dc.contributor.author | Shah, Devavrat | |
dc.contributor.author | Zaman, Tauhid R. | |
dc.date.accessioned | 2011-05-31T19:10:41Z | |
dc.date.available | 2011-05-31T19:10:41Z | |
dc.date.issued | 2010-06 | |
dc.identifier.isbn | 978-1-4503-0038-4 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/63150 | |
dc.description.abstract | We provide a systematic study of the problem of finding the
source of a computer virus in a network. We model virus
spreading in a network with a variant of the popular SIR
model and then construct an estimator for the virus source.
This estimator is based upon a novel combinatorial quantity
which we term rumor centrality. We establish that
this is an ML estimator for a class of graphs. We find the
following surprising threshold phenomenon: on trees which
grow faster than a line, the estimator always has non-trivial
detection probability, whereas on trees that grow like a line,
the detection probability will go to 0 as the network grows.
Simulations performed on synthetic networks such as the
popular small-world and scale-free networks, and on real
networks such as an internet AS network and the U.S. electric
power grid network, show that the estimator either finds
the source exactly or within a few hops in different network
topologies. We compare rumor centrality to another common
network centrality notion known as distance centrality.
We prove that on trees, the rumor center and distance center
are equivalent, but on general networks, they may differ.
Indeed, simulations show that rumor centrality outperforms
distance centrality in finding virus sources in networks which
are not tree-like. | en_US |
dc.description.sponsorship | United States. Air Force Office of Scientific Research (Complex Networks Program SubAward 00006517) | en_US |
dc.language.iso | en_US | |
dc.publisher | Association for Computing Machinery | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1145/1811099.1811063 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.source | MIT web domain | en_US |
dc.title | Detecting sources of computer viruses in networks: Theory and experiment | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Shah, Devavrat and Tauhid Zaman. "Detecting Sources of Computer Viruses in Networks:
Theory and Experiment." Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, SIGMETRICS '10, June 14-18, 2010, Columbia University, New York. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.approver | Shah, Devavrat | |
dc.contributor.mitauthor | Shah, Devavrat | |
dc.contributor.mitauthor | Zaman, Tauhid R. | |
dc.relation.journal | Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, SIGMETRICS '10 | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
dspace.orderedauthors | Shah, Devavrat; Zaman, Tauhid | en |
dc.identifier.orcid | https://orcid.org/0000-0003-0737-3259 | |
dc.identifier.orcid | https://orcid.org/0000-0003-4973-9343 | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |