Abstract
This chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious attacks. Then, we present the maximum-likelihood estimation method adopted by many approaches in this research area. We finally introduce the evaluation metrics for source identification.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
G. Cowan. Statistical data analysis. Oxford university press, 1998.
V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.
D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jiang, J., Wen, S., Yu, S., Liu, B., Xiang, Y., Zhou, W. (2019). Preliminary of Identifying Propagation Sources. In: Malicious Attack Propagation and Source Identification. Advances in Information Security, vol 73. Springer, Cham. https://doi.org/10.1007/978-3-030-02179-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-02179-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02178-8
Online ISBN: 978-3-030-02179-5
eBook Packages: Computer ScienceComputer Science (R0)