Skip to main content
Top

Hint

Swipe to navigate through the articles of this issue

Published in: Mobile Networks and Applications 4/2021

06-01-2020

PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model

Authors: Yong Ding, Xiaoqing Cui, Huiyong Wang, Kun Zhang

Published in: Mobile Networks and Applications | Issue 4/2021

Login to get access
share
SHARE

Abstract

Nowadays, the spread of Internet rumors and viruses has caused great hidden dangers to the safety of human life. It is particularly important to identify the source of network threat, especially when there are multiple sources in the network. At present, the research on multi-source propagation is mostly based on SI model, but there is little work on multi-source propagation under SIR model. Based on SIR propagation model, this paper proposes a novel PRIA algorithm to locate multiple propagation sources. Firstly, we propose a new partitioning method based on effective distance, which transforms the source problem into a single source problem in multiple partitions. Secondly, we propose a single source algorithm based on SIR propagation model, which uses reverse infection algorithm to locate suspicious sources. Finally, we evaluate our approach in real network topology. The simulation results show that our method can effectively identify the real source and estimate the propagation time. And it has great accuracy in the number of identification sources.

To get access to this content you need the following product:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe



 


Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko





Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Show more products
Literature
2.
go back to reference Pinto PC, Thiran P, Vetterli M (Aug 2012) Locating the source of diffusion in large-scale networks. Phys Rev Lett 109 Pinto PC, Thiran P, Vetterli M (Aug 2012) Locating the source of diffusion in large-scale networks. Phys Rev Lett 109
4.
go back to reference Luo W, Tay WP, Leng M (2013) Identifying infection sources and regions in large networks. Signal Process IEEE Trans 61(11):2850–2865 MathSciNetCrossRef Luo W, Tay WP, Leng M (2013) Identifying infection sources and regions in large networks. Signal Process IEEE Trans 61(11):2850–2865 MathSciNetCrossRef
5.
go back to reference Zhu K, Ying L (2013) Information source detection in the SIR model: a sample path based approach. In Information Theory and Applications Workshop (ITA), pp 1–9 Zhu K, Ying L (2013) Information source detection in the SIR model: a sample path based approach. In Information Theory and Applications Workshop (ITA), pp 1–9
6.
go back to reference Karamchandani N, Franceschetti M (2013) Rumor source detection under probabilistic sampling. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pp 2184–2188 Karamchandani N, Franceschetti M (2013) Rumor source detection under probabilistic sampling. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pp 2184–2188
7.
go back to reference Shah D, Zaman T (2010) Detecting sources of computer viruses in net-works: theory and experiment. In Proc. ACM SIGMETRICS, New York, NY, pp 203–214 Shah D, Zaman T (2010) Detecting sources of computer viruses in net-works: theory and experiment. In Proc. ACM SIGMETRICS, New York, NY, pp 203–214
9.
go back to reference Shah D, Zaman T (2012) Rumor centrality: a universal source detector. In Proc. ACM SIGMETRICS, London, pp 199–210 Shah D, Zaman T (2012) Rumor centrality: a universal source detector. In Proc. ACM SIGMETRICS, London, pp 199–210
10.
go back to reference Easley D, Kleinberg J (2010) Networks, crowds, and markets: Rea-soning about a highly connected world. Cambridge University Press, Cambridge CrossRef Easley D, Kleinberg J (2010) Networks, crowds, and markets: Rea-soning about a highly connected world. Cambridge University Press, Cambridge CrossRef
11.
go back to reference Brockmann D, Helbing D (2013) The hidden geometry of complex, network-driven contagion phenomena. Science 342(6164):1337–1342 CrossRef Brockmann D, Helbing D (2013) The hidden geometry of complex, network-driven contagion phenomena. Science 342(6164):1337–1342 CrossRef
12.
go back to reference Yang K, Shekhar AH, Oliver D, Shekhar S (2013) Capacity constrained network-voronoi diagram: a summary of results. In: Advances in spatial and temporal databases. Springer, Heidelberg, pp 56–73 CrossRef Yang K, Shekhar AH, Oliver D, Shekhar S (2013) Capacity constrained network-voronoi diagram: a summary of results. In: Advances in spatial and temporal databases. Springer, Heidelberg, pp 56–73 CrossRef
13.
go back to reference Jiang JJ, Wen S, Yu S, Xiang Y, Zhou W (2015) K-Center: An Approach on the Multi-Source Identification of Information Diffusion. IEEE Trans Inf Forensics Secur 10(12):2616–2626 CrossRef Jiang JJ, Wen S, Yu S, Xiang Y, Zhou W (2015) K-Center: An Approach on the Multi-Source Identification of Information Diffusion. IEEE Trans Inf Forensics Secur 10(12):2616–2626 CrossRef
14.
go back to reference Leskovec J, Kleinberg J, Faloutsos C (Mar 2007) Graph evolution:Densification and shrinking diameters. ACM Trans Knowl Discov Data 1(1):2 CrossRef Leskovec J, Kleinberg J, Faloutsos C (Mar 2007) Graph evolution:Densification and shrinking diameters. ACM Trans Knowl Discov Data 1(1):2 CrossRef
15.
go back to reference Viswanath B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on online social networks, pp 37–42 Viswanath B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on online social networks, pp 37–42
16.
go back to reference Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone’s an influencer: quantifying influence on Twitter. In Proc. ACM Int Conf Web Search Data Min, pp 65–74 Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone’s an influencer: quantifying influence on Twitter. In Proc. ACM Int Conf Web Search Data Min, pp 65–74
17.
go back to reference Aral S, Walker D (2012) Identifying influential and susceptible members of social networks. Science 337(6092):337–341 MathSciNetCrossRef Aral S, Walker D (2012) Identifying influential and susceptible members of social networks. Science 337(6092):337–341 MathSciNetCrossRef
18.
19.
go back to reference Fioriti V, Chinnici M, Palomo J (2014) Predicting the sources of an outbreak with a spectral technique. Appl Math Sci 8(135):6775–6782 Fioriti V, Chinnici M, Palomo J (2014) Predicting the sources of an outbreak with a spectral technique. Appl Math Sci 8(135):6775–6782
20.
go back to reference Restrepo JG, Ott E, Hunt BR (2006) Characterizing the dynamical importance of network nodes and links. Phys Rev Lett 97:094102 CrossRef Restrepo JG, Ott E, Hunt BR (2006) Characterizing the dynamical importance of network nodes and links. Phys Rev Lett 97:094102 CrossRef
21.
go back to reference Luo W, Tay WP, Leng M (2013) Identifying infection sources and regions in large networks. Signal Process IEEE Trans 61(11):2850–2865 MathSciNetCrossRef Luo W, Tay WP, Leng M (2013) Identifying infection sources and regions in large networks. Signal Process IEEE Trans 61(11):2850–2865 MathSciNetCrossRef
22.
go back to reference Hakimi SL, Labb’e ML, Schmeichel E (1992) The voronoi partition of a network and its implications in location theory. ORSA J Comput 4(4):412–417 MathSciNetCrossRef Hakimi SL, Labb’e ML, Schmeichel E (1992) The voronoi partition of a network and its implications in location theory. ORSA J Comput 4(4):412–417 MathSciNetCrossRef
23.
go back to reference Lokhov AY, Mézard M, Ohta H, Zdeborová L (2013) Inferring the origin of an epidemy with dynamic message-passing algorithm. arXiv preprint arXiv:1303.5315 Lokhov AY, Mézard M, Ohta H, Zdeborová L (2013) Inferring the origin of an epidemy with dynamic message-passing algorithm. arXiv preprint arXiv:1303.5315
24.
Metadata
Title
PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model
Authors
Yong Ding
Xiaoqing Cui
Huiyong Wang
Kun Zhang
Publication date
06-01-2020
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 4/2021
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01487-1

Other articles of this Issue 4/2021

Mobile Networks and Applications 4/2021 Go to the issue