Source detection of rumor in social network - A review

Abstract The ubiquity of handheld devices provides straightforward access to the Internet and Social networking. The quick and easy updates from social networks help users in many situations like natural disasters, man-made disasters, etc. In such situations, individuals share information with the people in their network without checking the veracity of posts, which leads to the issue of rumor diffusion in a social network. Detection of rumor and source identification plays a vital role to control the diffusion of misinformation in a social network and also a good research domain in social network analysis. Source detection of such misinformation is often interesting and challenging task due to the fast diffusion of information and dynamic evolution of the social network. Accurate and quick detection of the rumor source is a very important and useful task in many application domains like source of disease in an epidemic model, start of virus spread, source of information or rumor in a social network. Most of the existing reviews which focused on source detection relate to various application domains and network perspective. But as per the need of current social networking usage and its influence on the society, it is a crucial and important topic to review the source detection approaches in the social network. The objective of this paper is to study and analyze the source detection approaches of rumor or misinformation in a social network. As an outcome of the literature study, we present the pictorial taxonomy of factors to be considered for the source detection approach and the classification of current source detection approaches in the social network. The focus has been given to various state-of-the-art source detection approaches of rumor or misinformation and comparison between approaches in social networks. This paper also focused on research challenges in current source detection approaches, public datasets and future research directions.

[1]  V. P. Sahana,et al.  Automatic detection of rumoured tweets and finding its origin , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).

[2]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[3]  John C. S. Lui,et al.  Information Spreading Forensics via Sequential Dependent Snapshots , 2018, IEEE/ACM Transactions on Networking.

[4]  Jun Zhang,et al.  Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[5]  Christos Faloutsos,et al.  R-MAT: A Recursive Model for Graph Mining , 2004, SDM.

[6]  Vivek S. Borkar,et al.  Fast rumor source identification via random walks , 2016, Social Network Analysis and Mining.

[7]  Stefan Burr,et al.  The Mathematics of networks , 1982 .

[8]  Jure Leskovec,et al.  Can cascades be predicted? , 2014, WWW.

[9]  Devavrat Shah,et al.  Finding Rumor Sources on Random Trees , 2011, Oper. Res..

[10]  Shin-Ichi Nakano,et al.  A Linear-Time Algorithm to Find Four Independent Spanning Trees in Four-Connected Planar Graphs , 1998, WG.

[11]  Wanlei Zhou,et al.  Rumor Source Identification in Social Networks with Time-Varying Topology , 2018, IEEE Transactions on Dependable and Secure Computing.

[12]  Yongdong Zhang,et al.  Detection and Analysis of 2016 US Presidential Election Related Rumors on Twitter , 2017, SBP-BRiMS.

[13]  Shanshan Zhang,et al.  A Survey on Information Diffusion in Online Social Networks: Models and Methods , 2017, Inf..

[14]  Onur Varol,et al.  Deception strategies and threats for online discussions , 2018, First Monday.

[15]  Soroush Vosoughi,et al.  Rumor Gauge , 2017, ACM Trans. Knowl. Discov. Data.

[16]  Sergio Luna,et al.  Social media in emergency management advances, challenges and future directions , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.

[17]  Feng Fu,et al.  Dueling biological and social contagions , 2017, Scientific Reports.

[18]  Michael Fuchs,et al.  Rumor source detection for rumor spreading on random increasing trees , 2015 .

[19]  Jiyoung Woo,et al.  Epidemic model for information diffusion in web forums: experiments in marketing exchange and political dialog , 2016, SpringerPlus.

[20]  Panagiotis Takis Metaxas,et al.  Using TwitterTrails.com to Investigate Rumor Propagation , 2015, CSCW Companion.

[21]  Sinan Aral,et al.  The spread of true and false news online , 2018, Science.

[22]  Dariusz Król,et al.  On Rumor Source Detection and Its Experimental Verification on Twitter , 2017, ACIIDS.

[23]  Wuqiong Luo,et al.  Finding an infection source under the SIS model , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[24]  Oscar Cordón,et al.  An agent-based model for understanding the influence of the 11-M terrorist attacks on the 2004 Spanish elections , 2017, Knowl. Based Syst..

