Malicious Attack Propagation and Source Identification (Advances in Information Security)
暫譯: 惡意攻擊傳播與來源識別(資訊安全進展)
Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou
相關主題
商品描述
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book.
In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world.
The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks.
This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
商品描述(中文翻譯)
本書涵蓋並做出四項主要貢獻:1) 分析和調查當前在複雜網絡中識別謠言來源的方法的優缺點;2) 提出一種新穎的方法來識別時間變化網絡中的謠言來源;3) 開發一種快速識別多個謠言來源的方法;4) 提出一種基於社群的方法來克服該研究領域的可擴展性問題。這些貢獻使得謠言來源識別能夠有效應用於現實世界的網絡中,最終減少謠言造成的損害,作者在本書中嚴謹地闡述了這一點。
在現代世界中,網絡的普遍存在使我們面臨各種風險。例如,病毒在互聯網上傳播並感染數百萬台計算機。錯誤信息在在線社交網絡中(如 Facebook 和 Twitter)傳播得極快。傳染病,如 SARS、H1N1 或埃博拉,已經在地理上擴散並造成數十萬人死亡。本質上,所有這些情況都可以建模為謠言在網絡中傳播,其目標是找到謠言的來源,以便控制和預防網絡風險。迄今為止,已經進行了大量工作來開發新方法以有效識別謠言來源。然而,當前的方法仍然存在重大缺陷。最嚴重的問題是謠言在時間變化網絡中的複雜時空擴散過程,這是當前方法的瓶頸。第二個問題在於識別多個謠言來源的計算複雜性高昂。第三個重要問題是基礎網絡的巨大規模,這使得開發高效策略以快速準確地識別謠言來源變得困難。這些缺陷阻礙了謠言來源識別在更廣泛的現實應用中的應用。本書旨在分析和解決這些問題,使謠言來源識別在現實世界中更有效和可應用。
作者提出了一種新穎的反向擴散策略,以縮小可疑來源的範圍,這大大提高了他們方法的效率。接著,作者開發了一種最大似然估計器,能夠以高精度從嫌疑人中確定真實來源。針對謠言來源識別中的可擴展性問題,作者探索了傳感器技術並開發了一種基於社群結構的方法。然後,作者利用謠言擴散時間與感染距離之間的線性相關性,開發了一種快速定位謠言擴散來源的方法。理論分析證明了所提方法的效率,實驗結果驗證了該方法在大規模網絡中的顯著優勢。
本書的目標讀者為研究計算機科學和網絡的研究生及研究所學生。從事網絡安全、傳播模型及其他相關主題的研究人員和專業人士也會對本書感興趣。