Skip to main content

2019 | OriginalPaper | Buchkapitel

11. Identifying Multiple Propagation Sources

verfasst von : Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Erschienen in: Malicious Attack Propagation and Source Identification

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The global diffusion of epidemics, computer viruses and rumors causes great damage to our society. One critical issue to identify the multiple diffusion sources so as to timely quarantine them. However, most methods proposed so far are unsuitable for diffusion with multiple sources because of the high computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce an effective method to identify multiple diffusion sources, which can address three main issues in this area: (1) How many sources are there? (2) Where did the diffusion emerge? (3) When did the diffusion break out? For simplicity, we use rumor source identification to present the approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
24.
Zurück zum Zitat D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef
32.
Zurück zum Zitat Z. Chen, K. Zhu, and L. Ying. Detecting multiple information sources in networks under the sir model. In Information Sciences and Systems (CISS), 2014 48th Annual Conference on, pages 1–4. IEEE, 2014. Z. Chen, K. Zhu, and L. Ying. Detecting multiple information sources in networks under the sir model. In Information Sciences and Systems (CISS), 2014 48th Annual Conference on, pages 1–4. IEEE, 2014.
58.
Zurück zum Zitat V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef
62.
Zurück zum Zitat C. Fraser, C. A. Donnelly, S. Cauchemez, W. P. Hanage, M. D. Van Kerkhove, T. D. Hollingsworth, J. Griffin, R. F. Baggaley, H. E. Jenkins, E. J. Lyons, et al. Pandemic potential of a strain of influenza a (h1n1): early findings. science, 324(5934):1557–1561, 2009.CrossRef C. Fraser, C. A. Donnelly, S. Cauchemez, W. P. Hanage, M. D. Van Kerkhove, T. D. Hollingsworth, J. Griffin, R. F. Baggaley, H. E. Jenkins, E. J. Lyons, et al. Pandemic potential of a strain of influenza a (h1n1): early findings. science, 324(5934):1557–1561, 2009.CrossRef
72.
Zurück zum Zitat M. Girvan and M. E. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821–7826, 2002.MathSciNetCrossRef M. Girvan and M. E. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821–7826, 2002.MathSciNetCrossRef
82.
Zurück zum Zitat H. Jeong, S. P. Mason, A. L. Barabasi, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, May 2001.CrossRef H. Jeong, S. P. Mason, A. L. Barabasi, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, May 2001.CrossRef
114.
Zurück zum Zitat W. Luo and W. P. Tay. Finding an infection source under the sis model. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, pages 2930–2934, 2013. W. Luo and W. P. Tay. Finding an infection source under the sis model. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, pages 2930–2934, 2013.
115.
Zurück zum Zitat W. Luo, W. P. Tay, and M. Leng. Identifying infection sources and regions in large networks. Signal Processing, IEEE Transactions on, 61(11):2850–2865, 2013.MathSciNetCrossRef W. Luo, W. P. Tay, and M. Leng. Identifying infection sources and regions in large networks. Signal Processing, IEEE Transactions on, 61(11):2850–2865, 2013.MathSciNetCrossRef
116.
Zurück zum Zitat W. Luo, W. P. Tay, and M. Leng. How to identify an infection source with limited observations. IEEE Journal of Selected Topics in Signal Processing, 8(4):586–597, 2014.CrossRef W. Luo, W. P. Tay, and M. Leng. How to identify an infection source with limited observations. IEEE Journal of Selected Topics in Signal Processing, 8(4):586–597, 2014.CrossRef
119.
Zurück zum Zitat D. MacRae. 5 viruses to be on the alert for in 2014. D. MacRae. 5 viruses to be on the alert for in 2014.
123.
Zurück zum Zitat A. R. McLean, R. M. May, J. Pattison, R. A. Weiss, et al. SARS: A case study in emerging infections. Oxford University Press, 2005. A. R. McLean, R. M. May, J. Pattison, R. A. Weiss, et al. SARS: A case study in emerging infections. Oxford University Press, 2005.
132.
Zurück zum Zitat M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005.CrossRef M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005.CrossRef