[25]  Wenbin Hu,et al.  An Event Detection Method for Social Networks Based on Evolution Fluctuations of Nodes , 2018, IEEE Access.

[26]  Douglas J. Klein,et al.  Centrality measure in graphs , 2010 .

[27]  Jaeyoung Choi,et al.  Rumor source detection under querying with untruthful answers , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[28]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[29]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[30]  He Chen,et al.  Scalable Rumor Source Detection under Independent Cascade Model in Online Social Networks , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[31]  Cécile Favre,et al.  Information diffusion in online social networks: a survey , 2013, SGMD.

[32]  Ioannis Kotsiopoulos,et al.  Social Media in Crisis Management: Role, Potential, and Risk , 2014, UCC.

[33]  M. De Domenico,et al.  The Anatomy of a Scientific Rumor , 2013, Scientific Reports.

[34]  Jacob Ratkiewicz,et al.  Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams , 2010, ArXiv.

[35]  P. Bonacich Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.

[36]  L. D. Costa,et al.  Identifying the starting point of a spreading process in complex networks. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[37]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.

[38]  G. Geethakumari,et al.  Detecting misinformation in online social networks using cognitive psychology , 2014, Human-centric Computing and Information Sciences.

[39]  D. Helbing,et al.  The Hidden Geometry of Complex, Network-Driven Contagion Phenomena , 2013, Science.

[40]  Masahiro Kimura,et al.  Discovering Influential Nodes for SIS Models in Social Networks , 2009, Discovery Science.

[41]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[42]  Tianguang Chu,et al.  Learning the structure of influence diffusion in the independent cascade model , 2017, 2017 36th Chinese Control Conference (CCC).

[43]  Wanlei Zhou,et al.  Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies , 2017, IEEE Communications Surveys & Tutorials.

[44]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[45]  Wuqiong Luo,et al.  How to Identify an Infection Source With Limited Observations , 2013, IEEE Journal of Selected Topics in Signal Processing.

[46]  Massimo Franceschetti,et al.  Rumor source detection under probabilistic sampling , 2013, 2013 IEEE International Symposium on Information Theory.

[47]  Ponnurangam Kumaraguru,et al.  TweetCred: Real-Time Credibility Assessment of Content on Twitter , 2014, SocInfo.

[48]  Amos Azaria,et al.  The DARPA Twitter Bot Challenge , 2016, Computer.

[49]  Robert Paluch,et al.  Fast and accurate detection of spread source in large complex networks , 2018, Scientific Reports.

[50]  Albert-László Barabási,et al.  Linked - how everything is connected to everything else and what it means for business, science, and everyday life , 2003 .

[51]  Mile Šikić,et al.  Identification of Patient Zero in Static and Temporal Networks: Robustness and Limitations. , 2015, Physical review letters.

[52]  Li Guo,et al.  Locating multiple sources in social networks under the SIR model: A divide-and-conquer approach , 2015, J. Comput. Sci..

[53]  Wanlei Zhou,et al.  K-Center: An Approach on the Multi-Source Identification of Information Diffusion , 2015, IEEE Transactions on Information Forensics and Security.

[54]  Filippo Menczer,et al.  Early detection of promoted campaigns on social media , 2017, EPJ Data Science.

[55]  Huiyan Kang,et al.  Epidemic spreading on adaptively weighted scale-free networks , 2017, Journal of mathematical biology.

[56]  Siegfried Depner,et al.  Towards a property graph generator for benchmarking , 2017, GRADES@SIGMOD/PODS.

[57]  Qiaozhu Mei,et al.  Enquiring Minds: Early Detection of Rumors in Social Media from Enquiry Posts , 2015, WWW.

[58]  Jing He,et al.  Towards Anomalous Diffusion Sources Detection in a Large Network , 2016, ACM Trans. Internet Techn..

[59]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[60]  Lei Ying,et al.  A robust information source estimator with sparse observations , 2014 .

