Rumor restraining based on propagation prediction with limited observations in large-scale social networks

In order to minimize the negative effect of malicious rumors in large-scale OSNs (Online Social Networks), researchers have proposed numerous solutions, such as controlling important user nodes and controlling bridges of social communities. However, these methods rarely take the space-time dynamic of rumor propagation into consideration. The selected controlled user nodes or bridges may be unable to influence the propagation process actually at current time if they are far from the rumor source or they have already undergone the rumor before. In the above mentioned two scenarios, it will be meaningless to control so-called important users and community bridges. In our work, we aim to restrain the rumor by predicting propagation dynamic from the microscopic perspective and collecting the boundary users who are most likely to be contagious at the moment. Moreover, to predict rumor's propagation dynamic practicably and efficiently, we adopt the sensor observation and meanwhile assume that there exist some short propagation paths which are explicit. We experimentally demonstrate that the proposed microscopic model's estimations rather accurately predict the propagation dynamic of the rumor. Moreover, the proposed rumor restraining method outperforms evidently classic Degree Centrality and Target Immunization approaches regarding the immunity scale and the immunity speed.

[1]  Guanhua Yan,et al.  Malware propagation in online social networks: nature, dynamics, and defense implications , 2011, ASIACCS '11.

[2]  Piet Van Mieghem,et al.  Epidemic processes in complex networks , 2014, ArXiv.

[3]  Yang Xiang,et al.  Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[4]  Eunsoo Seo,et al.  Identifying rumors and their sources in social networks , 2012, Defense + Commercial Sensing.

[5]  Riccardo Zecchina,et al.  Bayesian inference of epidemics on networks via Belief Propagation , 2013, Physical review letters.

[6]  Soroush Vosoughi,et al.  A Human-Machine Collaborative System for Identifying Rumors on Twitter , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).

[7]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[8]  Guoliang Xing,et al.  Exploiting Statistical Mobility Models for Efficient Wi-Fi Deployment , 2013, IEEE Transactions on Vehicular Technology.

[9]  Wanlei Zhou,et al.  A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks , 2015, IEEE Transactions on Computers.

[10]  Wanlei Zhou,et al.  Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies , 2017, IEEE Communications Surveys & Tutorials.

[11]  Kyomin Jung,et al.  Prominent Features of Rumor Propagation in Online Social Media , 2013, 2013 IEEE 13th International Conference on Data Mining.

[12]  Marco Conti,et al.  The structure of online social networks mirrors those in the offline world , 2015, Soc. Networks.

[13]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Donald F. Towsley,et al.  Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.

[15]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[16]  Cécile Favre,et al.  Information diffusion in online social networks: a survey , 2013, SGMD.

[17]  Wanlei Zhou,et al.  Locating Defense Positions for Thwarting the Propagation of Topological Worms , 2012, IEEE Communications Letters.

[18]  Ning Zhong,et al.  Network immunization and virus propagation in email networks: experimental evaluation and analysis , 2010, Knowledge and Information Systems.

[19]  Weijia Jia,et al.  BlueCat: An Efficient Way for Relative Mobile Localization , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[20]  Zhipeng Cai,et al.  Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[21]  Wanlei Zhou,et al.  To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[22]  Yun Liu,et al.  An epidemic model of rumor diffusion in online social networks , 2013 .

[23]  Nam P. Nguyen,et al.  Overlapping communities in dynamic networks: their detection and mobile applications , 2011, MobiCom.

[24]  Nam P. Nguyen,et al.  A novel method for worm containment on dynamic social networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[25]  Jun Zhang,et al.  Modeling and Analysis on the Propagation Dynamics of Modern Email Malware , 2014, IEEE Transactions on Dependable and Secure Computing.

[26]  Cai Yiqiao,et al.  The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks , 2016 .