Skip to main content

Preliminary of Identifying Propagation Sources

  • Chapter
  • First Online:
  • 556 Accesses

Part of the book series: Advances in Information Security ((ADIS,volume 73))

Abstract

This chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious attacks. Then, we present the maximum-likelihood estimation method adopted by many approaches in this research area. We finally introduce the evaluation metrics for source identification.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. G. Cowan. Statistical data analysis. Oxford university press, 1998.

    Google Scholar 

  2. V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.

    Article  Google Scholar 

  3. D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jiang, J., Wen, S., Yu, S., Liu, B., Xiang, Y., Zhou, W. (2019). Preliminary of Identifying Propagation Sources. In: Malicious Attack Propagation and Source Identification. Advances in Information Security, vol 73. Springer, Cham. https://doi.org/10.1007/978-3-030-02179-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02179-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02178-8

  • Online ISBN: 978-3-030-02179-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics