Abstract
Witnessing the wide spread of malicious information in large networks, we develop an efficient method to detect anomalous diffusion sources and thus protect networks from security and privacy attacks. To date, most existing work on diffusion sources detection are based on the assumption that network snapshots that reflect information diffusion can be obtained continuously. However, obtaining snapshots of an entire network needs to deploy detectors on all network nodes and thus is very expensive. Alternatively, in this article, we study the diffusion sources locating problem by learning from information diffusion data collected from only a small subset of network nodes. Specifically, we present a new regression learning model that can detect anomalous diffusion sources by jointly solving five challenges, that is, unknown number of source nodes, few activated detectors, unknown initial propagation time, uncertain propagation path and uncertain propagation time delay. We theoretically analyze the strength of the model and derive performance bounds. We empirically test and compare the model using both synthetic and real-world networks to demonstrate its performance.
- Fabrizio Altarelli, Alfredo Braunstein, Luca Dall'Asta, Alejandro Lage-Castellanos, and Riccardo Zecchina. 2013. Bayesian inference of epidemics on networks via belief propagation. Physical Review Letters 112, 11 (2014), 118701.Google Scholar
Cross Ref
- R. M. Anderson and R. M. May. 1991. Infectious Diseases of Humans. Oxford University Press.Google Scholar
- N. Antulov-Fantulin, A. Lancic, H. Stefancic, M. Sikic, and T. Smuc. 2013. Statistical inference framework for source detection of contagion processes on arbitrary network structures. Proc. of IEEE SASOW. 78--83. Google Scholar
Digital Library
- Norman T. J. Bailey. 1975. The Mathematical Theory of Infectious Diseases and Its Applications. Charles Griffin & Company Ltd, Glasgow, Scotland.Google Scholar
- Albert-László Barabási and Réka Albert. 1999. Emergence of scaling in random networks. Science 286, 5439 (1999), 509--512.Google Scholar
- Jonathan Berry, William E. Hart, Cynthia A. Phillips, James G. Uber, and Jean-Paul Watson. 2006. Sensor placement in municipal water networks with temporal integer programming models. Journal of Water Resources Planning and Management 132, 4 (2006), 218--224.Google Scholar
Cross Ref
- C. Bishop. 2007. Pattern Recognition and Machine Learning. Springer.Google Scholar
- B. Bollobs. 2001. Random Graphs. Cambridge University Press.Google Scholar
- Stephen Boyd, Neal Parikh, Eric Chu, Borja Peleato, and Jonathan Eckstein. 2011. Distributed optimization and statistical learning via the alternating direction method of multipliers. Foundations and Trends® in Machine Learning 3, 1 (2011), 1--122. Google Scholar
Digital Library
- Stephen Boyd and Lieven Vandenberghe. 2004. Convex Optimization. Cambridge University Press. Google Scholar
Digital Library
- C. Budak, D. Agrawal, and E. Abbadi. Limiting the spread of misinformation in social networks. In Proc. of WWW 2011. 665--674. Google Scholar
Digital Library
- O. Chapelle, B. Scholkopf, and A. Zien. 2006. Semi-Supervised Leanring. MIT Press, Cambridge, MA. Google Scholar
Digital Library
- W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proc. of KDD 2009. 199--208. Google Scholar
Digital Library
- Nicholas Christakis and James Fowler. 2010. Social network sensors for early detection of contagious outbreaks. PloS ONE 5, 9, 1--8.Google Scholar
Cross Ref
- Reuven Cohen, Shlomo Havlin, and Daniel Ben-Avraham. 2003. Efficient immunization strategies for computer networks and populations. Physical Review Letters 91, 24, 247901.Google Scholar
Cross Ref
- C. Comin and L. Costa. 2011. Identifying the starting point of a spreading process in complex networks. Physical Review Letters E 84, 5 (2011), 056105.Google Scholar
Cross Ref
- N. Du, Y. Liang, M. Balcan, and L. Song. 2014. Influence function learning in information diffusion networks. In Proc. of ICML 2014. 2016--2024.Google Scholar
- N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. 2013. Scalable influence estimation in continuous-time diffusion networks. In Proc. of NIPS 2013. 3147--3155.Google Scholar
- A. Ganesh, L. Massoulie, and D. F. Towsley. 2005. The effect of network topology on the spread of epidemics. In Proc. of INFOCOM 2005. 1455--1466.Google Scholar
- M. Gomez-Rodriguez, D. Balduzzi, and B. Scholkopf. 2011. Uncovering the temporal dynamics of diffusion networks. In Proc. of ICML 2011. 561--568.Google Scholar
- A. Goyal, W. Lu, and L. Lakshmanan. 2011. CELF++: Optimizing the greedy algorithm for influence maximization in social networks. In Proc. of WWW 2011. 47--48. Google Scholar
Digital Library
- J. Guo, P. Zhang, C. Zhou, Y. Cao, and L. Guo. 2013. Personalized influence maximization on social networks. In Proc. of CIKM 2013. 199--208. Google Scholar
Digital Library
- N. Karamchandani and M. Franceschetti. 2013. Rumor source detection under probabilistic sampling. In Proc. of ISIT 2013. 2184--2188.Google Scholar
- D. Kempe, J. Kleinberg, and E. Tardos. 2003. Maximizing the spread of influence through a social network. In Proc. of KDD 2003. 137--146. Google Scholar
Digital Library
- M. Kimura, K. Saito, and H. Motoda. 2008. Minimizing the spread of contamination by blocking links in a network. In Proc. of AAAI 2008. 1175--1180. Google Scholar
Digital Library
- M. Kitsak and et al. 2010. Identification of influential spreaders in complex networks. Nature Physics 6, 11 (2010), 888--893.Google Scholar
Cross Ref
- Jan Kostka, Yvonne Anne Oswald, and Roger Wattenhofer. 2008. Word of mouth: Rumor dissemination in social networks. Structural Information and Communication Complexity. 185--196. Google Scholar
Digital Library
- Andreas Krause and Carlos Guestrin. 2009. Optimizing Sensing: From Water to the Web. Technical Report. Machine Learning Dept., Carnegie-Mellon University, Pittsburgh, PA.Google Scholar
- T. Lappas, E. Terzi, D. Gunopulos, and MannilaH. 2010. Finding effectors in social networks. In Proc. of KDD 2010. 1059--1068. Google Scholar
Digital Library
- J. Leskovec, J. Kleinberg, and C. Faloutsos. 2005. Graphs over time: Densification laws, shrinking diameters and possible explanations. In Proc. of KDD 2005. 177--187. Google Scholar
Digital Library
- Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In Proc. of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 420--429. Google Scholar
Digital Library
- Rong-Hua Li, Jeffrey Xu Yu, Xin Huang, and Hong Cheng. 2014. Random-walk domination in large graphs. In Proc. of the 30th IEEE International Conference on Data Engineering. IEEE, 736--747.Google Scholar
Cross Ref
- A. Lokhov. 2014. Inferring the origin of an epidemy with dynamic message-passing algorithm. Physical Review E 90, 1 (2014), 012801.Google Scholar
Cross Ref
- W. Luo, W. Tay, and M. Leng. 2014. How to identify an infection source with limited observations. IEEE Journal of Selected Topics in Signal Processing 8, 4 (2014), 586--597.Google Scholar
Cross Ref
- C. Milling, C. Caramanis, S. Mannor, and S. Shakkottai. 2012. Network forensics: Random infection vs spreading epidemic. In Proc. of ACM SIGMETRICS, 2012. 223--234. Google Scholar
Digital Library
- Romualdo Pastor-Satorras and Alessandro Vespignani. 2002. Immunization of complex networks. Physical Review E 65, 3 (2002), 036104.Google Scholar
