Information source detection in the SIR model: A sample path based approach

This paper studies the problem of detecting the information source in a network in which the spread of information follows the popular Susceptible-Infected-Recovered (SIR) model. We assume all nodes in the network are in the susceptible state initially, except one single information source that is in the infected state. Susceptible nodes may then be infected by infected nodes, and infected nodes may recover and will not be infected again after recovery. Given a snapshot of the network, from which we know the graph topology and all infected nodes but cannot distinguish susceptible nodes and recovered nodes, the problem is to find the information source based on the snapshot and the network topology. We develop a sample-path-based approach where the estimator of the information source is chosen to be the root node associated with the sample path that most likely leads to the observed snapshot. We prove for infinite-trees, the estimator is a node that minimizes the maximum distance to the infected nodes. A reverse-infection algorithm is proposed to find such an estimator in general graphs. We prove that for g+1-regular trees such that gq > 1, where g+1 is the node degree and q is the infection probability, the estimator is within a constant distance from the actual source with a high probability, independent of the number of infected nodes and the time the snapshot is taken. Our simulation results show that for tree networks, the estimator produced by the reverse-infection algorithm is closer to the actual source than the one identified by the closeness centrality heuristic. We then further evaluate the performance of the reverse infection algorithm on several real-world networks.

[1]  Frank Harary,et al.  Graph Theory , 2016 .

[2]  Alexander Grey,et al.  The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .

[3]  N. Ling The Mathematical Theory of Infectious Diseases and its applications , 1978 .

[4]  M. Newman,et al.  Epidemics and percolation in small-world networks. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[5]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[6]  Alessandro Vespignani,et al.  EPIDEMIC SPREADING IN SCALEFREE NETWORKS , 2001 .

[7]  M. Newman Spread of epidemic disease on networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[8]  Stefan Richter,et al.  Centrality Indices , 2004, Network Analysis.

[9]  Eli Upfal,et al.  Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .

[10]  Donald F. Towsley,et al.  The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[11]  A. Lambert Branching Processes: Variation, Growth and Extinction of Populations , 2006 .

[12]  E. Todeva Networks , 2007 .

[13]  E. David,et al.  Networks, Crowds, and Markets: Reasoning about a Highly Connected World , 2010 .

[14]  Devavrat Shah,et al.  Detecting sources of computer viruses in networks: theory and experiment , 2010, SIGMETRICS '10.

[15]  Paulo Shakarian,et al.  Geospatial Abduction: Principles and Practice , 2011 .

[16]  Paulo Shakarian,et al.  GAPs: Geospatial Abduction Problems , 2011, TIST.

[17]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[18]  D. Shah,et al.  Finding Rumor Sources on Random Graphs , 2012 .

[19]  Randall Berry,et al.  Spotting trendsetters: Inference for network games , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[20]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.

[21]  Wuqiong Luo,et al.  Identifying multiple infection sources in a network , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[22]  Christos Faloutsos,et al.  Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.

[23]  Shie Mannor,et al.  Network forensics: random infection vs spreading epidemic , 2012, SIGMETRICS '12.

[24]  Chris Arney,et al.  Networks, Crowds, and Markets: Reasoning about a Highly Connected World (Easley, D. and Kleinberg, J.; 2010) [Book Review] , 2013, IEEE Technology and Society Magazine.

[25]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2013, ITA.

[26]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.