[61]  Gianlorenzo D'Angelo,et al.  Influence Maximization in the Independent Cascade Model , 2016, ICTCS.

[62]  Zhen Jin,et al.  Modeling and analyzing of botnet interactions , 2011 .

[63]  Anthony H. Dekker,et al.  Centrality In Social Networks: Theoretical And Simulation Approaches , 2008 .

[64]  Li Guo,et al.  Discovering Multiple Diffusion Source Nodes in Social Networks , 2014, ICCS.

[65]  Alireza Louni,et al.  A two-stage algorithm to estimate the source of information diffusion in social media networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[66]  Dilek Günneç,et al.  Influence maximization in social networks under Deterministic Linear Threshold Model , 2018, Knowl. Based Syst..

[67]  Lei Shu,et al.  A Survey on Gas Leakage Source Detection and Boundary Tracking with Wireless Sensor Networks , 2016, IEEE Access.

[68]  Shashi Shekhar,et al.  Capacity-Constrained Network-Voronoi Diagram: A Summary of Results , 2013, SSTD.

[69]  Xiang Li,et al.  Misinformation in Online Social Networks: Detect Them All with a Limited Budget , 2016, TOIS.

[70]  Wenyi Zhang,et al.  Rooting our Rumor Sources in Online Social Networks: The Value of Diversity From Multiple Observations , 2015, IEEE Journal of Selected Topics in Signal Processing.

[71]  Shailendra Narayan Singh,et al.  Online influence maximization using rapid continuous time independent cascade model , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.

[72]  Nam P. Nguyen,et al.  Sources of misinformation in Online Social Networks: Who to suspect? , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[73]  Chee Wei Tan,et al.  Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.

[74]  Kate Starbird,et al.  Examining the Alternative Media Ecosystem Through the Production of Alternative Narratives of Mass Shooting Events on Twitter , 2017, ICWSM.

[75]  Wenyi Zhang,et al.  On inferring rumor source for SIS model under multiple observations , 2015, 2015 IEEE International Conference on Digital Signal Processing (DSP).

[76]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[77]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.

[78]  Jacob Ratkiewicz,et al.  Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.

[79]  G. Geethakumari,et al.  Identifying Sources of Misinformation in Online Social Networks , 2014, SIRS.

[80]  Filippo Menczer,et al.  Hoaxy: A Platform for Tracking Online Misinformation , 2016, WWW.

[81]  Filippo Menczer,et al.  Anatomy of an online misinformation network , 2018, PloS one.

[82]  Martine Labbé,et al.  The Voronoi Partition of a Network and Its Implications in Location Theory , 1992, INFORMS J. Comput..

[83]  Indrajit Bhattacharya,et al.  Analysis and Early Detection of Rumors in a Post Disaster Scenario , 2018, Information Systems Frontiers.

[84]  Filippo Menczer,et al.  The rise of social bots , 2014, Commun. ACM.

[85]  Lata Narayanan,et al.  Community Detection in Evolving Networks , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[86]  Eiji Aramaki,et al.  How do rumors spread during a crisis?: Analysis of rumor expansion and disaffirmation on Twitter after 3.11 in Japan , 2014, Int. J. Web Inf. Syst..

[87]  Florian Boudin,et al.  A Comparison of Centrality Measures for Graph-Based Keyphrase Extraction , 2013, IJCNLP.

[88]  Jaeyoung Choi,et al.  Estimating the rumor source with anti-rumor in social networks , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[89]  Albert-László Barabási,et al.  Controllability of complex networks , 2011, Nature.

[90]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[91]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[92]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).

[93]  Kate Starbird,et al.  Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing , 2014 .

[94]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[95]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[96]  Dragomir R. Radev,et al.  Rumor has it: Identifying Misinformation in Microblogs , 2011, EMNLP.

[97]  Weili Wu,et al.  A novel approach for detecting multiple rumor sources in networks with partial observations , 2015, Journal of Combinatorial Optimization.

[98]  Preetam Ghosh,et al.  Multiple Infection Sources Identification with Provable Guarantees , 2016, CIKM.

[99]  Christos Faloutsos,et al.  Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.