Skip to main content
Erschienen in: Soft Computing 9/2020

29.11.2019 | Focus

An unsupervised ensemble framework for node anomaly behavior detection in social network

Erschienen in: Soft Computing | Ausgabe 9/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Large-scale and dynamic networks arise in cyberspace and financial security. Given a dynamic network, it is crucial to detect structural anomalies, such as node behaviors deviate from underlying majority of the network. However, anomaly analysis for dynamic networks is difficult to precisely detect the anomalous behaviors of nodes because it usually ignores the evolutionary behaviors of different nodes. Our work taps into this gap and proposes an unsupervised ensemble framework for node temporal behavior modeling and node behavior real-time anomaly detection. Specifically, a latent space model is used to model the node behavior; each node is assigned a probability distribution across a small set of roles based on that node’s features. The evolutionary behavior of node is represented as node roles change over time and the anomalies of node are identified as deviations from expected roles. The entropy-based ensembles method is proposed to combine with multiple unsupervised anomaly detectors to yield robust performances, which achieves the real-time anomaly detection for different types of node behaviors. Finally, we show the effectiveness of the proposed method on Enron network in the experiments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Akoglu L, Faloutsos C (2010) Event Detection in time series of mobile communication graphs. In: 27th army science conference Akoglu L, Faloutsos C (2010) Event Detection in time series of mobile communication graphs. In: 27th army science conference
Zurück zum Zitat Akoglu L, McGlohon M, Faloutsos C (2010) Oddball: spotting anomalies in weighted graphs. In: PAKDD, vol 2, pp 410–421 Akoglu L, McGlohon M, Faloutsos C (2010) Oddball: spotting anomalies in weighted graphs. In: PAKDD, vol 2, pp 410–421
Zurück zum Zitat Akoglu L, Tong H, Koutra D (2015) Graph-based anomaly detection and description: a survey. Data Min Knowl Disc 29(3):626–688MathSciNetCrossRef Akoglu L, Tong H, Koutra D (2015) Graph-based anomaly detection and description: a survey. Data Min Knowl Disc 29(3):626–688MathSciNetCrossRef
Zurück zum Zitat Bereziński P, Jasiul B, Szpyrka M (2015) An entropy-based network anomaly detection method. Entropy 17(4):2367–2408CrossRef Bereziński P, Jasiul B, Szpyrka M (2015) An entropy-based network anomaly detection method. Entropy 17(4):2367–2408CrossRef
Zurück zum Zitat Breunig MM, Kriegel H-P, Ng RT et al (2000) LOF: identifying density-based local outliers. In: SIGMOD conference, pp 93–104 Breunig MM, Kriegel H-P, Ng RT et al (2000) LOF: identifying density-based local outliers. In: SIGMOD conference, pp 93–104
Zurück zum Zitat Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):15CrossRef Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):15CrossRef
Zurück zum Zitat Chen H, Reid E, Sinai J (2008) Terrorism informatics: knowledge management and data mining for homeland security. Springer, BerlinCrossRef Chen H, Reid E, Sinai J (2008) Terrorism informatics: knowledge management and data mining for homeland security. Springer, BerlinCrossRef
Zurück zum Zitat Ding Z, Fei M, Dajun D, Yang F (2017) Streaming data anomaly detection method based on hyper-grid structure and online ensemble learning. Soft Comput 21(20):5905–5917CrossRef Ding Z, Fei M, Dajun D, Yang F (2017) Streaming data anomaly detection method based on hyper-grid structure and online ensemble learning. Soft Comput 21(20):5905–5917CrossRef
Zurück zum Zitat Drezewski R, Sepielak J, Filipkowski W (2015) The application of social network analysis algorithms in a system supporting money laundering detection. Inf Sci 295:18–32MathSciNetCrossRef Drezewski R, Sepielak J, Filipkowski W (2015) The application of social network analysis algorithms in a system supporting money laundering detection. Inf Sci 295:18–32MathSciNetCrossRef
Zurück zum Zitat Gao J, Liang F, Fan W et al (2010) On community outliers and their efficient detection in information networks. In: KDD, pp 813–822 Gao J, Liang F, Fan W et al (2010) On community outliers and their efficient detection in information networks. In: KDD, pp 813–822
Zurück zum Zitat Gupta M, Gao J, Sun Y et al (2012) Community trend outlier detection using soft temporal pattern mining. ECML/PKDD 2:692–708 Gupta M, Gao J, Sun Y et al (2012) Community trend outlier detection using soft temporal pattern mining. ECML/PKDD 2:692–708
Zurück zum Zitat Gupta M, Gao J, Sun Y et al (2012) Integrating community matching and outlier detection for mining evolutionary community outliers. In: KDD, pp 859–867 Gupta M, Gao J, Sun Y et al (2012) Integrating community matching and outlier detection for mining evolutionary community outliers. In: KDD, pp 859–867
Zurück zum Zitat Henderson K, Gallagher B, Li L et al (2011) It’s who you know: graph mining using recursive structural features. In: KDD, pp 663–671 Henderson K, Gallagher B, Li L et al (2011) It’s who you know: graph mining using recursive structural features. In: KDD, pp 663–671
