Rooting out the rumor culprit from suspects

Suppose that a rumor originating from a single source among a set of suspects spreads in a network, how to root out this rumor source? With the a priori knowledge of suspect nodes and a snapshot observation of infected nodes, we construct a maximum a posteriori (MAP) estimator to identify the rumor source using the susceptible-infected (SI) model. We propose to use a notion of local rumor center to characterize P<sub>c</sub>(n), the correct detection probability of the source estimator upon observing n infected nodes, in both the finite and asymptotic regimes, for regular trees of node degree δ. First, when all nodes are suspects, lim<sub>n→∞</sub>P<sub>c</sub>(n) grows from 0.25 to 0.307 as δ increases from three to infinity, a result first established in Shah and Zaman (2011, 2012) via a different approach; furthermore, P<sub>c</sub>(n) monotonically decreases with n and increases with δ even in the finite-n regime. Second, when the suspect nodes form a connected subgraph of the network, lim<sub>n→∞</sub>P<sub>c</sub>(n) significantly exceeds the a priori probability if δ ≥ 3, and reliable detection is achieved as δ becomes sufficiently large; furthermore, P<sub>c</sub>(n) monotonically decreases with n and increases with δ. Third, when there are only two suspect nodes, lim<sub>n→∞</sub>P<sub>c</sub>(n) is at least 0.75 if δ ≥ 3; and P<sub>c</sub>(n) increases with the distance between the two suspects. Fourth, when there are multiple suspect nodes, among all possible connection patterns, that all the suspects form a single connected subgraph yields the smallest P<sub>c</sub>(n). Our analysis leverages ideas from the Pólya's urn model in probability theory and sheds insight into the behavior of the rumor spreading process not only in the asymptotic regime but also for the general finite-n regime.

[1]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2013, ITA.

[2]  Gavin J. Gibson,et al.  Statistical inference for stochastic epidemic models , 2002 .

[3]  Tadashi Dohi,et al.  Statistical Inference of Computer Virus Propagation Using Non-Homogeneous Poisson Processes , 2007, The 18th IEEE International Symposium on Software Reliability (ISSRE '07).

[4]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[5]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[6]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[7]  M. Newman,et al.  Epidemics and percolation in small-world networks. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[8]  D. Shah,et al.  Finding Rumor Sources on Random Graphs , 2012 .

[9]  Hans J Herrmann,et al.  Spreading gossip in social networks. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[11]  N. L. Johnson,et al.  Urn models and their application : an approach to modern discrete probability theory , 1978 .

[12]  Alexander Grey,et al.  The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .

[13]  Samuel Kotz,et al.  Urn Models and Their Application: An Approach to Modern Discrete Probability Theory , 1978 .

[14]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[15]  N. Bailey,et al.  The mathematical theory of infectious diseases and its applications. 2nd edition. , 1975 .

[16]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[17]  Guo Wei,et al.  Extracting influential information sources for gossiping , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[18]  M. Newman Spread of epidemic disease on networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[19]  Donald F. Towsley,et al.  The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[20]  Peter Winkler,et al.  Counting linear extensions is #P-complete , 1991, STOC '91.

[21]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.

[22]  Jure Leskovec,et al.  Inferring networks of diffusion and influence , 2010, KDD.

[23]  P. O’Neill,et al.  Bayesian inference for stochastic multitype epidemics in structured populations via random graphs , 2005 .

[24]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..