ieee/acm transactions on networking 1 information...

14
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information Source Detection in the SIR Model: A Sample-Path-Based Approach Kai Zhu and Lei Ying, Member, IEEE Abstract—This paper studies the problem of detecting the infor- mation source in a network in which the spread of information fol- lows the popular Susceptible-Infected-Recovered (SIR) model. We assume all nodes in the network are in the susceptible state initially, except one single information source that is in the infected state. Susceptible nodes may then be infected by infected nodes, and in- fected nodes may recover and will not be infected again after re- covery. Given a snapshot of the network, from which we know the graph topology and all infected nodes but cannot distinguish sus- ceptible nodes and recovered nodes, the problem is to nd the in- formation source based on the snapshot and the network topology. We develop a sample-path-based approach where the estimator of the information source is chosen to be the root node associated with the sample path that most likely leads to the observed snapshot. We prove for innite-trees, the estimator is a node that minimizes the maximum distance to the infected nodes. A reverse-infection algo- rithm is proposed to nd such an estimator in general graphs. We prove that for -regular trees such that , where is the node degree and is the infection probability, the estimator is within a constant distance from the actual source with a high prob- ability, independent of the number of infected nodes and the time the snapshot is taken. Our simulation results show that for tree net- works, the estimator produced by the reverse-infection algorithm is closer to the actual source than the one identied by the closeness centrality heuristic. We then further evaluate the performance of the reverse infection algorithm on several real-world networks. Index Terms— Information source detection, sample-path-based approach, Susceptible-Infected-Recovered (SIR) model. I. INTRODUCTION D IFFUSION processes in networks refer to the spread of information throughout the networks and have been widely used to model many real-world phenomena such as the outbreak of epidemics, the spreading of gossips over online social networks, the spreading of computer virus over the In- ternet, and the adoption of innovations. Important properties of diffusion processes such as the outbreak thresholds [1] and the impact of network topologies [2] have been intensively studied. Manuscript received December 18, 2012; revised April 11, 2013; November 04, 2013; May 19, 2014; and August 23, 2014; accepted October 06, 2014; ap- proved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor T. Karagiannis. This work was supported in part by the ARO under Grant W911NF1310279. The authors are with the School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, AZ 85287 USA (e-mail: [email protected]; [email protected]). This paper has supplementary downloadable material available online at http://ieeexplore.ieee.org. Color versions of one or more of the gures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identier 10.1109/TNET.2014.2364972 In this paper, we are interested in the reverse of the diffusion problem: Given a snapshot of the diffusion process at time , can we tell which node is the source of the diffusion? The answer to this problem has many important applications, and can help us answer the following questions: Who is the rumor source in online social networks? Which computer is the rst one infected by a computer virus? Who is the one who uploaded contraband materials to the Internet? Where is the source of an epidemic? We call this problem information source detection problem. This information source detection problem has been studied in [3]–[5] under the Susceptible-Infected (SI) model, in which susceptible nodes may be infected but infected nodes cannot re- cover. The authors formulated the problem as a maximum like- lihood estimation (MLE) problem and developed novel algo- rithms to detect the source. In this paper, we adopt the Susceptible-Infected-Recovered (SIR) model, a standard model of epidemics [6], [7]. The net- work is assumed to be an undirected graph, and each node in the network has three possible states: susceptible , infected , and recovered . Nodes in state can be infected and change to state , and nodes in state can recover and change to state . Recovered nodes cannot be infected again. We assume that ini- tially all nodes are in the susceptible state except one infected node (called the information source). The information source then infects its neighbors, and the information starts to spread in the network. Now given a snapshot of the network, in which we can identify infected nodes and healthy (susceptible and recov- ered) nodes (we assume susceptible nodes and recovered nodes are indistinguishable), the question is which node is the infor- mation source. We remark that it is very important to take recovery into consideration since recovery can happen due to various rea- sons in practice. For example, a contraband material uploader may delete the le, a computer may recover from a virus at- tack after anti-virus software removes the virus, and a user may delete the rumor from her/his blog. In order to solve the infor- mation source detection problem in these scenarios, we study the SIR model in this paper, which makes the problem signif- icantly more challenging than that in the SI model as we will explain in Section I-B. A. Main Results The main results of this paper are summarized as follows. Similar to the SI model, the information source detection problem can be formalized as an MLE problem. Unfortu- nately, to solve the MLE problem, we need to consider all possible infection sample paths, and for each sample path, we need to specify the infection time and recovery time 1063-6692 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: others

Post on 29-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

IEEE/ACM TRANSACTIONS ON NETWORKING 1

Information Source Detection in the SIR Model:A Sample-Path-Based Approach

Kai Zhu and Lei Ying, Member, IEEE

Abstract—This paper studies the problem of detecting the infor-mation source in a network in which the spread of information fol-lows the popular Susceptible-Infected-Recovered (SIR) model. Weassume all nodes in the network are in the susceptible state initially,except one single information source that is in the infected state.Susceptible nodes may then be infected by infected nodes, and in-fected nodes may recover and will not be infected again after re-covery. Given a snapshot of the network, from which we know thegraph topology and all infected nodes but cannot distinguish sus-ceptible nodes and recovered nodes, the problem is to find the in-formation source based on the snapshot and the network topology.We develop a sample-path-based approach where the estimator ofthe information source is chosen to be the root node associated withthe sample path that most likely leads to the observed snapshot.Weprove for infinite-trees, the estimator is a node that minimizes themaximum distance to the infected nodes. A reverse-infection algo-rithm is proposed to find such an estimator in general graphs. Weprove that for -regular trees such that , where isthe node degree and is the infection probability, the estimator iswithin a constant distance from the actual source with a high prob-ability, independent of the number of infected nodes and the timethe snapshot is taken. Our simulation results show that for tree net-works, the estimator produced by the reverse-infection algorithmis closer to the actual source than the one identified by the closenesscentrality heuristic. We then further evaluate the performance ofthe reverse infection algorithm on several real-world networks.

Index Terms— Information source detection, sample-path-basedapproach, Susceptible-Infected-Recovered (SIR) model.

I. INTRODUCTION

D IFFUSION processes in networks refer to the spreadof information throughout the networks and have been

widely used to model many real-world phenomena such as theoutbreak of epidemics, the spreading of gossips over onlinesocial networks, the spreading of computer virus over the In-ternet, and the adoption of innovations. Important properties ofdiffusion processes such as the outbreak thresholds [1] and theimpact of network topologies [2] have been intensively studied.