Zurück zum Zitat Huang D, Mu D, Yang L, Cai X (2018) CoDetect: financial fraud detection with anomaly feature detection. IEEE Access 6:19161–19174CrossRef Huang D, Mu D, Yang L, Cai X (2018) CoDetect: financial fraud detection with anomaly feature detection. IEEE Access 6:19161–19174CrossRef
Zurück zum Zitat Jiao W, Muhua Z, zike Z, Wei W et al (2018) A model of spreading of sudden events on social networks. CHAOS 28(3):033113MathSciNetCrossRef Jiao W, Muhua Z, zike Z, Wei W et al (2018) A model of spreading of sudden events on social networks. CHAOS 28(3):033113MathSciNetCrossRef
Zurück zum Zitat Kannan KS, Manoj K (2015) Outlier detection in multivariate data. Appl Math Sci 9(47):2317–2324 Kannan KS, Manoj K (2015) Outlier detection in multivariate data. Appl Math Sci 9(47):2317–2324
Zurück zum Zitat Kriegel H-P, Kroger P, Schubert E et al (2011) Interpreting and unifying outlier scores. In: SDM, pp 13–24 Kriegel H-P, Kroger P, Schubert E et al (2011) Interpreting and unifying outlier scores. In: SDM, pp 13–24
Zurück zum Zitat Lanham MJ, Morgan GP, Carley KM (2014) Social network modeling and agent-based simulation in support of crisis de-escalation. IEEE Trans Syst Man Cybern Syst 44(1):103–110CrossRef Lanham MJ, Morgan GP, Carley KM (2014) Social network modeling and agent-based simulation in support of crisis de-escalation. IEEE Trans Syst Man Cybern Syst 44(1):103–110CrossRef
Zurück zum Zitat Lee DD, Seung HS (1999) Learning the parts of objects by non-negative matrix factorization. Nature 401(6755):788–791CrossRef Lee DD, Seung HS (1999) Learning the parts of objects by non-negative matrix factorization. Nature 401(6755):788–791CrossRef
Zurück zum Zitat Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inform Sci Technol 58(7):1019–1031CrossRef Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inform Sci Technol 58(7):1019–1031CrossRef
Zurück zum Zitat Palladino A, Thissen CJ (2018) Cyber anomaly detection using graph-node role-dynamics. In: Proceedings of dynamic and novel advances in machine learning and intelligent cyber security workshop (DYNAMICS’18). ACM, New York, NY, USA Palladino A, Thissen CJ (2018) Cyber anomaly detection using graph-node role-dynamics. In: Proceedings of dynamic and novel advances in machine learning and intelligent cyber security workshop (DYNAMICS’18). ACM, New York, NY, USA
Zurück zum Zitat Rayana S, Akoglu L (2014) An ensemble approach for event detection and characterization in dynamic graphs. In: ACM SIGKDD 2nd workshop on outlier detection and description, New York, NY, USA Rayana S, Akoglu L (2014) An ensemble approach for event detection and characterization in dynamic graphs. In: ACM SIGKDD 2nd workshop on outlier detection and description, New York, NY, USA
Zurück zum Zitat Rayana S, Akoglu L (2015) Less is more: building selective anomaly ensemble with application to event detection in temporal graphs. In: SIAM SDM, Vancouver, BC, Canada Rayana S, Akoglu L (2015) Less is more: building selective anomaly ensemble with application to event detection in temporal graphs. In: SIAM SDM, Vancouver, BC, Canada
Zurück zum Zitat Rissanen J (1983) A universal prior for integers and estimation by minimum description length. Ann Stat 11(2):416–431MathSciNetCrossRef Rissanen J (1983) A universal prior for integers and estimation by minimum description length. Ann Stat 11(2):416–431MathSciNetCrossRef
Zurück zum Zitat Rossi RA, Ahmed NK (2015) The network data repository with interactive graph analytics and visualization. In: Proceedings of the twenty-ninth AAAI conference on artificial intelligence. http://networkrepository.com Rossi RA, Ahmed NK (2015) The network data repository with interactive graph analytics and visualization. In: Proceedings of the twenty-ninth AAAI conference on artificial intelligence. http://​networkrepositor​y.​com
Zurück zum Zitat Rossi RA, Gallagher B, Neville J, Henderson K (2013) Modeling dynamic behavior in large evolving graphs. In: WSDM’13 Rossi RA, Gallagher B, Neville J, Henderson K (2013) Modeling dynamic behavior in large evolving graphs. In: WSDM’13
Zurück zum Zitat Subelj L, Furlan S, Bajec M (2010) An expert system for detecting automobile insurance fraud using social network analysis. Expert Syst Appl 38(1):1039–1052CrossRef Subelj L, Furlan S, Bajec M (2010) An expert system for detecting automobile insurance fraud using social network analysis. Expert Syst Appl 38(1):1039–1052CrossRef
Zurück zum Zitat Wang H, Wenbin H, Qiu Z, Bo D (2017) Node’s evolution diversity and link prediction in social network. IEEE Trans Knowl Data Eng 29(1):2263–2274CrossRef Wang H, Wenbin H, Qiu Z, Bo D (2017) Node’s evolution diversity and link prediction in social network. IEEE Trans Knowl Data Eng 29(1):2263–2274CrossRef
Zurück zum Zitat Wang H, Jia W, Wenbin H, Xindong W (2019) Detecting and assessing anomalous evolutionary behaviors of nodes in evolving social networks. ACM Trans Knowl Discov Data 13(1):12:1–12:24CrossRef Wang H, Jia W, Wenbin H, Xindong W (2019) Detecting and assessing anomalous evolutionary behaviors of nodes in evolving social networks. ACM Trans Knowl Discov Data 13(1):12:1–12:24CrossRef
Metadaten
Titel
An unsupervised ensemble framework for node anomaly behavior detection in social network
Publikationsdatum
29.11.2019
Erschienen in
Soft Computing / Ausgabe 9/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04547-6

Weitere Artikel der Ausgabe 9/2020

Soft Computing 9/2020 Zur Ausgabe