rumour source identification in network

3
@ IJTSRD | Available Online @ www ISSN No: 245 Inte R Rumour So M. Anit Department of Co of Engineering ABSTRACT Identification of rumour sources in a ne critical role in limiting the damage ca through the timely quarantine of However, the temporal variation in th networks and the ongoing dynam challenge our traditional source techniques that are considered in sta Reduction of the time-varying networks an ordered stream of interactions betw node. And then instead of inspecting ev in traditional techniques, we adop dissemination strategy to specify a set the real rumor source. The node from path covering all the observed nodes. I gives near to the rumour but not giving in the network. To determine the exact microscopic rumour spreading method results further indicate that our method identify the real source, or an individua close to the real source. To the best of o the proposed method is the first that c identify rumor sources in time-varying n Keywords: Network, Source estimation Novel source, Reverse process Introduction Network allows a number of us information. A simple network will be model. In this network, each user is co node and its neighbouring nodes are friends. Time-Varying network is de ordered stream of interaction betwe node. Not only promote the efficiency o sharing but also dramatically accelerate rumour spreading. The main goal of this w.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 56 - 6470 | www.ijtsrd.com | Volum ernational Journal of Trend in Sc Research and Development (IJT International Open Access Journ ource Identification in Network tha, P. Ananthi, Dr. S. P. Rajagopalan omputer Science and Engineering, G.K.M. Colle g and Technology, Chennai, Tamil Nadu, India etwork plays a aused by them the sources. he topology of mic processes identification atic networks. s is defined by ween individual very individual pt a reverse of suspects of which all the In this process g exact rumour t real source a d is used. The can accurately al who is very our knowledge, can be used to network. n, Data count, sers to send created in this onsidering as a considered as efined by an een individual of information e the speed of s paper is to identify the person who send finding the fake message i reverse dissemination strategy the real rumour source and from a network. This project identification method to ove Each and every node possess and with the help of this, we sender node. All edges and time- integrating window. The window is to identify the messages which was shared Microscopic method, the sou data count will be the real r exact rumour will be identified Related Works An Ribeiro, Perra and Baronch to Qualifying the effect of time-varying networks, Scient Vana, Amancio, and L.Cost varying collaboration n Informetrics. (2013). A Shah rumour method to detect rumo They claimed that the user w centrality is the rumour sou method was extended by m which can identify rumour propagation models and ob prposed a system extended considering multiple source in Dong et al [27] further pro method. All of these method search (BFS) technique to co upon networks. r 2018 Page: 476 me - 2 | Issue 3 cientific TSRD) nal k ege the fake messages, and t automatically start a y to specify a suspect of it eliminate the source proposes a novel source ercome the challenges. ses one unique number are able to identify the nodes are present in a e use of time-integrating accurate time of the d by the users. Using urce whose having high rumour source and then d. helli, proposed a method temporal resolution on tific reports, (2013). An ta, introduced On time networks,”Journal of h et al. [6] proposed the our source in a network. with maximum closeness urce. Later the rumour many other researches, sources with different bservations. Luo et al. the rumour method by nstead of a single source. oposed a local rumour ds use the breadth first onstruct tree topologies

Upload: ijtsrd

Post on 13-Aug-2019

10 views

Category:

Education


0 download

DESCRIPTION

Identification of rumour sources in a network plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However, the temporal variation in the topology of networks and the ongoing dynamic processes challenge our traditional source identification techniques that are considered in static networks. Reduction of the time varying networks is defined by an ordered stream of interactions between individual node. And then instead of inspecting every individual in traditional techniques, we adopt a reverse dissemination strategy to specify a set of suspects of the real rumor source. The node from which all the path covering all the observed nodes. In this process gives near to the rumour but not giving exact rumour in the network. To determine the exact real source a microscopic rumour spreading method is used. The results further indicate that our method can accurately identify the real source, or an individual who is very close to the real source. To the best of our knowledge, the proposed method is the first that can be used to identify rumor sources in time varying network. M. Anitha | P. Ananthi | Dr. S. P. Rajagopalan "Rumour Source Identification in Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: https://www.ijtsrd.com/papers/ijtsrd10935.pdf Paper URL: http://www.ijtsrd.com/computer-science/computer-network/10935/rumour-source-identification-in-network/m-anitha

TRANSCRIPT

Page 1: Rumour Source Identification in Network

@ IJTSRD | Available Online @ www.ijtsrd.com

ISSN No: 2456

InternationalResearch

Rumour Source Identification in

M. Anitha, P.Department of Computer Science and Engineering,

of Engineering and Technology

ABSTRACT Identification of rumour sources in a network plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However, the temporal variation in the topology of networks and the ongoing dynamic processes challenge our traditional source identification techniques that are considered in static networks. Reduction of the time-varying networks is defined by an ordered stream of interactions between individual node. And then instead of inspecting every individual in traditional techniques, we adopt a reverse dissemination strategy to specify a set of suspects of the real rumor source. The node from which all the path covering all the observed nodes. In this process gives near to the rumour but not giving exact rumour in the network. To determine the exact real source microscopic rumour spreading method is used. The results further indicate that our method can accurately identify the real source, or an individual who is very close to the real source. To the best of our knthe proposed method is the first that can be used to identify rumor sources in time-varying network.

Keywords: Network, Source estimation, Data count, Novel source, Reverse process

Introduction

Network allows a number of users to send information. A simple network will be created in this model. In this network, each user is considering as a node and its neighbouring nodes are considered as friends. Time-Varying network is defined by an ordered stream of interaction between individual node. Not only promote the efficiency of information sharing but also dramatically accelerate the speed of rumour spreading. The main goal of this paper is to

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal

Source Identification in Network

Anitha, P. Ananthi, Dr. S. P. Rajagopalan Department of Computer Science and Engineering, G.K.M. College

of Engineering and Technology, Chennai, Tamil Nadu, India

Identification of rumour sources in a network plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However, the temporal variation in the topology of networks and the ongoing dynamic processes

our traditional source identification techniques that are considered in static networks.

varying networks is defined by an ordered stream of interactions between individual node. And then instead of inspecting every individual

itional techniques, we adopt a reverse dissemination strategy to specify a set of suspects of the real rumor source. The node from which all the path covering all the observed nodes. In this process gives near to the rumour but not giving exact rumour

he network. To determine the exact real source a rumour spreading method is used. The

results further indicate that our method can accurately identify the real source, or an individual who is very close to the real source. To the best of our knowledge, the proposed method is the first that can be used to

varying network.

Network, Source estimation, Data count,

Network allows a number of users to send information. A simple network will be created in this model. In this network, each user is considering as a node and its neighbouring nodes are considered as

Varying network is defined by an ream of interaction between individual

node. Not only promote the efficiency of information sharing but also dramatically accelerate the speed of rumour spreading. The main goal of this paper is to

identify the person who send the fake messages, and finding the fake message it automatically start a reverse dissemination strategy to specify a suspect of the real rumour source and it eliminate the source from a network. This project proposes a novel source identification method to overcome the challenges. Each and every node possesses one unique number and with the help of this, we are able to identify the sender node. All edges and nodes are present in a time- integrating window. The use of timewindow is to identify the accurate time of the messages which was shared by the users. Using Microscopic method, the source whose having high data count will be the real rumour source and then exact rumour will be identified.

Related Works

An Ribeiro, Perra and Baronchelli, proposed a method to Qualifying the effect of temporal resolution on time-varying networks, Scientific reports, (2013). An Vana, Amancio, and L.Costa, introduced On time varying collaboration networks,”Journal of Informetrics. (2013). A Shah et al. [6] proposed the rumour method to detect rumour source in a network. They claimed that the user with maximum closeness centrality is the rumour source. Later the rumour method was extended by many other researches, which can identify rumour sources with different propagation models and observaprposed a system extended the rumour method by considering multiple source instead of a single source. Dong et al [27] further proposed a local rumour method. All of these methods use the breadth first search (BFS) technique to construct upon networks.

Apr 2018 Page: 476

6470 | www.ijtsrd.com | Volume - 2 | Issue – 3

Scientific (IJTSRD)

International Open Access Journal

Network

G.K.M. College

identify the person who send the fake messages, and ing the fake message it automatically start a

reverse dissemination strategy to specify a suspect of the real rumour source and it eliminate the source from a network. This project proposes a novel source identification method to overcome the challenges.

ach and every node possesses one unique number and with the help of this, we are able to identify the sender node. All edges and nodes are present in a

integrating window. The use of time-integrating window is to identify the accurate time of the

sages which was shared by the users. Using Microscopic method, the source whose having high data count will be the real rumour source and then exact rumour will be identified.

