Abstract
This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Agaskar and Y. M. Lu. A fast monte carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013.
R. Albert, I. Albert, and G. L. Nakarado. Structural vulnerability of the north american power grid. Physical review E, 69(2):025103, 2004.
F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 112(11):118701, 2014.
E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. Everyone’s an influencer: Quantifying influence on twitter. In Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, WSDM ’11, pages 65–74, 2011.
D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.
C. H. Comin and L. da Fontoura Costa. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E, 84:056105, Nov 2011.
D. Dagon, C. C. Zou, and W. Lee. Modeling botnet propagation using time zones. In NDSS, volume 6, pages 2–13, 2006.
W. Dong, W. Zhang, and C. W. Tan. Rooting out the rumor culprit from suspects. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 2671–2675. IEEE, 2013.
V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.
M. Fossi and J. Blackbird. Symantec internet security threat report 2010. Technical report, Symantec Corporation, March, 2011.
P. D. Grünwald. The minimum description length principle. MIT press, 2007.
S. L. Hakimi, M. L. Labbé, and E. Schmeichel. The voronoi partition of a network and its implications in location theory. ORSA journal on computing, 4(4):412–417, 1992.
S. Jitesh and A. Jafar. The enron email dataset database schema and brief statistical report. Technical report, University of Southern California, 2009.
N. Karamchandani and M. Franceschetti. Rumor source detection under probabilistic sampling. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 2184–2188, 2013.
B. Karrer and M. E. J. Newman. Message passing approach for general epidemic models. Phys. Rev. E, 82:016101, Jul 2010.
A. Y. Lokhov, M. Mézard, H. Ohta, and L. Zdeborová. Inferring the origin of an epidemy with dynamic message-passing algorithm. arXiv preprint arXiv:1303.5315, 2013.
A. Louni and K. Subbalakshmi. A two-stage algorithm to estimate the source of information diffusion in social media networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, pages 329–333. IEEE, 2014.
W. Luo and W. P. Tay. Finding an infection source under the sis model. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, pages 2930–2934, 2013.
W. Luo, W. P. Tay, and M. Leng. Identifying infection sources and regions in large networks. Signal Processing, IEEE Transactions on, 61(11):2850–2865, 2013.
W. Luo, W. P. Tay, and M. Leng. How to identify an infection source with limited observations. IEEE Journal of Selected Topics in Signal Processing, 8(4):586–597, 2014.
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security and Privacy, 1(4):33–39, July 2003.
P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012.
B. A. Prakash, J. Vreeken, and C. Faloutsos. Spotting culprits in epidemics: How many and which ones? In Proceedings of the 2012 IEEE 12th International Conference on Data Mining, ICDM ’12, pages 11–20, Washington, DC, USA, 2012. IEEE Computer Society.
B. A. Prakash, J. Vreeken, and C. Faloutsos. Efficiently spotting the starting points of an epidemic in a large graph. Knowledge and Information Systems, 38(1):35–59, 2014.
J. G. Restrepo, E. Ott, and B. R. Hunt. Characterizing the dynamical importance of network nodes and links. Phys. Rev. Lett., 97:094102, Sep 2006.
V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter, and H. Zhang. Toward a framework for internet forensic analysis. In ACM HotNets-III, 2004.
E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, volume 8389, 2012.
D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010.
D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.
D. Shah and T. Zaman. Rumor centrality: A universal source detector. SIGMETRICS Perform. Eval. Rev., 40(1):199–210, June 2012.
Y. Wang, S. Wen, Y. Xiang, and W. Zhou. Modeling the propagation of worms in networks: A survey. Communications Surveys Tutorials, IEEE, PP(99):1–19, 2013.
Z. Wang, W. Dong, W. Zhang, and C. W. Tan. Rumor source detection with multiple observations: Fundamental limits and algorithms. In The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’14, pages 1–13. ACM, 2014.
D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998.
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A taxonomy of computer worms. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM ’03, pages 11–18, 2003.
P. Wood and G. Egan. Symantec internet security threat report 2011. Technical report, Symantec Corporation, April, 2012.
Y. Xie, V. Sekar, D. A. Maltz, M. K. Reiter, and H. Zhang. Worm origin identification using random moonwalks. In Security and Privacy, 2005 IEEE Symposium on, pages 242–256. IEEE, 2005.
W. Zang, P. Zhang, C. Zhou, and L. Guo. Discovering multiple diffusion source nodes in social networks. Procedia Computer Science, 29:443–452, 2014.
G.-M. Zhu, H. Yang, R. Yang, J. Ren, B. Li, and Y.-C. Lai. Uncovering evolutionary ages of nodes in complex networks. The European Physical Journal B, 85(3):1–6, 2012.
K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), pages 1–9, 2013.
K. Zhu and L. Ying. A robust information source estimator with sparse observations. Computational Social Networks, 1(1):1, 2014.
Y. Zhu, B. Xu, X. Shi, and Y. Wang. A survey of social-based routing in delay tolerant networks: Positive and negative social effects. Communications Surveys Tutorials, IEEE, 15(1):387–401, Jan 2013.
Z. Zhu, G. Lu, Y. Chen, Z. Fu, P. Roberts, and K. Han. Botnet research survey. In Computer Software and Applications, 2008. COMPSAC ’08. 32nd Annual IEEE International, pages 967–972, July 2008.
C. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pages 138–147, 2002.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jiang, J., Wen, S., Yu, S., Liu, B., Xiang, Y., Zhou, W. (2019). Comparative Study and Numerical Analysis. In: Malicious Attack Propagation and Source Identification. Advances in Information Security, vol 73. Springer, Cham. https://doi.org/10.1007/978-3-030-02179-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-02179-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02178-8
Online ISBN: 978-3-030-02179-5
eBook Packages: Computer ScienceComputer Science (R0)