Cross Ref
- P. Pinto, P. Thiran, and M. Vetterli. 2012. Locating the source of diffusion in large-scale networks. Physical Review Letters 109, 6 (2012), 068702.Google Scholar
Cross Ref
- B. Prakash, J. Vreeken, and C. Faloutsos. 2012. Spotting culprits in epidemics: How many and which ones? In Proc. of ICDM 2012. 11--20. Google Scholar
Digital Library
- B. Aditya Prakash, Jilles Vreeken, and Christos Faloutsos. 2014. Efficiently spotting the starting points of an epidemic in a large graph. Knowledge and Information Systems 38, 1, 35--59.Google Scholar
Cross Ref
- Z. Qiao, P. Zhang, J. He, Y. Cao, C. Zhou, and L. Guo. 2014. Combining geographical information of users and content of items for accurate rating prediction. In Proc. of WWW 2014. 361--362. Google Scholar
Digital Library
- M. Rodriguez, D. Balduzzi, and B. Scholkopf. 2011. Uncovering the temporal dynamics of diffusion networks. In Proc. of ICML 2011. 561--568.Google Scholar
- D. Shah and T. Zaman. 2011. Rumors in a network: who is the culprit? IEEE Transactions on Information Technology 57, 8, 5163--5181. Google Scholar
Digital Library
- G. Stringhini, C. Kruegel, and G. Vigna. 2010. Detecting spammers on social networks. In Proc. of ACSAC 2010. 1--9. Google Scholar
Digital Library
- H. Tong, B. Prakash, C. Tsourakakis, T. Eliassi-Rad, C. Faloutsos, and D. Chau. 2010. On the vulnerability of large graphs. In Proc. of ICDM 2010. 1091--1096. Google Scholar
Digital Library
- C. Wang, J. C. Knight, and M. C. Elder. 2000. On computer viral infection and the effect of immunization. In Proc. of ACSAC 2000. 246--256. Google Scholar
Digital Library
- D. Watts and S. Strogatz. 1998. Collective dynamics of small-world networks. Nature 393, 6684 (1998), 440--442.Google Scholar
- C. Zhou, P. Zhang, J. Guo, X. Zhu, and L. Guo. 2013. UBLF: An upper bound based approach to discover influential nodes in social networks. In Proc. of ICDM 2013. 907--916.Google Scholar
- G. Zhu, H. J. Yang, R. Yang, J. Ren, B. Li, and Y. C. Lai. Information source detection in the sir model: A sample path based approach. In arxiv.org/abs/1206.5421, 2013.Google Scholar
- K. Zhu and L. Ying. 2013. Information source detection in the sir model: A sample path based approach. IEEE ITA (2013), 1--9.Google Scholar
Index Terms
Towards Anomalous Diffusion Sources Detection in a Large Network
Recommendations
Anomalous information diffusion in social networks: Twitter and Digg
Highlights- A new characteristic of diffusion type in social networks is introduced.
- ...
AbstractDiffusion is an important phenomenon in different sciences like epidemiology, economy, biology and social sciences. Information diffusion is mainly important for two reasons, to study and forecast diffusion growth and to find the ...
Graphical abstractDisplay Omitted
Characteristics Estimation of Information Sources by Information Diffusion Analysis
WI-IAT '10: Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01This paper presents a novel method to estimate characteristics of information sources about a topic by analyzing their information diffusion subnetworks in blogspace. In an information diffusion network, each influential information source has an ...
Fractional order NMR reflects anomalous diffusion
ETFA'09: Proceedings of the 14th IEEE international conference on Emerging technologies & factory automationRecently, we proposed a new diffusion model in nuclear magnetic resonance (NMR) by solving the Bloch-Torrey equation using fractional order calculus with respect to time and space (Magin, RL, et al, J Magn Reson 2008; 190:255-270). This model yields a ...








Comments