An Ribeiro, Perra and Baronchelli, proposed a method the effect of temporal resolution on

varying networks, Scientific reports, (2013). An Vana, Amancio, and L.Costa, introduced On time varying collaboration networks,”Journal of Informetrics. (2013). A Shah et al. [6] proposed the

ct rumour source in a network. They claimed that the user with maximum closeness centrality is the rumour source. Later the rumour method was extended by many other researches, which can identify rumour sources with different propagation models and observations. Luo et al. prposed a system extended the rumour method by considering multiple source instead of a single source. Dong et al [27] further proposed a local rumour method. All of these methods use the breadth first search (BFS) technique to construct tree topologies

Page 2: Rumour Source Identification in Network

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 477

An D. Shah and T. Zaman, “Detecting sources of computer viruses in a networks”and Luo, Tay, and Leng, proposed a system to “Identifying infection sources and region in large networks (2013). Then Wang, Dong, Zhang and Tan, are introduced Rumour source detection with multiple observation: Fundamental limits and algorithm (2014). An Pinto, Thiran, Vetterli are introduced Locating the source of diffusion in large-scale networks (2012).This project introduced the Source detection in SIR model: A sample path based approach where infection nodes may recover, which can occur in many practical scenarios. Because of node recovery the information source detection problem under SIR model (2013).

Proposed System

The proposed system is designed with additional features in the existing system such that it is planned to add novel source identification method to overcome the challenges. And it can be able to identify the real rumour source in a network.

A. Network formation

A simple network will be created in this model. In this network, each user is consider as a node and its neighbouring nodes are considered as friends. Each node possesses one unique number and with the help of this, we are able to identify the sender node. The system time running at the top of node would provide the time at which the message was sent. we need to change the network from dynamic to static so we can maintained the received time for every individual by using system time.

B. Novel source identification

Time varying network is defined by an ordered stream of interactions between individual node. Time progress interaction structure keeps changing in the network. Spreading rumours is affected by duration, sequence, and concurrency of contact among people. In this work, we reduce time-varying networks to a series of static networks by introducing a time integrating window. Each integrating window aggregates all edges and nodes present in the corresponding time duration.

C. Reverse dissemination process

The reverse dissemination method is to send copies of rumours along the reversed dynamic connections from observed nodes to exhaust all possible spreading paths leading to the observation. The node from which all the paths, covering all the observed nodes. The reverse dissemination method is inspired from the Jordan method. The reverse dissemination method is different from the Jordan method, because our method is based on time-varying networks. And it gives near to the rumour but not giving exact rumour in the network.

Page 3: Rumour Source Identification in Network

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 478

D. Identifying rumour source and elimination

Rumour sources are to design a good measure to specify the real source. A novel rumour spreading model will also be introduced to rumour spreading in time varying networks. Every user maintained two types of table, one is received message table and another one is fake message table. Using this method the exact rumour will be identified and the fake message will not be transferred anymore after finding the real source in the network.

E. Conclusion

This paper developed Novel source identification method, and proposed time integrating window. Reduction of the time-varying networks to a series of static networks by introducing a time integrating window. Each integrating window aggregates all edges and nodes present in the corresponding time duration. Hence instead of inspecting every individual in traditional techniques, we adopt a reverse dissemination strategy to specify a set of suspects of the real rumour source. By microscopic method the exact rumour will be identified and the fake message will not be transferred anymore after finding the real source in the network.

REFERENCES

1. D. Shah and T. Zaman, “Detecting sources of computer viruses in networks: Theory and experiment,” in Proc. Ann. ACM SIGMETRICS Conf., New York, NY, 2010, pp. 203–214.

2. W. Luo and W. P. Tay, “Identifying multiple infection sources in a network,” in Proc. Asilomar Conf. Signals, Systems and Computers, 2012.

3. W. Luo, W. P. Tay, and M. Leng, “Identifying infection sources and regions in large networks,” IEEE Trans. Signal Process., vol. 61, pp. 2850–2865.

4. N. Karamchandani and M. Franceschetti, “Rumor source detection under probabilistic sampling,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Istanbul, Turkey, July 2013.

5. W. Dong, W. Zhang, and C. W. Tan, “Rooting out the rumour culprit from suspects,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Istanbul, Turkey, 2013, pp. 2671–2675.

6. K. Zhu and L. Ying, “Information source detection in the SIR model: A sample path based approach,” in Proc. Information Theory and Applications Workshop (ITA), Feb. 2013.

7. ——, “A robust information source estimator with sparse observations,” in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), Toronto, Canada, April-May 2014.

8. W. Luo and W. P. Tay, “Finding an infection source under the SIS model,” in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), Vancouver, BC, May 2013.

9. B. A. Prakash, J. Vreeken, and C. Faloutsos, “Spotting culprits in epidemics: How many and which ones?” in IEEE Int. Conf. Data Mining (ICDM), Brussels, Belgium, 2012, pp. 11–20.

10. A. Agaskar and Y. M. Lu, “A fast monte carlo algorithm for source localization on graphs,” in SPIE Optical Engineering and Applications, 2013.

11. Seo, P. Mohapatra, and T. Abdelzaher, “Identifying rumours and their sources in social networks,” in SPIE Defense, Security, and Sensing, 2012