Estimating Infection Sources in Networks Using Partial Timestamps

被引:46
作者
Tang, Wenchang [1 ]
Ji, Feng [1 ]
Tay, Wee Peng [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Infection source; rumor source; single source estimation; multiple sources estimation; diffusion process; infection timestamps; Gromov product; DIFFUSION; EMERGENCE;
D O I
10.1109/TIFS.2018.2837655
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of identifying infection sources in a network based on the network topology, and a subset of infection timestamps. In the case of a single infection source in a tree network, we derive the maximum likelihood estimator of the source and the unknown diffusion parameters. We then introduce a new heuristic involving an optimization over a parametrized family of Gromov matrices to develop a single source estimation algorithm for general graphs. Compared with the breadth-first search tree heuristic commonly adopted in the literature, simulations demonstrate that our approach achieves better estimation accuracy than several other benchmark algorithms, even though these require more information like the diffusion parameters. We next develop a multiple sources estimation algorithm for general graphs, which first partitions the graph into source candidate clusters, and then applies our single source estimation algorithm to each cluster. We show that if the graph is a tree, then each source candidate cluster contains at least one source. Simulations using synthetic and real networks, and experiments using real-world data suggest that our proposed algorithms are able to estimate the true infection source(s) to within a small number of hops with a small portion of the infection timestamps being observed.
引用
收藏
页码:3035 / 3049
页数:15
相关论文
共 50 条
[1]   Bayesian Inference of Epidemics on Networks via Belief Propagation [J].
Altarelli, Fabrizio ;
Braunstein, Alfredo ;
Dall'Asta, Luca ;
Lage-Castellanos, Alejandro ;
Zecchina, Riccardo .
PHYSICAL REVIEW LETTERS, 2014, 112 (11)
[2]  
[Anonymous], 2014, Appl. Math. Sci., DOI DOI 10.12988/AMS.2014.49693
[3]  
[Anonymous], 2015, DATA MINING KNOWLEDG
[4]  
[Anonymous], 2006, Proceedings of 12th International Conference on Knowledge Discovery in Data Mining
[5]  
Anthe C., 2015, Microsoft Security Intelligence Report January-June 2015
[6]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[7]  
Barth B., 2016, SC MEDIA NOV
[8]  
Berghel H, 2001, COMMUN ACM, V44, P15, DOI 10.1145/381641.381648
[9]   The Anatomy of a Scientific Rumor [J].
De Domenico, M. ;
Lima, A. ;
Mougel, P. ;
Musolesi, M. .
SCIENTIFIC REPORTS, 2013, 3
[10]  
Erd??s P., 1959, PUBL MATH-DEBRECEN, V6, P290