Browse > Article
http://dx.doi.org/10.3745/KTSDE.2019.8.7.275

Estimating the Rumor Source by Rumor Centrality Based Query in Networks  

Choi, Jaeyoung (호남대학교 미래자동차공학부)
Publication Information
KIPS Transactions on Software and Data Engineering / v.8, no.7, 2019 , pp. 275-288 More about this Journal
Abstract
In this paper, we consider a rumor source inference problem when sufficiently many nodes heard the rumor in the network. This is an important problem because information spread in networks is fast in many real-world phenomena such as diffusion of a new technology, computer virus/spam infection in the internet, and tweeting and retweeting of popular topics and some of this information is harmful to other nodes. This problem has been much studied, where it has been shown that the detection probability cannot be beyond 31% even for regular trees if the number of infected nodes is sufficiently large. Motivated by this, we study the impact of query that is asking some additional question to the candidate nodes of the source and propose budget assignment algorithms of a query when the network administrator has a finite budget. We perform various simulations for the proposed method and obtain the detection probability that outperforms to the existing prior works.
Keywords
Rumor Source Detection; Epidemic Models; Maximum Likelihood Estimator; Query;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Shah and T. Zaman. Detecting Sources of Computer Viruses in Networks: Theory and Experiment. In Proceedings of ACM SIGMETRICS, 2010.
2 J. Choi, S. Moon, J. Woo, K. Son, J. Shin, and Y. Yi. Rumor, "Source Detection under Querying with Untruthful Answers. In Proceedings of IEEE INFOCOM, 2017.
3 J. Choi and Y. Yi, "Necessary and Sufficient Budgets in Information Source Finding with Querying: Adaptivity Gap," in Proceedings of IEEE ISIT, 2018.
4 W. Dong, W. Zhang, and C. W. Tan, "Rooting Out the Rumor Culprit from Suspects." in Proceedings of IEEE International Symposium on Information Theory (ISIT), 2013.
5 Z. Wang, W. Dong, W. Zhang, and C. W. Tan, "Rumor Source Detection with Multiple Observations: Fundamental Limits and Algorithms," in Proceedings, ACM SIGMETRICS, 2014.
6 J. Choi, S. Moon, J. Shin, and Y. Yi, "Estimating the Rumor Source with Anti-Rumor in Social Networks," in Proceedings of IEEE ICNP Workshop on Machine Learning, 2016.
7 G. Fanti, P. Kairouz, S. Oh, and P. Viswanath, "Spy vs. Spy: Rumor Source bfuscation," in Proceedings of ACM SIGMETRICS, 2015.
8 G. Fanti, P. Kairouz, S. Oh, K. Ramchandran, and P. Viswanath, "Rumor ource Obfuscation on Irregular Trees," in Proceedings of ACM SIGMETRICS, 2016.
9 G. Fanti, P. Kairouz, S. Oh, K. Ramchandran, and P. Viswanath, "Metadata-conscious Anonymous Messaging," in Proceedings of ICML, 2016.
10 W. Luo, W. P. Tay and M. Leng, Infection Sprading and Source Identification: A Hide and Seek Game. IEEE Transaction on Signal Processing, Vol. 64, No. 16, AUGUST 15, 2016.
11 J. Jaing, S. Wen, S. Yu, Y. Xiang, and W. Zhou, "K-Center: An Approach on the Multi-Source Identification of Information Diffusion," IEEE Transactions on Information Forensics and Security, Vol.10, pp.2616-2626, 2015.   DOI
12 F. Ji and W. P. Tay, "An Algorithmic Framework for Estimating Rumor Sources With Different Start Times," IEEE Transactions on Signal Processing, Vol.65, pp. 2517-2530, 2017.   DOI
13 Z. Wang, C. Wang, J. Pei, and X. Ye, "Multiple Source Detection without Knowing the Underlying Propagation Model," in Proceedings of AAAI, 2017.
14 W. Luo, W. P. Tay, and M. Leng, "How to Identify an Infection Source With Limited Observations," IEEE Journal of Selected Topics in Signal Processing, Voi.8, No.4, pp. 586-597, 2014.   DOI
15 K. Zhu and L. Ying, "Information Source Detection in Networks: Possibility and Impossibility Results," IEEE INFOCOM, 2017.
16 B. Chang, F. Zhu, E. Chen, and Q. Liu, "Information source detection via Maximum A Postreia Estimation,?" in Proceedings of IEEE ICDM, 2015.
17 J. Leskovec and J. McAuley, "Learning to Discover Social Circles in Ego Networks," in Proceedings of NIPS, 2012.