Manuscript received December 18, 2012; revised April 11, 2013; November04, 2013; May 19, 2014; and August 23, 2014; accepted October 06, 2014; ap-proved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor T. Karagiannis.This work was supported in part by the ARO under Grant W911NF1310279.The authors are with the School of Electrical, Computer and Energy

Engineering, Arizona State University, Tempe, AZ 85287 USA (e-mail:[email protected]; [email protected]).This paper has supplementary downloadable material available online at

http://ieeexplore.ieee.org.Color versions of one or more of the figures in this paper are available online

at http://ieeexplore.ieee.org.Digital Object Identifier 10.1109/TNET.2014.2364972

In this paper, we are interested in the reverse of the diffusionproblem: Given a snapshot of the diffusion process at time , canwe tell which node is the source of the diffusion? The answerto this problem has many important applications, and can helpus answer the following questions: Who is the rumor source inonline social networks?Which computer is the first one infectedby a computer virus? Who is the one who uploaded contrabandmaterials to the Internet? Where is the source of an epidemic?We call this problem information source detection problem.

This information source detection problem has been studiedin [3]–[5] under the Susceptible-Infected (SI) model, in whichsusceptible nodes may be infected but infected nodes cannot re-cover. The authors formulated the problem as a maximum like-lihood estimation (MLE) problem and developed novel algo-rithms to detect the source.In this paper, we adopt the Susceptible-Infected-Recovered

(SIR) model, a standard model of epidemics [6], [7]. The net-work is assumed to be an undirected graph, and each node in thenetwork has three possible states: susceptible , infected ,and recovered . Nodes in state can be infected and changeto state , and nodes in state can recover and change to state .Recovered nodes cannot be infected again. We assume that ini-tially all nodes are in the susceptible state except one infectednode (called the information source). The information sourcethen infects its neighbors, and the information starts to spread inthe network. Now given a snapshot of the network, in which wecan identify infected nodes and healthy (susceptible and recov-ered) nodes (we assume susceptible nodes and recovered nodesare indistinguishable), the question is which node is the infor-mation source.We remark that it is very important to take recovery into

consideration since recovery can happen due to various rea-sons in practice. For example, a contraband material uploadermay delete the file, a computer may recover from a virus at-tack after anti-virus software removes the virus, and a user maydelete the rumor from her/his blog. In order to solve the infor-mation source detection problem in these scenarios, we studythe SIR model in this paper, which makes the problem signif-icantly more challenging than that in the SI model as we willexplain in Section I-B.

A. Main Results

The main results of this paper are summarized as follows.• Similar to the SI model, the information source detectionproblem can be formalized as an MLE problem. Unfortu-nately, to solve the MLE problem, we need to consider allpossible infection sample paths, and for each sample path,we need to specify the infection time and recovery time

1063-6692 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE/ACM TRANSACTIONS ON NETWORKING

for each healthy node and the infection time for each in-fected node, so the number of possible sample paths is atthe order of , where is the network size and is thetime the snapshot is obtained. Therefore, theMLE problemis difficult to solve even when is known. The problembecomes much harder when is unknown, which is the as-sumption of this paper. To overcome this difficulty, we pro-pose a sample-path-based approach.We propose to find thesample path that most likely leads to the observed snapshotand view the source associated with that sample path as theinformation source. We call this problem optimal samplepath detection problem. We investigate the structure prop-erties of the optimal sample path in trees. Defining the in-fection eccentricity of a node to be the maximum distancefrom the node to infected nodes, we prove that the sourcenode of the optimal sample path is the node with the min-imum infection eccentricity. Since a node with the min-imum eccentricity in a graph is called the Jordan center, wecall the nodes with the minimum infection eccentricity theJordan infection centers. Therefore, the sample-path-basedestimator is one of the Jordan infection centers.

• We propose a low-complexity algorithm, called reverse in-fection algorithm, to find the sample-path-based estimatorin general graphs. In the algorithm, each infected nodebroadcasts its identity in the network, and the node whofirst collects all identities of infected nodes declares itselfas the information source, breaking ties based on the sumof distances to infected nodes. The running time of this al-gorithm is equal to the minimum infection eccentricity, andthe number of messages each node receives/sends at eachiteration is bounded by the degree of the node.

• We analyze the performance of the reverse infection algo-rithm on -regular trees and show that the algorithm canoutput a node within a constant distance from the actualsource with a high probability, independent of the numberof infected nodes and the time the snapshot is taken.

• We conduct extensive simulations over various networksto verify the performance of the reverse infection algo-rithm. The detection rate over regular trees is found to bearound 60% and is higher than that of the infection close-ness centrality (or called distance centrality) heuristic. Theinfection closeness of a node is defined to be the inverseof the sum of distances to infected nodes and the infec-tion closeness centrality heuristic is to claim the node withthe maximum infection closeness as the source. Note thatin [3]–[5], the authors proved the node with the maximuminfection closeness is the MLE on regular trees. We thenfurther evaluate the performance of the reverse infectionalgorithm on several real-world networks.

B. Related Work

There have been extensive studies on the spread of epi-demics in networks based on the SIR model (see [1], [2], [8],[9], and references within). The works most related to this paperare [3]–[5], in which the information source detection problemwas studied under the SI model. References [10]–[12] considerthe problem of detecting multiple information sources underthe SI model. The paper proposes an eigen-based algorithm

for locating the sources, and a single path idea to determinethe number of the sources. The single path used in [12], how-ever, is not a sample path of the SI process, so the approachis different from ours. This paper considers the SIR model,where infection nodes may recover, which can occur in manypractical scenarios as we have explained. Because of noderecovery, the information source detection problem under theSIR model differs significantly from that under the SI model.The differences are summarized as follows.• The set of possible sources in the SI model [3]–[5] is re-stricted to the set of infected nodes. In the SIR model, allnodes are possible information sources because we assumesusceptible nodes and recovered nodes are indistinguish-able, and a healthy node may be a recovered node, so it canbe the information source. Therefore, the number of can-didate sources is much larger in the SIR model than that inthe SI model.

• A key observation in [3]–[5] is that on regular trees, allpermitted permutations of infection sequences (a infectionsequence specifies the order at which nodes are infected)are equally likely under the SI model. The number of pos-sible permutations from a fixed root node, therefore, de-cides the likelihood of the root node being the source. How-ever, under the SIR model, different infection sequencesare associated with different probabilities, so counting thenumber of permutations is not sufficient.

• References [3]–[5] proved that the node with the maximumcloseness centrality is the MLE on regular-trees. We de-fine the infection closeness centrality to be the inverse ofthe sum of distances to infected nodes. Our simulationsshow that the sample-path-based estimator is closer to theactual source than the nodes with the maximum infectioncloseness.

