Part IISource Identification of Malicious Attack Propagation