Rumor Source Detection in Networks Based on the SEIR Model

Online social networks have become extremely important in daily life and can be used to influence lives in dramatic ways. Two issues are the veracity and provenance of posted information, including rumors. There is a need for methods for tracing rumors (or any piece of information) to their most likely source in such networks. We consider the detection problem of single rumor source based on observed snapshots based on the susceptible-exposed-infected-recovered (SEIR) model. According to the SEIR model, all nodes in the network are formulated into four possible states: susceptible (S), exposed (E), infected (I), and recovered (R). Given an observed snapshot in the network, from which we can know the relevant graph topology and all infected nodes, but where nodes in susceptible, exposed, or recovered status cannot be distinguished, the purpose of our research is to identify the rumor source based on the observed snapshot and graph topology. We propose the concept of the optimal infection process and derive an estimator for the rumor source based on this optimal infection process. Subsequently, we prove that this estimator matches the rumor source with a high probability. The effectiveness of the proposed scheme is validated using experiments based on regular tree networks with different degrees. We further evaluate the performance of our scheme on two well-known synthetic complex networks and four real-world networks; the results suggest that our proposed scheme outperforms the traditional rumor centrality heuristics. The performance analysis on computational complexity demonstrates that our scheme has advantages in efficiency compared with other rumor centrality heuristics used in rumor detection methods.

[1]  Jure Leskovec,et al.  Predicting positive and negative links in online social networks , 2010, WWW '10.

[2]  Aihua Li,et al.  Fast and Accurate Mining the Community Structure: Integrating Center Locating and Membership Optimization , 2016, IEEE Transactions on Knowledge and Data Engineering.

[3]  Lin Wang,et al.  Spatial epidemiology of networked metapopulation: an overview , 2014, bioRxiv.

[4]  Chee Wei Tan,et al.  Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.

[5]  Xun Li,et al.  Reconstruction of stochastic temporal networks through diffusive arrival times , 2017, Nature Communications.

[6]  Hui-Jia Li,et al.  Social significance of community structure: Statistical view , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.

[7]  Huiyan Kang,et al.  Epidemic spreading and global stability of an SIS model with an infective vector on complex networks , 2015, Commun. Nonlinear Sci. Numer. Simul..

[8]  Wanlei Zhou,et al.  K-Center: An Approach on the Multi-Source Identification of Information Diffusion , 2015, IEEE Transactions on Information Forensics and Security.

[9]  P. Kareiva,et al.  Impact: Toward a Framework for Understanding the Ecological Effects of Invaders , 1999, Biological Invasions.

[10]  Wuqiong Luo,et al.  Identifying multiple infection sources in a network , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[11]  Xiang Li,et al.  Identifying Spatial Invasion of Pandemics on Metapopulation Networks Via Anatomizing Arrival History , 2015, IEEE Transactions on Cybernetics.

[12]  Tao Li,et al.  The analysis of an SEIR rumor propagation model on heterogeneous network , 2017 .

[13]  Jie Cao,et al.  Dynamic Cluster Formation Game for Attributed Graph Clustering , 2019, IEEE Transactions on Cybernetics.

[14]  Lin Wang,et al.  Characterizing the dynamics underlying global spread of epidemics , 2018, Nature Communications.

[15]  David A. Maltz,et al.  Worm origin identification using random moonwalks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[16]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[17]  Yang Xiang,et al.  Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[18]  Alexander Grey,et al.  The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .

[19]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[20]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[21]  Devavrat Shah,et al.  Detecting sources of computer viruses in networks: theory and experiment , 2010, SIGMETRICS '10.

[22]  Huijia Li,et al.  Punishment diminishes the benefits of network reciprocity in social dilemma experiments , 2017, Proceedings of the National Academy of Sciences.

[23]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2013, ITA.

[24]  Christos Faloutsos,et al.  Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.

[25]  Mahmoud Fouz,et al.  Why rumors spread so quickly in social networks , 2012, Commun. ACM.

[26]  Riccardo Zecchina,et al.  Bayesian inference of epidemics on networks via Belief Propagation , 2013, Physical review letters.

[27]  Wuqiong Luo,et al.  Finding an infection source under the SIS model , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[28]  Suyalatu Dong,et al.  SEIR Model of Rumor Spreading in Online Social Network with Varying Total Population Size , 2017 .

[29]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[30]  Yue M. Lu,et al.  A fast Monte Carlo algorithm for source localization on graphs , 2013, Optics & Photonics - Optical Engineering + Applications.

[31]  Xiang Li,et al.  Uncovering Spatial Invasion on Metapopulation Networks with SIR Epidemics , 2019, IEEE Transactions on Network Science and Engineering.

[32]  Stanford,et al.  Learning to Discover Social Circles in Ego Networks , 2012 .

[33]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.

[34]  Fuxiang Gao,et al.  Research of a Potential Worm Propagation Model based on Pure P2P Principle , 2006, 2006 International Conference on Communication Technology.

[35]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[36]  Vivek S. Borkar,et al.  Fast rumor source identification via random walks , 2016, Social Network Analysis and Mining.

[37]  Bo Song,et al.  Rumor spreading model considering hesitating mechanism in complex social networks , 2015 .