15 research outputs found

    Finding an infection source under the SIS model

    Full text link
    We consider the problem of identifying an infection source based only on an observed set of infected nodes in a network, assuming that the infection process follows a Susceptible-Infected-Susceptible (SIS) model. We derive an estimator based on estimating the most likely infection source associated with the most likely infection path. Simulation results on regular trees suggest that our estimator performs consistently better than the minimum distance centrality based heuristic

    Infection Spreading and Source Identification: A Hide and Seek Game

    Full text link
    The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator. On the other hand, the network administrator aims to identify the source node based on knowledge of which nodes have been infected. We model the infection spreading and source identification problem as a strategic game, where the infection source and the network administrator are the two players. As the Jordan center estimator is a minimax source estimator that has been shown to be robust in recent works, we assume that the network administrator utilizes a source estimation strategy that can probe any nodes within a given radius of the Jordan center. Given any estimation strategy, we design a best-response infection strategy for the source. Given any infection strategy, we design a best-response estimation strategy for the network administrator. We derive conditions under which a Nash equilibrium of the strategic game exists. Simulations in both synthetic and real-world networks demonstrate that our proposed infection strategy infects more nodes while maintaining the same safety margin between the true source node and the Jordan center source estimator

    Identifying Infection Sources and Regions in Large Networks

    Full text link
    Identifying the infection sources in a network, including the index cases that introduce a contagious disease into a population network, the servers that inject a computer virus into a computer network, or the individuals who started a rumor in a social network, plays a critical role in limiting the damage caused by the infection through timely quarantine of the sources. We consider the problem of estimating the infection sources and the infection regions (subsets of nodes infected by each source) in a network, based only on knowledge of which nodes are infected and their connections, and when the number of sources is unknown a priori. We derive estimators for the infection sources and their infection regions based on approximations of the infection sequences count. We prove that if there are at most two infection sources in a geometric tree, our estimator identifies the true source or sources with probability going to one as the number of infected nodes increases. When there are more than two infection sources, and when the maximum possible number of infection sources is known, we propose an algorithm with quadratic complexity to estimate the actual number and identities of the infection sources. Simulations on various kinds of networks, including tree networks, small-world networks and real world power grid networks, and tests on two real data sets are provided to verify the performance of our estimators

    On the Universality of Jordan Centers for Estimating Infection Sources in Tree Networks

    Full text link
    Finding the infection sources in a network when we only know the network topology and infected nodes, but not the rates of infection, is a challenging combinatorial problem, and it is even more difficult in practice where the underlying infection spreading model is usually unknown a priori. In this paper, we are interested in finding a source estimator that is applicable to various spreading models, including the Susceptible-Infected (SI), Susceptible-Infected-Recovered (SIR), Susceptible-Infected-Recovered-Infected (SIRI), and Susceptible-Infected-Susceptible (SIS) models. We show that under the SI, SIR and SIRI spreading models and with mild technical assumptions, the Jordan center is the infection source associated with the most likely infection path in a tree network with a single infection source. This conclusion applies for a wide range of spreading parameters, while it holds for regular trees under the SIS model with homogeneous infection and recovery rates. Since the Jordan center does not depend on the infection, recovery and reinfection rates, it can be regarded as a universal source estimator. We also consider the case where there are k>1 infection sources, generalize the Jordan center definition to a k-Jordan center set, and show that this is an optimal infection source set estimator in a tree network for the SI model. Simulation results on various general synthetic networks and real world networks suggest that Jordan center-based estimators consistently outperform the betweenness, closeness, distance, degree, eigenvector, and pagerank centrality based heuristics, even if the network is not a tree

    Identifying infection sources in a network

    No full text
    Modern networks like social, communication and transportation networks have grown drastically in complexity. Such networks are susceptible to rapidly spreading “infection”, which can have different meanings under different contexts, including a contagious disease, a computer virus or a rumor. Timely identification of the infection sources (the index cases of a contagious disease, the original servers that injected a computer virus into the Internet, or the rumor origins that started a rumor in a social network) is critical for limiting the damage caused by the infection. The infection sources identification problem has thus attracted considerable interest from the research community over the past few years.DOCTOR OF PHILOSOPHY (EEE

    Bandwidth Broker based admission control for guaranteed video quality of experience

    No full text
    The current Best Effort service in the Internet will not be able to cater for the increasingly demand of high bandwidth real-time video traffic. Many possible mechanisms have been proposed to provide QoS guarantees to individual traffic streams. However, the scalability and complexity issues remain unresolved. In this report, a novel Bandwidth Broker architecture based scalable QoS provisioning mechanism called Scalable MultiServ is presented. This framework provides different classes of QoS with different queuing delay bounds on top of the current Best Effort delivery service in a network so that video users may enjoy acceptable quality of experience. In our comprehensive solution, routers do not need to maintain any QoS reservation states and the computation complexity is pushed to end users, leaving simple priority scheduling at all routers, thereby addresses scalability and complexity problems. Admission Control and Domain QoS States Database system is designed for the proposed Scalable MultiServ mechanism. The performance of the architecture is evaluated by means of NS-2 simulations.Bachelor of Engineerin

    Identifying infection sources in large tree networks

    No full text
    Estimating which nodes in a network are the infection sources, including the individuals who started a rumor in a social network, the computers that introduce a virus into a computer network, or the index cases of a contagious disease, plays a critical role in identifying the influential nodes in a network, and in some applications, limiting the damage caused by the infection through timely quarantine of the sources. We consider the problem of estimating the infection sources, based only on knowledge of the underlying network connections. We derive estimators based on approximations of the infection sequences counts. We show that if there are at most two infection sources in a geometric tree, our estimator identifies these sources with probability going to one as the number of infected nodes increases. When there are more than two infection sources, we present heuristics that have quadratic complexity. We show through simulations that our proposed estimators can correctly identify the infection sources to within a few hops with high probability

    Identifying multiple infection sources in a network

    No full text
    Estimating which nodes are the infection sources that introduce a virus or rumor into a network, or the locations of pollutant sources, plays a critical role in limiting the potential damage to the network through timely quarantine of the sources. In this paper, we derive estimators for the infection sources and their infection regions based on the infection network geometry. We show that in a geometric tree with at most two sources, our estimator identifies these sources with probability going to one as the number of infected nodes increases. We extend and generalize our methods to general graphs, where the number of infection sources are unknown and there may be multiple sources. Numerical results are presented to verify the performance of our proposed algorithms under different types of graph structures

    Infection Spreading and Source Identification: A Hide and Seek Game

    No full text
    corecore