Abstract
Here we examine the problem of rumor source identification in line graphs. We assume the SI model for rumor propagation with exponential waiting times. We consider the case where a rumor originates from two sources simultaneously, and evaluate the likelihood function for the given observations given those sources. As the size of the infected region grows arbitrarily large, we show that unlike the single source case, where the likelihood function concentrates near the midpoint of the infected region, the support of the likelihood function in this case remains widely distributed over the middle half of the infected region. This makes the rumor sources impossible to localize with high probability on any scale smaller than that of the infection size itself.
- G. Fanti, P. Kairouz, S. Oh, and P. Viswanath. Spy vs. spy: Rumor source obfuscation. In Proceedings of the 15th ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '15, to appear, 2015. Google ScholarDigital Library
- D. Shah and T. Zaman. Rumor centrality: A universal source detector. In Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '12, pages 199-=-210, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. In Information Theory and Applications Workshop (ITA), 2013, pages 1--9, Feb 2013.Google Scholar
Index Terms
- On the Impossibility of Localizing Multiple Rumor Sources in a Line Graph
Recommendations
Rumor centrality: a universal source detector
SIGMETRICS '12: Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer SystemsWe consider the problem of detecting the source of a rumor (information diffusion) in a network based on observations about which set of nodes possess the rumor. In a recent work [10], this question was introduced and studied. The authors proposed rumor ...
Detecting sources of computer viruses in networks: theory and experiment
Performance evaluation reviewWe provide a systematic study of the problem of finding the source of a computer virus in a network. We model virus spreading in a network with a variant of the popular SIR model and then construct an estimator for the virus source. This estimator is ...
Detecting sources of computer viruses in networks: theory and experiment
SIGMETRICS '10: Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systemsWe provide a systematic study of the problem of finding the source of a computer virus in a network. We model virus spreading in a network with a variant of the popular SIR model and then construct an estimator for the virus source. This estimator is ...
Comments