Malicious Attack Propagation and Source Identification by Jiaojiao Jiang & Sheng Wen & Bo Liu & Shui Yu & Yang Xiang & Wanlei Zhou
Author:Jiaojiao Jiang & Sheng Wen & Bo Liu & Shui Yu & Yang Xiang & Wanlei Zhou
Language: eng
Format: epub
ISBN: 9783030021795
Publisher: Springer International Publishing
9.1.2 Methods Based on Snapshots
In the real world, a complete observation of an entire network is hardly possible, especially for large-scale networks. Snapshots are observations closer to reality. It only provides partial knowledge of a propagation in networks. There are three techniques of source identification developed on snapshot: Jordan center, message passing and concentricity based methods (see the taxonomy in Fig. 9.1).
9.1.2.1 Jordan Center
Zhu and Ying [201] proposed the Jordan center method for rumor source identification. They assumed rumor propagated in tree-like networks and the propagation followed SIR model. All infected nodes were given, but the susceptible nodes and recovered nodes were indistinguishable. This method was proposed for single source propagation. Zhu and Ying [201] proposed a sample path based approach to identify the propagation source. An optimal sample path was the one which most likely leaded to the observed snapshot of a network. The source associated with the optimal sample path was proven to be the Jordan center of the infection graph. Jordan center was then considered as the rumor source.
Zhu and Ying [202] further extended the sample path based approach to the heterogeneous SIR model. Heterogeneous SIR model means the infection probabilities between any two neighboring nodes are different, and the recovery probabilities of infected nodes differ from each other. They proved that on infinite trees, the source node associated with the optimal sample path was also the Jordan center. Moreover, Luo et al. [114, 116] investigated the sample path based approach in the SI and SIS models. They obtained the same conclusion as in the SIR model.
Similar to rumor center based methods, the Jordan center method is considered on infinite tree-like networks which are far away from real-world networks.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Linux Device Driver Development Cookbook by Rodolfo Giometti(3957)
Embedded Programming with Modern C++ Cookbook by Igor Viarheichyk(3784)
Implementing Cellular IoT Solutions for Digital Transformation by Dennis McCain(3704)
Embedded Linux Development Using Yocto Project - Third Edition by Otavio Salvador & Daiane Angolini(3553)
TinyML Cookbook by Gian Marco Iodice(3471)
Simplifying 3D Printing with OpenSCAD by Colin Dow(2861)
TinyML Cookbook by Gian Marco Iodice & Ronan Naughton(2623)
Fusion 360 for Makers by Lydia Sloan Cline(2231)
Networking A Beginner's Guide by Bruce Hallberg(2228)
Hands-On Linux for Architects by Denis Salamanca(2073)
But How Do It Know? by J. Clark Scott(2039)
Computers For Seniors For Dummies by Nancy C. Muir(2023)
Raspberry Pi and MQTT Essentials by Dhairya Parikh(1980)
Arduino Project Handbook, Volume 2: 25 Simple Electronics Projects for Beginners by Geddes Mark(1963)
9781803246888-ENHANCING DEEP LEARNING WITH BAYESIAN INFERENCE by Unknown(1918)
Hack and HHVM by Owen Yamauchi(1904)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1878)
MicroPython Projects by Jacob Beningo(1768)
Hands-On Internet of Things with MQTT by Tim Pulver(1730)