Other related works include: 1) detecting the first adopter ofinnovations based on a game theoretical model [13] in which theauthors derived the MLE but the computational complexity isexponential in the number of nodes; 2) network forensics underthe SI model [14], where the goal is to distinguish an epidemicinfection from a random infection; 3) geospatial abduction prob-lems (see [15], [16], and references within).

II. PROBLEM FORMULATION

A. SIR Model for Information Propagation

Consider an undirected graph , where is theset of nodes and is the set of (undirected) edges. Each node

has three possible states: susceptible , infected ,and recovered . We assume a time-slotted system. Nodeschange their states at the beginning of each time-slot, and thestate of node in time-slot is denoted by Initially, allnodes are in state except node , which is in state and is theinformation source. At the beginning of each time-slot, each in-fected node infects each of its susceptible neighbors with prob-ability , independent of other nodes, i.e., a susceptible nodeis infected with probability if it has infectedneighbors. Each infected node recovers with probability , i.e.,its state changes from to with probability . In addition,we assume a recovered node cannot be infected again. Since

Page 3: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

ZHU AND YING: INFORMATION SOURCE DETECTION IN SIR MODEL 3

Fig. 1. Example of information propagation.

whether a node gets infected only depends on the states of itsneighbors and whether a node becomes a recovered node onlydepends on its own state in the previous time-slot, the infectionprocess can be modeled as a discrete-time Markov chainwhere is the states of all the nodes attime-slot . The initial state of this Markov chain isfor and .

B. Information Source Detection

We assume is not fully observable since we cannot dis-tinguish susceptible nodes and recovered ones. Hence, at time, we observe such that

if is in stateif is in state or .

The information source detection problem is to identify giventhe graph and , where is an unknown parameter.Fig. 1 is an example of the infection process. The left figure

shows the information propagation over time. The nodes oneach dotted line are the nodes that are infected at that time-slot,and the arrows indicate where the infection comes from (e.g.,node 4 is infected by node 2).The figure on the right is the network we observe, where the

shaded nodes are infected nodes and others are susceptible orrecovered nodes. The pair of numbers next to each node are thecorresponding infection time and recovery time. For example,node 3 was infected at time-slot 2 and recovered at time-slot 3.

indicates that the infection or recovery has yet occurred.Note that these two pieces of information are not available tous, and we include them in the figure to illustrate the infec-tion and recovery processes. If we observe the network at theend of time-slot 3, then the snapshot of the network is

, where the states are ordered according to theindices of the nodes.

C. Maximum Likelihood Detection

We define to be a sample pathof the infection process from 0 to . We remark that “samplepath” is a standard terminology in random processes and is de-fined to be a specific realization of a random process. In addi-tion, we define function such that

ifotherwise.

We say if for all . Identifyingthe information source can be formulated as a maximum likeli-hood detection problem as follows:

TABLE INOTATION TABLE

where is the probability to obtain samplepath given the information source is node .We note the difficulty of solving this maximum likelihood

problem is the exponential search space. For each such that, we need to decide its infection time and recovery time

(the node is in susceptible state if the infection time is ), i.e.,possible choices; for each such that , we need

to decide the infection time, i.e., possible choices. There-fore, even for a fixed , the number of possible sample pathsis at least at the order of , where is the number of nodesin the network. The exponential search space makes it compu-tationally expensive, if not impossible, to solve the maximumlikelihood problem. To overcome this difficulty, we propose asample-path-based approach that is discussed in Section II-D.

D. Sample-Path-Based Detection

Instead of using the MLE, we propose to identify the samplepath that most likely leads to , i.e.,

(1)

where The source node asso-ciated with is then viewed as the information source.We remark we assume only one single source in the networkand the network topology is given. Furthermore, we assume allobservations are accurate.The notations used in the paper are summarized in Table I.

III. SAMPLE-PATH-BASED DETECTION ON TREE NETWORKS

The optimal sample paths for general graphs are still difficultto obtain. In this section, we focus on tree networks and derivestructure properties of the optimal sample paths.First, we introduce the definition of eccentricity in graph

theory [17]. The eccentricity of a vertex is the maximumdistance between and any other vertex in the graph. TheJordan centers of a graph are the nodes that have the minimumeccentricity. For example, in Fig. 2, the eccentricity of nodeis 4, and the Jordan center is whose eccentricity is 3.

Page 4: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE/ACM TRANSACTIONS ON NETWORKING

Fig. 2. Example illustrating the infection eccentricity.

Following a similar terminology, we define the infection ec-centricity given as the maximum distance betweenand any infected nodes in the graph. Define the Jordan infec-tion centers of a graph to be the nodes with the minimum in-fection eccentricity given In Fig. 2, nodes , and

are observed to be infected. The infection eccentricities ofare , respectively, and the Jordan infection

center is .We will show that the source associated with the optimal

sample path is a node with the minimum infection eccentricity.We derive this result using three steps: First, assuming the in-formation source is , we analyze such that

i.e., is the time duration of the optimal sample path in whichis the information source. It turns out that equals the in-

fection eccentricity of node Considering Fig. 2 if the sourceis , then the time duration of the optimal sample path startingfrom is 2.In the second step, we consider two neighboring nodes, say

nodes and We will prove that if , then theoptimal sample path rooted at occurs with a higher proba-bility than the optimal sample path rooted at .Finally, at the third step, we will show that given any two

nodes and , if has the minimum infection eccentricity andhas a larger infection eccentricity, then there exists a path

from to along which the infection eccentricity monotoni-cally decreases, which implies that the source of the optimalsample path must be a Jordan infection center. For example, inFig. 2, node has a larger infection eccentricity than and

is the path along which the infection ec-centricity monotonically decreases from 5 to 2.

A. Optimal Time

Lemma 1: Consider a tree network rooted at and with in-finitely many levels. Assume the information source is the root,and the observed infection topology is , which contains atleast one infected node. If then the followinginequality holds:

where . In addition

Fig. 3. Pictorial description of Lemma 1.

where is the length of the shortest path between andand also called the distance between and , and is the set

of infected nodes.Intuition: A sample path with longer time duration involves

more probabilistic events (infection, recover, etc.). For example,an infected node contributes a factor of in each time-slot tothe overall probability to remain infected. Therefore, the samplepath is likely to be associated with a smaller probability.We prove Lemma 1 by using induction on the maximum dis-

tance between infected nodes and the source. When the max-imum distance is zero, i.e., the source node is the only observedinfected node, we will derive the closed-form expression of theprobability of the optimal sample path with duration . We willsee that the probability is a strictly decreasing function of , so

is optimal in this case.We then assume the lemma holds for the case that the max-

imum distance is . When the maximum distance is , weapply the induction hypothesis on each of the subtrees, as shownin Fig. 3 in the paper, to prove the lemma. Specifically, given theoptimal sample path with duration , on each subtree, we canconstruct a sub-sample path with one less time-slot but a higherprobability. Combining all sub-sample paths, we get a samplepath with duration , which occurs more likely than the optimalsample path with duration . The detailed proof of Lemma 1is in Appendix A.

B. Sample-Path-Based Estimator

After deriving , we have a unique for each . Thenext lemma states that the optimal sample path starting froma node with a smaller infection eccentricity is more likely tooccur. We denote by the tree rooted in , and by thetree rooted at but without the branch from For example,Fig. 3 shows , , , and , and Fig. 2 shows

and . The sample path from time-slot 0 to restrictedto is denoted by . Furthermore, denote by

the set of children of .Lemma 2: Consider a tree network with infinitely many

levels. Assume the information source is the root, and theobserved infection topology is , which contains at least oneinfected node. For such that , if ,then

where is the optimal sample path starting from node .

Page 5: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

ZHU AND YING: INFORMATION SOURCE DETECTION IN SIR MODEL 5

Fig. 4. Pictorial description of Lemma 2. Note .

Intuition: The key idea is to construct a sample path rootedat , which occurs with a higher probability than the optimalsample path rooted at . It is not difficult to see thatbased on the definition of the infection eccentricity. The networkis partitioned into two subtrees and . The infectionprocesses on these two subtrees are mutually independent afterboth and are infected. Based on this observation, given theoptimal sample path rooted at (called SU), we construct asample path rooted at (called SV) that has a higher probability.A pictorial example is shown in Fig. 4. As shown on the left ofFig. 4, SU has time-slots to form the observation inWe will show that is infected at the first time-slot in SU. SVis shown on the right of Fig. 4. In SV, is infected at the firsttime-slot. SU and SV on tree (light green part) has the sameduration. We can choose SV to mimic SU on tree , hencehaving the same probability. However, SV has a duration of

on (light blue part). Thus, we can find a SVwitha higher probability than SU when restricted to tree basedon Lemma 1. As a summary, SV has a higher probability thanSU. The detailed proof of Lemma 2 is presented in Appendix B.Next, we give a useful property of the Jordan infection centers

in the following lemma.Lemma 3: On a tree network with at least one infected

node, there exist at most two Jordan infection centers. Whenthe network has two Jordan infection centers, the two must beneighbors.Intuition: If two Jordan infection centers are not adjacent, we

pick the node that is on the shortest path between two Jordancenters and is adjacent to one Jordan infection center. We showthat this node has a smaller infection eccentricity, which is acontradiction. If any two Jordan infection centers are adjacent,more than two Jordan infection centers will form a clique, whichis impossible on a tree. Therefore, we have at most two Jordaninfection centers, and they are adjacent. The detailed proof ofLemma 3 is presented in Appendix C.Based on Lemmas 2 and 3, we finish this section with the

following theorem.Theorem 4: Consider a tree network with infinitely many

levels. Assume that the observed infection topology containsat least one infected node. Then, the source node associatedwith [the solution to the optimization problem (1)] isa Jordan infection center, i.e.,

Algorithm 1: Reverse Infection Algorithm

Input:Output: (the estimated information source)

1 Set .2 for do3 sends its ID to its neighbors.4 do5 for do6 if receives for the first time then7 Set and then broadcast the message

to its neighbors.8 .9 while No node receives distinct IDs;10 return , where is the set

of nodes who receive distinct IDs when the algorithmterminates. Ties are broken at random.

Intuition: The key of this proof is to show that along the pathfrom any node to a Jordan infection center, the infection ec-centricity strictly decreases by repeatedly using Lemma 2. Thedetailed proof of Lemma 4 is presented in Appendix D.

IV. REVERSE INFECTION ALGORITHM

Since in tree networks with infinitely many levels, the esti-mator based on the sample path approach is a Jordan infectioncenter, we view the Jordan infection centers as possible candi-dates of the information source. We next present a simple algo-rithm to find the information source in general networks. Thealgorithm is to first identify the Jordan infection centers, andthen break ties based on the sum of distances to infected nodes.The key idea of the algorithm is to let every infected node

broadcast a message containing its identity (ID) to its neighbors.Each node, after receiving messages from its neighbors, checkswhether the ID in the message has been received. If not, thenode records the ID (say ), the time at which the message isreceived (say ), and then broadcasts the ID to its neighbors.When a node receives the IDs of all infected nodes, it claimsitself as the information source, and the algorithm terminates. Ifthere are multiple nodes receiving all IDs at the same time, thetie is broken by selecting the node with the smallestThe tie-breaking rule we proposed is to choose the node with

the maximum infection closeness [18]. The closeness measuresthe efficiency of a node to spread information to all other nodes.The closeness of a node is the inverse of the sum of distancesfrom the node to any other nodes. In our model, we define theinfection closeness as the inverse of the sum of distances froma node to all infected nodes, which reflects the efficiency tospread information to infected nodes. We select a Jordan infec-tion center with the largest infection closeness, breaking ties atrandom.It is easy to verify that the set is the set of the Jordan infec-

tion centers. The running time of the algorithm is equal to theminimum infection eccentricity, and the number of messageseach node receives/sends during each time-slot is bounded byits degree. To implement the RI algorithm, each node maintainsan array of integers of size and an integer counter. We assign

Page 6: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE/ACM TRANSACTIONS ON NETWORKING

an integer index to each infected node. The values of that integerarray are the distances from the node to the infected nodes. Theinteger counter records the number of distinct indexes received.A message only contains the index of an infected node. At eachiteration, each node broadcasts the new indexes to its neighbors.When a node receives a new message, it checks the specificindex to see whether the index has been received. If not, it up-dates the value at the corresponding location of the array withthe current iteration number, which equals to the distance fromthe current node to the infected node with the received index.Otherwise, the message is discarded. Then, the node increasesthe value of its integer counter by one and checks whether thevalue is . All operations mentioned above have constant com-plexity. Therefore, the complexity of processing one message is

. Each edge is used to transmit at most messages in onedirection. Hence, there are at most messages to be han-dled. Therefore, the worse-case complexity of our RI algorithmis . We remark that we did not call the algorithm a“message-passing” algorithm to avoid the confusion with sta-tistical inference algorithms for solving sum product or maxproduct problems in graphical models.

