ТОП просматриваемых книг сайта:
Intelligent Data Analytics for Terror Threat Prediction. Группа авторов
Читать онлайн.Название Intelligent Data Analytics for Terror Threat Prediction
Год выпуска 0
isbn 9781119711513
Автор произведения Группа авторов
Жанр Программы
Издательство John Wiley & Sons Limited
This observation gives limited information as discussed earlier in Section 1.5.1.2.2. It is useful for single rumor source detection on social networks, if multiple snapshots are taken in various time intervals. Single snapshot gives limited information about network and states of nodes whereas multiple snapshots give more information about these. Single source detection by applying rumor centrality metric and multiple observations is discussed [37]. They consider tree-like network and used SI model for rumor diffusion, they proves that multiple observations always improve detectable performance. Even two independent snapshot observations increases probability of source detection compare to single snapshot observation. The authors shown that source detection performance increases for multiple observations and decreases with number of infected nodes. After multiple observations use maximum likelihood estimator to find rumor centrality and from it to find rumor source in tree-like network and graph network. Graph network uses BFS technique to transform graph into BFS tree as discussed in above section. The problem in snapshot observation is if SIR model is used for information diffusion, it cannot distinguish between susceptible and recovered nodes.
1.6.1.1.3 Monitor Observation
Monitor observation is possible by inserting sensor nodes in network, and monitor these nodes behavior. Sensor nodes placed in network gather information about states of nodes as discussed in Section 1.5.1.2.3. Monitor observation is one of the factors and is useful in identifying source in network. There is chance of missing information about some nodes where sensor nodes are not placed and if number of sensor nodes increases then system performance decreases. But if this observation is considered for source identification, then on collected information use rumor centrality measures to find source of rumor either in tree-like network or general network. In Ref. [49] proposed sensor nodes do not contain any textual information in the network to detect rumor source.
The above three observations are used to detect RS in social networks.
1.6.1.2 Query-Based Approach
This approach is proposed in Ref. [18] for source detection. It is purely based on queries and answers to find source. In general, asking queries gives information about rumor source. These queries like “Who shares you the rumor?” or “Are you the source of rumor?” and answers to these queries increases chance of rumor source identification. The authors considers two types of queries: 1) simple batch queries are simple queries as mentioned earlier, and 2) interactive queries are queries which may contain untruth queries and answers with some probability. To quantify the untruthfulness, they propose estimate algorithms for those queries. Author’s uses centrality measures and SI diffusion model and they guarantee that quantifying untruth or truth from these queries and asking these kinds of queries significantly improve performance of source identification in tree-like structure and on Facebook network.
1.6.1.3 Anti-Rumor-Based Approach
It is based on anti-rumor diffusion over the network. To broaden antirumor knowledge in the network, monitor based observation is proposed in Ref. [19] for rumor source detection. They injected monitor or sensor nodes to diffuse “anti-rumor” messages inside the network, nodes are called as protectors. Initially, authors prove that injecting anti-rumors decreases performance for Maximum-Likelihood (ML) estimator in largescale networks. If rumors receive anti-rumor find distance between rumor source and protector. To find this distance they propose two algorithms 1) learn distance distributor parameter under ML estimator and 2) Rumor source detector under Maximum-A-Posterior-Estimator (MAPE) based on the learnt parameters. These two learning algorithms give distance between rumor source and protector, based on the difference analyze the actual rumor source.
1.6.2 Multiple Source Detection
Many researchers believe that rumor diffusion occurs from only a single source in network, but in general people use several sources to boost the rumor diffusion quickly. Single source identification is comparatively easier and several approaches have already been developed, which are discussed in Section 1.6.1. In this section multiple source of rumor in network is discussed. Detection of multiple sources is proposed in Ref. [48]. They use BFS technique and give final tree after several observations. Following section explains some techniques to find multiple source of rumor. There are four methods: ranking-based, network partitioning, approximation-based and community-based.
In network partitioning rumor centrality is evaluated in two phases [20]. First phase, identify infected nodes and classify into groups, source in each group identified using rumor center method. Second phase, these recognized sources classified into two and in each again uses source estimator to identify source in that group.
Community-based is proposed in Ref. [21], by partitioning the community to identify several sources in every community. To recognize unseen and improved nodes use reverse diffusion approach through SIR model. Community detection method group all infected nodes into groups. Then apply single source detection approaches to find rumor source in each community. There are two more multiple source detection approaches such as ranking-based and approximation-based. For details see Ref. [10].
1.7 Conclusion
Social networks like Facebook, Twitter, and WhatsApp are generating huge amount of data from their user profiles. But generation of huge data creates real world problems like rumor diffusion in network. It is difficult to find that whether information spreading in network is rumor or not and as each network has many users, it is not possible to find who spread that rumor. So classification of rumors and facts and finding rumor source in network is an emerging challenge in society. This chapter surveys various social networks, their features, cyber-crime and its classifications, and how these cyber-crimes occur in social networks. This chapter is specifically purposeful on cyber-crime in social network i.e. rumor diffusion. There are some popular classification algorithms such as Naïve Bayes and support vector machine classifiers to distinguish between rumors and facts. Next, to find source of a rumor consider three factors such as network structure, diffusion models, and centrality measures. There are two kinds of sources: 1) single source and 2) multiple source. To find single source use three approaches such as anti-rumor-based, query-based, and network observation. For multiple sources of rumor use several approaches like approximation-based, ranking-based, network partitioning, and community-based. These approaches improve probability of rumor detection and its source identification in social networks. However, there are many classification techniques and still some are not easy to use in finding based on existing features. So there is a need to consider more features and much better classification techniques. In rumor source detection, current research mostly focused on single source identification. But nowadays, multiple users are spreading rumors for fast dissemination over the social networks. Thus, there is need of developing new techniques to detect multiple sources of rumor.
References
1. Bayleyegn, B. W., and Buta, D. B. The Effect of Social Media on Study Habits of Students:-A case study at Oda Bultum University, Oromia Regional State, Ethiopia. Global Journal of Management And Business Research, 2019.
2. Guille, A., Hacid, H., Favre, C., Zighed, D.A., Information diffusion in online social networks: A survey. ACM Sigmod Rec., 42, 2, 17–28, 2013.
3. Kapoor, K. K., Tamilmani, K., Rana, N. P., Patil, P., Dwivedi, Y. K., & Nerur, S. Advances in social media research: Past, present and future. Information Systems Frontiers, 20(3), 531–558, 2018.
4. Bakshy, E., Rosenn, I., Marlow, C., & Adamic, L. (2012, April). The role of social networks