Information source detection in networks: Possibility and impossibility results

This paper studies information source detection in networks under the independent cascade (IC) model. Assume the spread of information starts from a single source in a network and a complete snapshot of the network is obtained at some time. The goal is to identify the source based on the observation. We derive the maximum a posterior (MAP) estimator of the source for tree networks and propose a Short-Fat Tree (SFT) algorithm for general networks based on the MAP estimator. The algorithm selects the Jordan infection center [1] and breaks ties according the degree of boundary infected nodes. Loosely speaking, the algorithm selects the node such that the breadth-first search (BFS) tree from it has the minimum depth but the maximum number of leaf nodes. On the Erdos-Renyi (ER) random graph, we establish the following possibility and impossibility results: (i) when the infection duration <; log n/(1 + α)log μ for some α > 0.5, SFT identifies the source with probability 1 (w.p.1) asymptotically (as network size increases to infinity), where n is the network size and μ is the average node degree; (ii) when the infection duration > ⌈log n/ log μ ⌉ + 2, the probability of identifying the source approaches zero asymptotically under any algorithm; and (iii) when infection duration <; <; log n/(1 + α)log μ for some α > 0, asymptotically, at least 1-δ fraction of the nodes on the BFS tree starting from the source are leaf-nodes, where δ = 3√log n/μ, i.e., the BFS tree starting from the actual source is a fat tree. 1Numerical experiments on tree networks, the ER random graphs and real world networks with different evaluation metrics show that the SFT algorithm outperforms existing algorithms.

[1]  Chee Wei Tan,et al.  Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.

[2]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.

[3]  Lenka Zdeborová,et al.  Inferring the origin of an epidemy with dynamic message-passing algorithm , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.

[4]  Wuqiong Luo,et al.  Estimating infection sources in a network with incomplete observations , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[5]  Yue M. Lu,et al.  A fast Monte Carlo algorithm for source localization on graphs , 2013, Optics & Photonics - Optical Engineering + Applications.

[6]  Massimo Franceschetti,et al.  Rumor source detection under probabilistic sampling , 2013, 2013 IEEE International Symposium on Information Theory.

[7]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[8]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.

[9]  Dimitrios Gunopulos,et al.  Finding effectors in social networks , 2010, KDD.

[10]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[11]  Lei Ying,et al.  Source Localization in Networks: Trees and Beyond , 2015, ArXiv.

[12]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).

[13]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[14]  Lei Ying,et al.  Locating Contagion Sources in Networks with Partial Timestamps , 2014, ArXiv.

[15]  Wuqiong Luo,et al.  Finding an infection source under the SIS model , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[17]  L. Massoulié,et al.  Epidemics and Rumours in Complex Networks: From microscopic to macroscopic dynamics , 2009 .

[18]  Bruno Sinopoli,et al.  Network observability and localization of the source of diffusion based on a subset of nodes , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[19]  Christos Faloutsos,et al.  Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.

[20]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[21]  Lei Ying,et al.  Locating the contagion source in networks with partial timestamps , 2015, Data Mining and Knowledge Discovery.

[22]  Frank Harary,et al.  Graph Theory , 2016 .