V. PERFORMANCE ANALYSIS

The reverse infection algorithm is based on the structureproperties of the optimal sample paths on trees. While theMLE is the node that maximizes the likelihood of the snapshotamong all possible nodes, the sample-path-based estimatordoes not have such a guarantee. To demonstrate the effective-ness of the sample-path-based approach, we next show that on

-regular trees where each node has neighbors, theinformation source generated by the reverse infection algorithmis within a constant distance from the actual source with a highprobability, independent of the number of infected nodes andthe time at which the snapshot was taken.Theorem 5: Consider a -regular tree with infinitely

many levels where and . Assume that the ob-served infection topology contains at least one infected node.Given , there exists such that the distance between theoptimal sample path estimator and the actual source is withprobability , where is independent of the number of in-fected nodes and the time the snapshot was taken.Intuition: In the proof, we will show with a high probability

one of the following events will occur: 1) the infection processterminates within hops from the source; 2) at least nodesare infected in the -hop neighborhood of the source. When thefirst event occurs, it is easy to see that the detected source is aconstant distance from the actual source.When the second eventoccurs, we will study the infection processes starting from theinfected nodes that are within hops away from the source. Foreach node, we consider a branching process in which a node’soffsprings are the nodes that are immediately infected after thenode is infected. Hence, the branching process grows one levelat each time-slot. We will show that with a high probability twobranching processes starting from the nodes within hops fromthe source survive. This guarantees that we will have at least twoobserved infected nodes who are apart from eachother, which guarantees that the minimum infection eccentricityof the network is . Since the infection eccentricity of the

Fig. 5. Detection rates of the MLE, RI, and Closeness Centrality (CC) on reg-ular trees.

source node is at most , we can then conclude that the detectedsource, which has an infection eccentricity is not farfrom the actual source by using the fact the path between twonodes is unique on a tree. The detailed proof of Theorem 5 ispresented in Appendix E.

VI. SIMULATIONS

In this section, we evaluate the performance of the reverseinfection algorithm on different networks, including differenttree networks and some real-world networks.

A. Tree Networks

In this section, we evaluate the performance of the reverseinfection algorithm on tree networks. We compare the reverseinfection algorithm with the closeness centrality heuristic,which selects the node with the maximum infection closenessas the information source. Note that the node with the max-imum closeness is the maximum likelihood estimator of theinformation source on regular trees under the continuous-timeSI model [3]–[5]. For each simulation setting, we repeated thesimulation 1500 times to get the average detection rates.1) Small-Size Tree Networks: We first studied the perfor-

mance on small-size trees. The infection probability waschosen uniformly from , and the recovery probabilitywas chosen uniformly from . The infection process prop-agates time-slots, where was uniformly chosen from .To keep the size of infection topology small, we restricted thetotal number of infected and recovered nodes to be no morethan 100. For small-size trees, we first calculated the MLEusing dynamic programming for fixed and then searchingover for a large value of to find the optimalestimator.The detection rate is defined to be the fraction of experiments

in which the estimator coincides with the actual source. Wevaried from 2 to 10, and the results are shown in Fig. 5. Wecan see that the detection rate of the reverse infection algorithmis almost the same as that of the MLE, and is higher than that ofthe closeness centrality heuristic by approximately 20% whenthe degree is small and by 10% when the degree is large.2) General -Regular Tree Networks: We further conducted

our simulations on large-size -regular trees. The infectionprobability was chosen uniformly from , and the re-covery probability was chosen uniformly from . The

Page 7: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

ZHU AND YING: INFORMATION SOURCE DETECTION IN SIR MODEL 7

Fig. 6. Detection rates of the RI and CC algorithms on regular trees.

Fig. 7. Detection rates of the RI and CC algorithms on binomial random trees.

infection process propagates time-slots where was uniformlychosen from . We selected the networks in which the totalnumber of infected and recovered nodes is no more than 500.We varied from 2 to 10. Fig. 6 shows the detection rate

as a function of . We can see the detection rates of both thereverse infection and closeness centrality algorithms increaseas the degree increases and is higher than 60% whenHowever, the detection rate of the reverse infection algorithmis higher than that of the closeness centrality algorithm, and theaverage difference is 8.86%.3) Binomial Random Trees: In addition, we evaluated the

performance on binomial random trees where the number ofchildren of each node follows a binomial distribution withnumber of trials and success probability . We fixedand varied from 0.1 to 0.9. The durations of the infectionprocess and the observed infected networks were selectedaccording to the same rules for the -regular tree case. Theresults are shown in Fig. 7. Similar to the regular tree case,as increases, the tree is denser, which increases the numberof survived branching processes and the detection rate. Thereverse infection algorithm outperforms the closeness centralityalgorithm by 10.16% on average.

B. Real-World Networks

We next conducted experiments on three real-world net-works—the Internet Autonomous Systems network (IAS),1 theWikipedia who-votes-on-whom network (Wikipedia),1 and thepower grid network (PG).2 We compare the reverse infectionalgorithm to the CC algorithm and random guessing that

1Available at http://snap.stanford.edu/data/index.html2Available at http://www-personal.umich.edu/~mejn/netdata/

Fig. 8. Performance of the RI on the Internet Autonomous Systems network.(a) RI algorithm versus the RandomGuessing algorithm. (b) RI algorithm versusthe CC algorithm.

randomly selects a node and declares it as the informationsource. In the comparison to CC, we only included thoseexperiments in which the two algorithms produced differentestimators. In these networks, the infection probability waschosen uniformly from , and the recovery probabilitywas chosen uniformly from . Here, we chose small

infection probabilities since the network was of finite size, sothe infection process should be controlled to make sure thatnot all nodes were infected when the network was observed.The duration was an integer uniformly chosen from .We selected the networks in which the total number of infectedand recovered nodes was in the range of . For eachsetting, we repeated the simulation 5000 times to compute thehistograms.1) Internet Autonomous Systems Network: Fig. 8 shows the

results on the Internet Autonomous Systems network. An In-ternet autonomous system is a collection of connected routerswho use a common routing policy. The Internet AutonomousSystems network is obtained based on the recorded communi-cation between the Internet autonomous systems inferred fromOregon route-views on March 31, 2001. The network consistsof 10 670 nodes and 22 002 edges. According to Fig. 8(a), morethan 80% of the estimators identified by the reverse infectionalgorithm are no more than two hops away from the actualsources, compared to 10% under the random guessing. FromFig. 8(b), we can see that while the reverse infection algorithmhas a slightly lower frequency at 1-hop distance (21.9% versus27.2%), it has amuch higher frequency at 2-hop distance (57.4%versus 28.7%).2) Wikipedia Who-Votes-on-Whom Network: Fig. 9 shows

results on the Wikipedia who-votes-on-whom network, inwhich two nodes are connected if one user voted on the otherin the administrator promotion elections. The network has

Page 8: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE/ACM TRANSACTIONS ON NETWORKING

Fig. 9. Performance of the RI)on the Wikipedia who-votes-on-whom network.(a) RI algorithm versus the RandomGuessing algorithm. (b) RI algorithm versusthe CC algorithm.

100 736 links and 7066 nodes. We have similar observations asfor the Internet Autonomous Systems network: The majorityof the estimators produced by the reverse infection algorithmare no more than two hops away from the actual sources; onlyless than 20% of the estimators of random guessing are withintwo hops from the actual sources as shown in Fig. 9(a). Thecloseness centrality has a slightly higher frequency at 1-hopdistance, but much lower frequency at 2-hop distance as shownin Fig. 9(b).3) Power Grid Network: Fig. 10(a) shows the results on

the power grid, which has 4941 nodes and 6594 edges. As wecan see, the reverse infection algorithm performs better thanthe random guessing. The peak of the reverse infection algo-rithm appears at the third hop versus the 17th hop under randomguessing as shown in Fig. 10(a). The reverse infection algorithmhas a higher frequency than the closeness centrality algorithmwhen the hop distance is no more than 4 on the power networkin Fig. 10(b).

C. Impact of Recovered Nodes

So far, we have assumed that susceptible nodes and recov-ered nodes are indistinguishable. In certain scenarios, the set ofrecovered nodes may be identified as well. The questions, there-fore, are the following: Can the information about the recoverednodes improve the performance of the algorithms, and how doesRI compare to CC when the recovered nodes are known? To an-swer these two questions, we conducted the experiments on thebinomial random trees and the power grid network. The sim-ulation settings are the same as those in the previous sections.When the recovered nodes are identified, the Jordan infectioncenters are defined with respect to all infected and recovered

Fig. 10. Performance of the RI on the power grid network. (a) RI algorithmversus the Random Guessing algorithm. (b) RI algorithm versus the CCalgorithm.

nodes. Similarly, in CC, the infection closeness is also definedwith respected to all infected and recovered nodes.The results are shown in Fig. 11. In Fig. 11(a), we can see that

the average distance from the estimator to the actual source re-duces when the recovered nodes are known and used as infectednodes. Hence, the information about recovered nodes does help.In addition, RI is better than CC. For the power grid network,we again observe that the information of infected nodes im-proves the performance. However, RI and CC have similar per-formance when the recovered nodes are known.

VII. CONCLUSION

In this paper, we developed a sample-path-based approach tofind the information source under the SIRmodel.We proved thatthe sample-path-based estimator is a node with the minimum in-fection eccentricity. Based on that, a reverse infection algorithmhas been proposed. We analyzed the performance of the reverseinfection algorithm on regular trees and showed that with highprobability the distance between the estimator and actual sourceis a constant, independent of the number of infected nodes andthe time the network was observed. We evaluated the perfor-mance of the proposed reverse infection algorithm on severaldifferent network topologies.

APPENDIX APROOF OF LEMMA 1

Table II summarizes extra notations used in the proof.Proof: We start from the case where the time difference of

two sample paths is one, i.e., we will show that

(2)

Page 9: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

ZHU AND YING: INFORMATION SOURCE DETECTION IN SIR MODEL 9

Fig. 11. Performance comparison between the RI and the CC on SIR Modelwith recovered node known. The error bars in (a) represent the 25% and 75%percentiles. (a) Binomial random tree. (b) Power grid network.

TABLE IIADDITIONAL NOTATION TABLE

We divide all possible infection topologies into countablesubsets , where is the set of infection topologies wherethe largest distance from to an infected node is . is thetopology where there is only one infected node—the root node. Note that if no infected node is observed, no algorithm per-

forms better than a random guess. To prove (2), we use inductionover .Step 1: First, we consider the case . All the sample paths

considered in Step 1 lead to observation . We have

where the last equality holds since is the only infected node inthe network at time , which requires for .Node has two possible states or .Step 1.a: is susceptible if it was not infected within time-

slots. In each time-slot, tries to infect with probability .The probability that is susceptible at time-slot is

which implies that

(3)

if .Step 1.b: If is in the recovered state, we denote by andits infection and recovery times, respectively. Then, we have

if

where is the probability that nodewas infected at time and recovered at time . Since isalso an infinite tree, there exists at least one node suchthat the node is in the susceptible state but its parent node (saynode ) is in the recovered state. We denote by theset of nodes that are on subtree but not on subtree .Then

(4)

(5)

(6)

(7)

(8)

where (7) holds because remained to be susceptible duringthe time-slots at which was in the infected state and(8) holds because . The maximum value of

can be achieved in the sample pathin which was infected and then recovered in the next time-slotso that was vulnerable to infection only in one time-slot.Furthermore

is maximized when , , i.e., was infected at thefirst time-slot and recovered in the second time-slot. Therefore,if

(9)

Step 1.c: Define to be the optimal solution to

For , we have

(10)

Page 10: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

10 IEEE/ACM TRANSACTIONS ON NETWORKING

For , since all are in the susceptible state

(11)

For , according to (3) and (9)

(12)

(13)

Note that is fixed in this optimization problem and (13) is anonincreasing function of . Since

In summary, is a nonincreasing function ofwhen .

Step 2: Assume (2) holds for , and consider .Clearly, for each such that

Furthermore, the set of subtrees isdivided into two subsets:

and , where is the vector ofrestricted to subtree . In Fig. 3, and

. We note that given , the infectionprocesses on the subtrees are mutually independent.Step 2.a: Recall that is the set of subtrees having no in-

fected nodes. Following the argument for the case, wecan obtain that if , then

when and

when . So is nonincreasing ingiven any .Step 2.b: For , given the sample path

, we will construct a sample path thatoccurs with a higher probability. Denote the infection time ofin sample path by . We let denote the

infection time in sample path .If , we choose , i.e., is infected one time-

slot later in than that in . Assume the infectionprocesses after was infected are the same in the two samplepaths and . Therefore, wehave

and

where is the probability ofafter was infected. Since the sample pathsand are the same after

was infected, we obtain

Therefore, with , we get

If , we set .3 Based on the induction assump-tion, for since , we have

where :. Therefore, given any , we can

always find a corresponding sample path , whichoccurs with a higher probability.Step 2.c: Now we consider the sample path and

denote by the recovery time of node in . Wenow construct a sample path as follows.• If , i.e., is an infected node, then ,where is the recovery time of in .

• If , we choose .• If , we choose .

We further complete by having optimal ones on andconstructing the ones in following Step 2.b. According toSteps 2.a and 2.b, it is easy to verify that occurs with ahigher probability than . Therefore, we conclude thatinequality (2) holds for , hence for any accordingto the principle of induction.Step 3: Repeatedly applying inequality (2), we obtain thatis the minimum amount of time required to produce the ob-

served infection topology. The minimum time required is equalto the maximum distance from to an infected node. There-fore, the lemma holds.

APPENDIX BPROOF OF LEMMA 2

Proof: Step 1: The first step is to show . Weclaim . Otherwise, all infected node are on .Since on a tree, can only reach nodes in through edge

, which contradicts .If , , we have

3Note that we cannot apply the same argument to becausemay not be feasible in a valid .

Page 11: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

ZHU AND YING: INFORMATION SOURCE DETECTION IN SIR MODEL 11

and

Hence

which implies that

i.e., .If , all infected nodes are in , so it is obvious

.Step 2: In this step, we will prove that on the sample

path . If on , then

Note that according to the definition of and , withintime-slots, node can infect all infected nodes on . Since

, the infected node farthest from node must beon , which implies that there exists a node suchthat and . Hence, nodecannot reach within time-slots, which contradicts thefact that the infection can spread from node to withintime-slots along the sample path . Therefore, .Step 3: Now given sample path , we construct

, which occurs with a higher probability. We dividethe sample path into two parts along subtreesand . Since , we have

where is the probability that is infected at the first time-slot.Suppose in , node was infected at the first time-slot,then

For the subtree , given , in which, we construct the partial sample path to beidentical to except that all events occur onetime-slot earlier, i.e.,

This is feasible because . Then

For the subtree , we construct such that

Based on Lemma 1, we have

Therefore, given the optimal sample path rooted at , we haveconstructed a sample path rooted at which occurs with a higherprobability. The lemma holds.

APPENDIX CPROOF OF LEMMA 3

Proof: First, we claim if there is more than one Jordaninfection center, they must be adjacent. Suppose aretwo Jordan infection centers and . Supposeand are not adjacent, i.e., . Then, there exists

such that

and

i.e., is a neighbor of and is on the shortest path betweenand . Note in a tree structure is unique.If , then

which contradicts the fact that is a Jordan infection center.If . Since

i.e.,

On the other hand, since

In a summary,

which contradicts the fact that the minimum infection eccen-tricity is .Therefore, all Jordan infection centers must be adjacent to

each other. However, suppose there exist infection eccen-tricity centers where , they would form a clique withnodes, which contradicts the fact that the graph is a tree. There-fore, there exist at most two adjacent Jordan infection centers.

APPENDIX DPROOF OF THEOREM 4

Proof: We assume the network has two Jordan infectioncenters: and , and assume . The sameargument works for the case where the network has only oneJordan infection center.

Page 12: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

12 IEEE/ACM TRANSACTIONS ON NETWORKING

Fig. 12. Pictorial description of the positions of nodes , , , and .

Based on Lemma 3, and must be adjacent. We will showfor any , there exists a path from to (or )along which the infection eccentricity strictly decreases.Step 1: First, it is easy to see from Fig. 12 that

. We next show that there exists a nodesuch that the equality holds.Suppose that for any , which

implies

Since and are both Jordan infection centers, we have

In a summary,

This contradicts the fact that . Therefore, thereexists such that

Step 2: Similarly,

and there exists a node such that the equality holds.Step 3: Next, we consider , and assumeand . Then, for any , we have

and there exists such that the equality holds. Onthe other hand,

Therefore, we conclude that

so the infection eccentricity decreases along the path fromto .Step 4: Repeatedly applying Lemma 2 along the path from

node to , we can conclude that the optimal sample path rootedat node is more likely to occur than the optimal sample pathrooted at node . Therefore, the root node associated with theoptimal sample path must be a Jordan infection center,and the theorem holds.

APPENDIX EPROOF OF THEOREM 5

Proof: Consider the tree rooted at the informationsource . We say is at level 0. We denote by the setof infected and recovered nodes at level . Furthermore, wedefine to be the set of infected and recovered nodes atlevel whose parents are in set and who were infectedwithin time-slots after their parents were infected. We assume

. In addition, let and .Note

and given and

i.e., the infection times of nodes in differ by at most(note that the difference is not since the parents of andmay be infected at different times). Our proof is based on the

Galton Watson (GW) branching process [19]. A GW branchingprocess is a stochastic process that evolves according tothe recurrence formula and

where is a set of random variables, taking values from non-negative integers. The distribution of is called the offspringdistribution of the branching process. In a -regular tree,the evolution of is a branching process, where the offspringdistribution is a function of . We use to denote the corre-sponding branching process, and to denote the number ofoffsprings at level , i.e., (we use these two nota-tions interchangeably).Each infected node can be viewed as the source of branching

processes on the subtree rooted at the node. We define tobe the number of survived branching processes whose rootsare in set , where a branching process survives if it never diesout.Now given , we consider the following events:• Event 1: ;• Event 2: . It is equivalent to for some

. In other words, at least two branching processesstarting from survive for some .

We note that these two are disjoint events.When , no node at level is infected, and the infection

process terminates at level . When there is at least oneinfected node in , since , the minimum infection

Page 13: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

ZHU AND YING: INFORMATION SOURCE DETECTION IN SIR MODEL 13

Fig. 13. Pictorial description of the positions of , , , and .

eccentricity is at most . Therefore, the distance betweenand is no more than .Given for some , we will argue that the distance

between the sample-path-based estimator and the actual one isupper-bounded by . Consider Fig. 13, where theshaded nodes are infected and recovered nodes. We will showthat if two branching processes starting from survive,a node at level cannot be a Jordan infectioncenter. Recall that at time , the distance between any infectednode and the actual source is no more than , which implies theeccentricity of a Jordan infection center is . Now considera node at level . Recall that at least twobranching processes starting from level survive. Letbe the root of a survived branching process, and assumenode is not on the subtree rooted at . Furthermore, assumeis an infected node at the lowest level on subtree . Since

the branching process survives, the infection process prop-agates one level lower at each time-slot, and node is at level

.From Fig. 13, it is easy to see that the distance between andis at least

which occurs when the first common predecessor of nodesand is at level. Note that the common predecessor cannotappear at level since is not on . Since , theinfection time of node is no later than , i.e., .Therefore, the distance between and is at least , whichis larger than . Hence, cannot be a Jordan infection center.Since , any node at or below level cannot bea Jordan infection center. In a summary, if event 2 occurs, thenwe have

We next show that given any , we can find sufficiently largeand , independent of and the number of infected nodes,

such that the probability that either event 1 or event 2 occurs isat least .Given and , we define

i.e., is the first level at which has more than nodes. Wefirst have

for some

and

Note that we have

(14)

According to Lemma 6 in the supplementarymaterial, given any, we can find a sufficiently large such that

which implies that for sufficiently large

We can then conclude

for some

where becauseimplies that for .According to Lemmas 7 and 8 in the supplementary material,

given any and , there exist sufficiently large andsuch that

and

Hence, we have

for some

Page 14: IEEE/ACM TRANSACTIONS ON NETWORKING 1 Information …inlab.lab.asu.edu/Publications/ZhuYin_ta.pdf · the SI model. The paper proposes an eigen-based algorithm for locating the sources,

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

14 IEEE/ACM TRANSACTIONS ON NETWORKING

Now choosing for some , we have

for some

Now let denote the number of infected nodes in the ob-servation . Define events and

. We have

Since implies that , we have

Note that is a positive constant since thebranching process starting from the information source surviveswith nonzero probability. The theorem holds by choosing

.

REFERENCES[1] C. Moore and M. E. J. Newman, “Epidemics and percolation in small-

world networks,” Phys. Rev. E, vol. 61, no. 5, pp. 5678–5682, 2000.[2] A. Ganesh, L. Massoulie, and D. Towsley, “The effect of network

topology on the spread of epidemics,” in Proc. IEEE INFOCOM,Miami, FL, USA, Mar. 2005, pp. 1455–1466.

[3] D. Shah and T. Zaman, “Detecting sources of computer viruses in net-works: Theory and experiment,” in Proc. ACM SIGMETRICS, NewYork, NY, USA, 2010, pp. 203–214.

[4] D. Shah and T. Zaman, “Rumors in a network: Who’s the culprit?,”IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 5163–5181, Aug. 2011.

[5] D. Shah and T. Zaman, “Rumor centrality: a universal source detector,”in Proc. ACM SIGMETRICS, London, U.K., 2012, pp. 199–210.

[6] N. T. J. Bailey, The Mathematical Theory of Infectious Diseases andIts Applications. New York, NY, USA: Hafner, 1975.

[7] D. Easley and J. Kleinberg, Networks, Crowds, and Markets: Rea-soning About a Highly Connected World. Cambridge, U.K.: Cam-bridge Univ. Press, 2010.

[8] M. E. J. Newman, “The spread of epidemic disease on networks,” Phys.Rev. E, vol. 66, no. 1, p. 016128, Jul. 2002.

[9] R. Pastor-Satorras and A. Vespignani, “Epidemic spreading in scale-free networks,” Phys. Rev. Lett., vol. 86, no. 14, pp. 3200–3203, 2001.

[10] W. Luo and W. P. Tay, “Identifying multiple infection sources in anetwork,” in Proc. Asilomar Conf. Signals, Syst. Comput., 2012, pp.1483–1489.

[11] W. Luo, W. P. Tay, and M. Leng, “Identifying infection sources andregions in large networks,” IEEE Trans. Signal Process., vol. 61, no.11, pp. 2850–2865, Jun. 2013.

[12] B. A. Prakash, J. Vreeken, and C. Faloutsos, “Spotting culprits in epi-demics: How many and which ones?,” in Proc. IEEE ICDM, Brussels,Belgium, 2012, pp. 11–20.

[13] V. G. Subramanian and R. Berry, “Spotting trendsetters: Inference fornetwork games,” in Proc. Annu. Allerton Conf. Commun., Control,Comput., 2012, pp. 1697–1704.

[14] C. Milling, C. Caramanis, S. Mannor, and S. Shakkottai, “Networkforensics: Random infection vs spreading epidemic,” in Proc. ACMSIGMETRICS, 2012, pp. 223–234.

[15] P. Shakarian, V. S. Subrahmanian, and M. L. Sapino, “GAPs: Geospa-tial abduction problems,” Trans. Intell. Syst. Technol., vol. 3, no. 1, pp.1–27, Oct. 2011.

[16] P. Shakarian and V. S. Subrahmanian, Geospatial Abduction: Princi-ples and Practice. New York, NY, USA: Springer, 2011.

[17] F. Harary, Graph Theory. Reading, MA, USA: Addison-Wesley,1991.

[18] D. Koschutzki et al., “Centrality indices,” in Network Analysis, ser.Lecture Notes in Computer Science. Berlin, Germany: Springer,2005, vol. 3418, pp. 16–61.

[19] P. Haccou, P. Jagers, and V. A. Vatutin, Branching Processes: Varia-tion, Growth, and Extinction of Populations. Cambridge, U.K.: Cam-bridge Univ. Press, 2005.

[20] M. Mitzenmacher and E. Upfal, Probability and Computing: Random-ized Algorithms and Probabilistic Analysis. Cambridge, U.K.: Cam-bridge Univ. Press, 2005.

Kai Zhu received the B.E. degree in electronics en-gineering from Tsinghua University, Beijing, China,in 2010, and is currently pursuing the Ph.D. degree inelectrical, computer, and energy engineering at Ari-zona State University, Tempe, AZ, USA.His research interest is in social networks.

Lei Ying (M’08) received the B.E. degree fromTsinghua University, Beijing, China, in 2001, andthe M.S. and Ph.D. degrees in electrical and com-puter engineering from the University of Illinois atUrbana-Champaign, Urbana, IL, USA, in 2003 and2007, respectively.He currently is an Associate Professor with the

School of Electrical, Computer and Energy Engi-neering, Arizona State University, Tempe, AZ, USA.He was the Northrop Grumman Assistant Professorwith the Department of Electrical and Computer

Engineering, Iowa State University, Ames, IA, USA, from 2010 to 2012.He is coauthor with R. Srikant of the book Communication Networks: AnOptimization, Control and Stochastic Networks Perspective (Cambridge Univ.Press, 2014). His research interest is broadly in the area of stochastic networks,including cloud computing, communication networks, and social networks.Dr. Ying is an Associate Editor of the IEEE/ACM TRANSACTIONS ON

NETWORKING. He won the Young Investigator Award from the Defense ThreatReduction Agency (DTRA) in 2009 and the NSF CAREER Award in 2010.