Skip to main content

2019 | OriginalPaper | Buchkapitel

12. Identifying Propagation Source in Large-Scale Networks

verfasst von : Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Erschienen in: Malicious Attack Propagation and Source Identification

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The global diffusion of epidemics, rumors and computer viruses causes great damage to our society. It is critical to identify the diffusion sources and promptly quarantine them. However, one critical issue of current methods is that they are far are unsuitable for large-scale networks due to the computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce a community structure based approach to efficiently identify diffusion sources in large networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat A. Agaskar and Y. M. Lu. A fast monte carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013. A. Agaskar and Y. M. Lu. A fast monte carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013.
3.
Zurück zum Zitat Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann. Link communities reveal multiscale complexity in networks. Nature, 466(7307):761–764, 2010.CrossRef Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann. Link communities reveal multiscale complexity in networks. Nature, 466(7307):761–764, 2010.CrossRef
7.
Zurück zum Zitat F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 112(11):118701, 2014. F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 112(11):118701, 2014.
8.
Zurück zum Zitat L. A. N. Amaral, A. Scala, M. Barthelemy, and H. E. Stanley. Classes of small-world networks. Proceedings of the National Academy of Sciences, 97(21):11149–11152, 2000.CrossRef L. A. N. Amaral, A. Scala, M. Barthelemy, and H. E. Stanley. Classes of small-world networks. Proceedings of the National Academy of Sciences, 97(21):11149–11152, 2000.CrossRef
10.
Zurück zum Zitat R. M. Anderson, R. M. May, and B. Anderson. Infectious diseases of humans: dynamics and control, volume 28. Wiley Online Library, 1992. R. M. Anderson, R. M. May, and B. Anderson. Infectious diseases of humans: dynamics and control, volume 28. Wiley Online Library, 1992.
17.
Zurück zum Zitat A. Beuhring and K. Salous. Beyond blacklisting: Cyberdefense in the era of advanced persistent threats. Security & Privacy, IEEE, 12(5):90–93, 2014.CrossRef A. Beuhring and K. Salous. Beyond blacklisting: Cyberdefense in the era of advanced persistent threats. Security & Privacy, IEEE, 12(5):90–93, 2014.CrossRef
19.
Zurück zum Zitat V. Blue. Cryptolocker’s crimewave: A trail of millions in laundered bitcoin.[en línea] 22 de diciembre de 2013.[citado el: 22 de enero de 2014.]. V. Blue. Cryptolocker’s crimewave: A trail of millions in laundered bitcoin.[en línea] 22 de diciembre de 2013.[citado el: 22 de enero de 2014.].
24.
Zurück zum Zitat D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef
34.
Zurück zum Zitat C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011. C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011.
35.
Zurück zum Zitat M. Conover, J. Ratkiewicz, M. Francisco, B. Gonçalves, F. Menczer, and A. Flammini. Political polarization on twitter. In ICWSM, 2011. M. Conover, J. Ratkiewicz, M. Francisco, B. Gonçalves, F. Menczer, and A. Flammini. Political polarization on twitter. In ICWSM, 2011.
42.
Zurück zum Zitat B. Doerr, M. Fouz, and T. Friedrich. Why rumors spread so quickly in social networks. Commun. ACM, 55(6):70–75, June 2012.CrossRef B. Doerr, M. Fouz, and T. Friedrich. Why rumors spread so quickly in social networks. Commun. ACM, 55(6):70–75, June 2012.CrossRef
58.
Zurück zum Zitat V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef
62.
Zurück zum Zitat C. Fraser, C. A. Donnelly, S. Cauchemez, W. P. Hanage, M. D. Van Kerkhove, T. D. Hollingsworth, J. Griffin, R. F. Baggaley, H. E. Jenkins, E. J. Lyons, et al. Pandemic potential of a strain of influenza a (h1n1): early findings. science, 324(5934):1557–1561, 2009.CrossRef C. Fraser, C. A. Donnelly, S. Cauchemez, W. P. Hanage, M. D. Van Kerkhove, T. D. Hollingsworth, J. Griffin, R. F. Baggaley, H. E. Jenkins, E. J. Lyons, et al. Pandemic potential of a strain of influenza a (h1n1): early findings. science, 324(5934):1557–1561, 2009.CrossRef
63.
Zurück zum Zitat M. L. Fredman and R. E. Tarjan. Fibonacci heaps and their uses in improved network optimization algorithms. Journal of the ACM (JACM), 34(3):596–615, 1987.MathSciNetCrossRef M. L. Fredman and R. E. Tarjan. Fibonacci heaps and their uses in improved network optimization algorithms. Journal of the ACM (JACM), 34(3):596–615, 1987.MathSciNetCrossRef
72.
Zurück zum Zitat M. Girvan and M. E. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821–7826, 2002.MathSciNetCrossRef M. Girvan and M. E. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821–7826, 2002.MathSciNetCrossRef
