Skip to main content

Identifying Propagation Source in Large-Scale Networks

  • Chapter
  • First Online:
Malicious Attack Propagation and Source Identification

Part of the book series: Advances in Information Security ((ADIS,volume 73))

  • 589 Accesses

Abstract

The global diffusion of epidemics, rumors and computer viruses causes great damage to our society. It is critical to identify the diffusion sources and promptly quarantine them. However, one critical issue of current methods is that they are far are unsuitable for large-scale networks due to the computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce a community structure based approach to efficiently identify diffusion sources in large networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Agaskar and Y. M. Lu. A fast monte carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013.

    Google Scholar 

  2. Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann. Link communities reveal multiscale complexity in networks. Nature, 466(7307):761–764, 2010.

    Article  Google Scholar 

  3. F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 112(11):118701, 2014.

    Google Scholar 

  4. L. A. N. Amaral, A. Scala, M. Barthelemy, and H. E. Stanley. Classes of small-world networks. Proceedings of the National Academy of Sciences, 97(21):11149–11152, 2000.

    Article  Google Scholar 

  5. R. M. Anderson, R. M. May, and B. Anderson. Infectious diseases of humans: dynamics and control, volume 28. Wiley Online Library, 1992.

    Google Scholar 

  6. A. Beuhring and K. Salous. Beyond blacklisting: Cyberdefense in the era of advanced persistent threats. Security & Privacy, IEEE, 12(5):90–93, 2014.

    Article  Google Scholar 

  7. V. Blue. Cryptolocker’s crimewave: A trail of millions in laundered bitcoin.[en línea] 22 de diciembre de 2013.[citado el: 22 de enero de 2014.].

    Google Scholar 

  8. D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.

    Article  Google Scholar 

  9. C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011.

    Google Scholar 

  10. M. Conover, J. Ratkiewicz, M. Francisco, B. Gonçalves, F. Menczer, and A. Flammini. Political polarization on twitter. In ICWSM, 2011.

    Google Scholar 

  11. B. Doerr, M. Fouz, and T. Friedrich. Why rumors spread so quickly in social networks. Commun. ACM, 55(6):70–75, June 2012.

    Article  Google Scholar 

  12. V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.

    Article  Google Scholar 

  13. C. Fraser, C. A. Donnelly, S. Cauchemez, W. P. Hanage, M. D. Van Kerkhove, T. D. Hollingsworth, J. Griffin, R. F. Baggaley, H. E. Jenkins, E. J. Lyons, et al. Pandemic potential of a strain of influenza a (h1n1): early findings. science, 324(5934):1557–1561, 2009.

    Article  Google Scholar 

  14. M. L. Fredman and R. E. Tarjan. Fibonacci heaps and their uses in improved network optimization algorithms. Journal of the ACM (JACM), 34(3):596–615, 1987.

    Article  MathSciNet  Google Scholar 

  15. M. Girvan and M. E. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821–7826, 2002.

    Article  MathSciNet  Google Scholar 

  16. H. Jeong, S. P. Mason, A. L. Barabasi, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, May 2001.

    Article  Google Scholar 

  17. J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communications Surveys and Tutorials, accepted, in press.

    Google Scholar 

  18. I. Lawrence and K. Lin. A concordance correlation coefficient to evaluate reproducibility. Biometrics, pages 255–268, 1989.

    Google Scholar 

  19. M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005.

    Article  Google Scholar 

  20. N. P. Nguyen, T. N. Dinh, S. Tokala, and M. T. Thai. Overlapping communities in dynamic networks: their detection and mobile applications. In Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom ’11, pages 85–96. ACM, 2011.

    Google Scholar 

  21. G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043):814–818, 2005.

    Article  Google Scholar 

  22. G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435:814–818, 2005.

    Article  Google Scholar 

  23. C. Pash. The lure of naked hollywood star photos sent the internet into meltdown in new zealand. Business Insider Australia, September 7 2014, 4:21 PM.

    Google Scholar 

  24. P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012.

    Google Scholar 

  25. M. Rosvall and C. T. Bergstrom. An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 104(18):7327–7331, 2007.

    Article  Google Scholar 

  26. M. Rosvall and C. T. Bergstrom. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences, 105(4):1118–1123, 2008.

    Article  Google Scholar 

  27. M. Sales-Pardo, R. Guimera, A. A. Moreira, and L. A. N. Amaral. Extracting the hierarchical organization of complex systems. Proceedings of the National Academy of Sciences, 104(39):15224–15229, 2007.

    Article  Google Scholar 

  28. E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, volume 8389, 2012.

    Google Scholar 

  29. D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.

    Article  MathSciNet  Google Scholar 

  30. W. E. R. Team. Ebola virus disease in west africathe first 9 months of the epidemic and forward projections. N Engl J Med, 371(16):1481–95, 2014.

    Article  Google Scholar 

  31. D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.

    Article  Google Scholar 

  32. L. Weng, F. Menczer, and Y.-Y. Ahn. Virality prediction and community structure in social networks. Scientific reports, 3, 2013.

    Google Scholar 

  33. K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013.

    Google Scholar 

  34. C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on Dependable and Secure Computing, 4(2):105–118, 2007.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jiang, J., Wen, S., Yu, S., Liu, B., Xiang, Y., Zhou, W. (2019). Identifying Propagation Source in Large-Scale Networks. In: Malicious Attack Propagation and Source Identification. Advances in Information Security, vol 73. Springer, Cham. https://doi.org/10.1007/978-3-030-02179-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02179-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02178-8

  • Online ISBN: 978-3-030-02179-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics