Skip to main content

2019 | Buch

Malicious Attack Propagation and Source Identification

verfasst von: Prof. Jiaojiao Jiang, Prof. Sheng Wen, Prof. Bo Liu, Shui Yu, Yang Xiang, Prof. Wanlei Zhou

Verlag: Springer International Publishing

Buchreihe : Advances in Information Security

insite
SUCHEN

Über dieses Buch

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book.

In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world.

The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks.

This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
With the remarkable advances in computer technologies, our social, financial and professional existences become increasingly digitized, and governments, healthcare and military infrastructures rely more on computer technologies.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Malicious Attack Propagation

Frontmatter
Chapter 2. Preliminary of Modeling Malicious Attack Propagation
Abstract
Graphs are usually used to represent networks in different fields such as computer science, biology, and sociology.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Chapter 3. User Influence in the Propagation of Malicious Attacks
Abstract
Networks portray a multitude of interactions through which people meet, ideas are spread, and infectious diseases and malicious rumors propagate within a society. Recently, researchers have found that unsolicited malicious attacks spread extremely fast through influential spreaders. For example, in April 23, 2013, the twitter account of Associated Press was hacked to spread the rumor that explosions at White House injured Obama. This led to both the DOW Jones industrial average and Standard & Poor’s 500 Index plunging about 1% before regaining their losses. Hence, identifying the most efficient ‘spreaders’ in a network becomes an important step towards restraining spread of malicious attacks. In this chapter, we investigate the methods of measuring influence of network nodes.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Chapter 4. Restrain Malicious Attack Propagation
Abstract
Restraining the propagation of malicious attacks in complex networks has long been an important but difficult problem to be addressed. In this chapter, we particularly use rumor propagation as an example to analyze the methods of restraining malicious attack propagation. There are mainly two types of methods: (1) blocking rumors at the most influential users or community bridges, and (2) spreading truths to clarify the rumors. We first compare all the measures of locating influential users. The results suggest that the degree and betweenness measures outperform all the others in real-world networks. Secondly, we analyze the method of the truth clarification method, and find that this method has a long-term performance while the degree measure performs well only in the early stage. Thirdly, in order to leverage these two methods, we further explore the strategy of different methods working together and their equivalence. Given a fixed budget in the real world, our analysis provides a potential solution to find out a better strategy by integrating both kinds of methods together.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Source Identification of Malicious Attack Propagation

Frontmatter
Chapter 5. Preliminary of Identifying Propagation Sources
Abstract
This chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious attacks. Then, we present the maximum-likelihood estimation method adopted by many approaches in this research area. We finally introduce the evaluation metrics for source identification.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Chapter 6. Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator
Abstract
In this chapter, we introduce a propagation source estimator under complete observations: a maximum likelihood source estimator (Rumor Center). According to Chap. 5, a complete observation presents the exact state for each node in the network at certain time t. This type of observation provides comprehensive knowledge of a transient status of the network. Initial research on propagation source identification focused on complete observations, such as Rumor Center, Dynamic Age, Minimum Description Length, etc. Among these methods, Rumor center is a widely used method. Many variations have been proposed based on this method, such as Local Rumor Center, Multiple Rumor Center, etc. Here, we present the details of the Rumor Center estimator. For the techniques involved in other methods under complete observations, readers could refer to Chap. 9 for details.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Chapter 7. Source Identification Under Snapshots: A Sample Path Based Source Estimator
Abstract
In this chapter, we introduce a propagation source estimator under snapshot observations: a sample path based source estimator (Jordan Center). According to Chap. 5, a snapshot provides partial knowledge of network status at a given time t. Many approaches have been proposed to identify propagation sources under snapshot observations, including Jordan Center, Dynamic Message Passing, effective distance based method, etc. Within these methods, Jordan center is a representative one and many variations and improvements have been made based on this method. Here, we present the details of the Jordan Center estimator. For the techniques involved in other methods under snapshot observations, readers could refer to Chap. 9 for details.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Chapter 8. Source Identification Under Sensor Observations: A Gaussian Source Estimator
Abstract
In this chapter, we introduce a propagation source estimator under sensor observations: Gaussian source estimator. According to Chap. 5, sensors are firstly injected into networks, and then the propagation dynamics over these sensor nodes are collected, including their states, state transition time and infection directions. There have been many approaches proposed under sensor observations, including Bayesian based method, Gaussian based method, Moon-Walk based method, etc. Here, we particular present the details of the Bayesian based method. For the techniques involved in other methods, readers could refer to Chap. 9 for details.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Chapter 9. Comparative Study and Numerical Analysis
Abstract
This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Critical Research Issues in Source Identification

Frontmatter
Chapter 10. Identifying Propagation Source in Time-Varying Networks
Abstract
Identifying the propagation sources of malicious attacks in complex networks plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However, the temporal variation in the topology of the underlying networks and the ongoing dynamic processes challenge our traditional source identification techniques which are considered in static networks. In this chapter, we introduce an effective approach used in criminology to overcome the challenges. For simplicity, we use rumor source identification to present the approach.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Chapter 11. Identifying Multiple Propagation Sources
Abstract
The global diffusion of epidemics, computer viruses and rumors causes great damage to our society. One critical issue to identify the multiple diffusion sources so as to timely quarantine them. However, most methods proposed so far are unsuitable for diffusion with multiple sources because of the high computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce an effective method to identify multiple diffusion sources, which can address three main issues in this area: (1) How many sources are there? (2) Where did the diffusion emerge? (3) When did the diffusion break out? For simplicity, we use rumor source identification to present the approach.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Chapter 12. Identifying Propagation Source in Large-Scale Networks
Abstract
The global diffusion of epidemics, rumors and computer viruses causes great damage to our society. It is critical to identify the diffusion sources and promptly quarantine them. However, one critical issue of current methods is that they are far are unsuitable for large-scale networks due to the computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce a community structure based approach to efficiently identify diffusion sources in large networks.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Chapter 13. Future Directions and Conclusion
Abstract
While previous chapters provide a thorough description on malicious attack propagation and source identification, many interesting and promising issues remain unexplored. The development of online social networks provides great opportunities for research on restraining malicious attacks and identifying attack sources, but also presents a challenge in effective utilization of the large volume of data. There are still other topics that need to be considered in malicious attack propagation and source identification, and we consider a few directions that are worthy of future attention.
Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
Backmatter
Metadaten
Titel
Malicious Attack Propagation and Source Identification
verfasst von
Prof. Jiaojiao Jiang
Prof. Sheng Wen
Prof. Bo Liu
Shui Yu
Yang Xiang
Prof. Wanlei Zhou
Copyright-Jahr
2019
Electronic ISBN
978-3-030-02179-5
Print ISBN
978-3-030-02178-8
DOI
https://doi.org/10.1007/978-3-030-02179-5