Malicious Attack Propagation and Source Identification by Jiaojiao Jiang & Sheng Wen & Bo Liu & Shui Yu & Yang Xiang & Wanlei Zhou

Malicious Attack Propagation and Source Identification by Jiaojiao Jiang & Sheng Wen & Bo Liu & Shui Yu & Yang Xiang & Wanlei Zhou

Author:Jiaojiao Jiang & Sheng Wen & Bo Liu & Shui Yu & Yang Xiang & Wanlei Zhou
Language: eng
Format: epub
ISBN: 9783030021795
Publisher: Springer International Publishing


9.1.2 Methods Based on Snapshots

In the real world, a complete observation of an entire network is hardly possible, especially for large-scale networks. Snapshots are observations closer to reality. It only provides partial knowledge of a propagation in networks. There are three techniques of source identification developed on snapshot: Jordan center, message passing and concentricity based methods (see the taxonomy in Fig. 9.1).

9.1.2.1 Jordan Center

Zhu and Ying [201] proposed the Jordan center method for rumor source identification. They assumed rumor propagated in tree-like networks and the propagation followed SIR model. All infected nodes were given, but the susceptible nodes and recovered nodes were indistinguishable. This method was proposed for single source propagation. Zhu and Ying [201] proposed a sample path based approach to identify the propagation source. An optimal sample path was the one which most likely leaded to the observed snapshot of a network. The source associated with the optimal sample path was proven to be the Jordan center of the infection graph. Jordan center was then considered as the rumor source.

Zhu and Ying [202] further extended the sample path based approach to the heterogeneous SIR model. Heterogeneous SIR model means the infection probabilities between any two neighboring nodes are different, and the recovery probabilities of infected nodes differ from each other. They proved that on infinite trees, the source node associated with the optimal sample path was also the Jordan center. Moreover, Luo et al. [114, 116] investigated the sample path based approach in the SI and SIS models. They obtained the same conclusion as in the SIR model.

Similar to rumor center based methods, the Jordan center method is considered on infinite tree-like networks which are far away from real-world networks.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.