142.
Zurück zum Zitat C. Pash. The lure of naked hollywood star photos sent the internet into meltdown in new zealand. Business Insider Australia, September 7 2014, 4:21 PM. C. Pash. The lure of naked hollywood star photos sent the internet into meltdown in new zealand. Business Insider Australia, September 7 2014, 4:21 PM.
144.
Zurück zum Zitat S. Pettie and V. Ramachandran. A shortest path algorithm for real-weighted undirected graphs. SIAM Journal on Computing, 34(6):1398–1431, 2005.MathSciNetCrossRef S. Pettie and V. Ramachandran. A shortest path algorithm for real-weighted undirected graphs. SIAM Journal on Computing, 34(6):1398–1431, 2005.MathSciNetCrossRef
148.
Zurück zum Zitat B. A. Prakash, J. Vreeken, and C. Faloutsos. Efficiently spotting the starting points of an epidemic in a large graph. Knowledge and Information Systems, 38(1):35–59, 2014.CrossRef B. A. Prakash, J. Vreeken, and C. Faloutsos. Efficiently spotting the starting points of an epidemic in a large graph. Knowledge and Information Systems, 38(1):35–59, 2014.CrossRef
152.
Zurück zum Zitat M. Rosvall and C. T. Bergstrom. An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 104(18):7327–7331, 2007.CrossRef M. Rosvall and C. T. Bergstrom. An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 104(18):7327–7331, 2007.CrossRef
160.
Zurück zum Zitat D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010. D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010.
161.
Zurück zum Zitat D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef
168.
Zurück zum Zitat W. E. R. Team. Ebola virus disease in west africathe first 9 months of the epidemic and forward projections. N Engl J Med, 371(16):1481–95, 2014.CrossRef W. E. R. Team. Ebola virus disease in west africathe first 9 months of the epidemic and forward projections. N Engl J Med, 371(16):1481–95, 2014.CrossRef
171.
Zurück zum Zitat B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN ’09, pages 37–42, 2009. B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN ’09, pages 37–42, 2009.
176.
Zurück zum Zitat Y. Wang, S. Wen, Y. Xiang, and W. Zhou. Modeling the propagation of worms in networks: A survey. Communications Surveys Tutorials, IEEE, PP(99):1–19, 2013. Y. Wang, S. Wen, Y. Xiang, and W. Zhou. Modeling the propagation of worms in networks: A survey. Communications Surveys Tutorials, IEEE, PP(99):1–19, 2013.
180.
Zurück zum Zitat D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.CrossRef D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.CrossRef
186.
Zurück zum Zitat S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, and W. Jia. Modeling propagation dynamics of social network worms. Parallel and Distributed Systems, IEEE Transactions on, 24(8):1633–1643, 2013.CrossRef S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, and W. Jia. Modeling propagation dynamics of social network worms. Parallel and Distributed Systems, IEEE Transactions on, 24(8):1633–1643, 2013.CrossRef
195.
Zurück zum Zitat K. Yang, A. H. Shekhar, D. Oliver, and S. Shekhar. Capacity-constrained network-voronoi diagram: a summary of results. In International Symposium on Spatial and Temporal Databases, pages 56–73. Springer, 2013. K. Yang, A. H. Shekhar, D. Oliver, and S. Shekhar. Capacity-constrained network-voronoi diagram: a summary of results. In International Symposium on Spatial and Temporal Databases, pages 56–73. Springer, 2013.
203.
Zurück zum Zitat K. Zhu and L. Ying. Information source detection in the sir model: a sample-path-based approach. IEEE/ACM Transactions on Networking, 24(1):408–421, 2016.CrossRef K. Zhu and L. Ying. Information source detection in the sir model: a sample-path-based approach. IEEE/ACM Transactions on Networking, 24(1):408–421, 2016.CrossRef
207.
Zurück zum Zitat C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on dependable and secure computing, 4(2):105–118, 2007.CrossRef C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on dependable and secure computing, 4(2):105–118, 2007.CrossRef
Metadaten
Titel
Identifying Multiple Propagation Sources
verfasst von
Jiaojiao Jiang
Sheng Wen
Shui Yu
Bo Liu
Yang Xiang
Wanlei Zhou
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-02179-5_11

Premium Partner