A probabilistic characterization of the rumor graph boundary in rumor source detection

Estimation of the source to an epidemic-like spreading has important applications such as rooting out a computer virus in the Internet or rumor spreading in an online social network. Given a snapshot observation of the nodes in the network possessing the malicious information, how to identify the source of the spreading? This problem was first formulated in the seminal work by Shah and Zaman (TIT 2011) as a maximum likelihood estimation problem for a degree-regular graph. In this paper, we provide a probabilistic characterization to the rumor boundary of the observed graph. This leads to a new probabilistic approach of maximum likelihood estimation for a general tree graph that enables a distributed message-passing algorithm. We also evaluate the performance of the message-passing algorithm for finding the rumor center in general graphs numerically.

[1]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[2]  Chee Wei Tan,et al.  Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.

[3]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[4]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[5]  Alexander Grey,et al.  The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .

[6]  Donald F. Towsley,et al.  The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[7]  Hisashi Kobayashi,et al.  Probability, Random Processes, and Statistical Analysis: Moment-generating function and characteristic function , 2011 .

[8]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[9]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.

[10]  Yuhong Yang,et al.  Information Theory, Inference, and Learning Algorithms , 2005 .

[11]  N. Bailey,et al.  The mathematical theory of infectious diseases and its applications. 2nd edition. , 1975 .

[12]  N. Ling The Mathematical Theory of Infectious Diseases and its applications , 1978 .

[13]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.