105–118, 2007.CrossRef
Metadata
Title
Identifying Propagation Source in Time-Varying Networks
Authors
Jiaojiao Jiang
Sheng Wen
Shui Yu
Bo Liu
Yang Xiang
Wanlei Zhou
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-02179-5_10

Premium Partner