Information source localization with protector diffusion in networks

Recently, the problem of detecting the information source in a network has been much studied, where it has been shown that the detection probability cannot be beyond 31% even for regular trees if the number of infected nodes is sufficiently large. In this paper, we study the impact of an anti-information spreading on the original information source detection. We first show a negative result: the anti-information diffusion does not increase the detection probability under Maximum-Likelihood-Estimator (MLE) when the number of infected nodes are sufficiently large by passive diffusion that the anti-information starts to be spread by a special node, called the protector, after is reached by the original information. We next consider the case when the distance between the information source and the protector follows a certain type of distribution, but its parameter is hidden. Then, we propose the following learning algorithm: a) learn the distance distribution parameters under MLE, and b) detect the information source under Maximum-A-Posterior-Estimator (MAPE) based on the learnt parameters. We provide an analytic characterization of the source detection probability for regular trees under the proposed algorithm, where MAPE outperforms MLE by up to 50% for 3-regular trees and by up to 63% when the degree of the regular tree becomes large. We demonstrate our theoretical findings through numerical results, and further present the simulation results for general topologies (e.g., Facebook and US power grid networks) even without knowledge of the distance distribution, showing that under a simple protector placement algorithm, MAPE produces the detection probability much larger than that by MLE.

[1]  Kannan Ramchandran,et al.  Rumor Source Obfuscation on Irregular Trees , 2016, SIGMETRICS.

[2]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[3]  Devavrat Shah,et al.  Detecting sources of computer viruses in networks: theory and experiment , 2010, SIGMETRICS '10.

[4]  Hongyuan Zha,et al.  Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades , 2015, AISTATS.

[5]  Jaeyoung Choi,et al.  Necessary and Sufficient Budgets in Information Source Finding with Querying: Adaptivity Gap , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[6]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.

[7]  Jaeyoung Choi,et al.  Rumor source detection under querying with untruthful answers , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[8]  Jaeyoung Choi,et al.  Estimating the rumor source with anti-rumor in social networks , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[9]  Lei Ying,et al.  Information source detection in networks: Possibility and impossibility results , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[10]  Michael Fuchs,et al.  Rumor source detection for rumor spreading on random increasing trees , 2015 .

[11]  Lei Ying,et al.  Catch'Em All: Locating Multiple Diffusion Sources in Networks with Partial Observations , 2016, AAAI.

[12]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[13]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[14]  Lei Ying,et al.  A robust information source estimator with sparse observations , 2014 .

[15]  Justin Solomon,et al.  Numerical Algorithms - Methods for Computer Vision, Machine Learning, and Graphics , 2015 .

[16]  Jure Leskovec,et al.  Learning to Discover Social Circles in Ego Networks , 2012, NIPS.

[17]  Chee Wei Tan,et al.  Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.

[18]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2013, ITA.

[19]  Zheng Wang,et al.  Multiple Source Detection without Knowing the Underlying Propagation Model , 2017, AAAI.