82.
Zurück zum Zitat H. Jeong, S. P. Mason, A. L. Barabasi, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, May 2001.CrossRef H. Jeong, S. P. Mason, A. L. Barabasi, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, May 2001.CrossRef
87.
Zurück zum Zitat J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communications Surveys and Tutorials, accepted, in press. J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communications Surveys and Tutorials, accepted, in press.
104.
Zurück zum Zitat I. Lawrence and K. Lin. A concordance correlation coefficient to evaluate reproducibility. Biometrics, pages 255–268, 1989. I. Lawrence and K. Lin. A concordance correlation coefficient to evaluate reproducibility. Biometrics, pages 255–268, 1989.
132.
Zurück zum Zitat M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005.CrossRef M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005.CrossRef
138.
Zurück zum Zitat N. P. Nguyen, T. N. Dinh, S. Tokala, and M. T. Thai. Overlapping communities in dynamic networks: their detection and mobile applications. In Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom ’11, pages 85–96. ACM, 2011. N. P. Nguyen, T. N. Dinh, S. Tokala, and M. T. Thai. Overlapping communities in dynamic networks: their detection and mobile applications. In Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom ’11, pages 85–96. ACM, 2011.
139.
Zurück zum Zitat G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043):814–818, 2005.CrossRef G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043):814–818, 2005.CrossRef
140.
Zurück zum Zitat G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435:814–818, 2005.CrossRef G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435:814–818, 2005.CrossRef
142.
Zurück zum Zitat C. Pash. The lure of naked hollywood star photos sent the internet into meltdown in new zealand. Business Insider Australia, September 7 2014, 4:21 PM. C. Pash. The lure of naked hollywood star photos sent the internet into meltdown in new zealand. Business Insider Australia, September 7 2014, 4:21 PM.
146.
Zurück zum Zitat P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012. P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012.
152.
Zurück zum Zitat M. Rosvall and C. T. Bergstrom. An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 104(18):7327–7331, 2007.CrossRef M. Rosvall and C. T. Bergstrom. An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 104(18):7327–7331, 2007.CrossRef
153.
Zurück zum Zitat M. Rosvall and C. T. Bergstrom. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences, 105(4):1118–1123, 2008.CrossRef M. Rosvall and C. T. Bergstrom. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences, 105(4):1118–1123, 2008.CrossRef
155.
Zurück zum Zitat M. Sales-Pardo, R. Guimera, A. A. Moreira, and L. A. N. Amaral. Extracting the hierarchical organization of complex systems. Proceedings of the National Academy of Sciences, 104(39):15224–15229, 2007.CrossRef M. Sales-Pardo, R. Guimera, A. A. Moreira, and L. A. N. Amaral. Extracting the hierarchical organization of complex systems. Proceedings of the National Academy of Sciences, 104(39):15224–15229, 2007.CrossRef
158.
Zurück zum Zitat E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, volume 8389, 2012. E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, volume 8389, 2012.
161.
Zurück zum Zitat D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef
168.
Zurück zum Zitat W. E. R. Team. Ebola virus disease in west africathe first 9 months of the epidemic and forward projections. N Engl J Med, 371(16):1481–95, 2014.CrossRef W. E. R. Team. Ebola virus disease in west africathe first 9 months of the epidemic and forward projections. N Engl J Med, 371(16):1481–95, 2014.CrossRef
180.
Zurück zum Zitat D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.CrossRef D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.CrossRef
188.
Zurück zum Zitat L. Weng, F. Menczer, and Y.-Y. Ahn. Virality prediction and community structure in social networks. Scientific reports, 3, 2013. L. Weng, F. Menczer, and Y.-Y. Ahn. Virality prediction and community structure in social networks. Scientific reports, 3, 2013.
201.
Zurück zum Zitat K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013. K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013.
208.
Zurück zum Zitat C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on Dependable and Secure Computing, 4(2):105–118, 2007.CrossRef C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on Dependable and Secure Computing, 4(2):105–118, 2007.CrossRef
Metadaten
Titel
Identifying Propagation Source in Large-Scale Networks
verfasst von
Jiaojiao Jiang
Sheng Wen
Shui Yu
Bo Liu
Yang Xiang
Wanlei Zhou
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-02179-5_12