Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2021

01.12.2021 | Original Article

DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning

verfasst von: Putra Wanda, Huang J. Jie

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Detection of Online Social Networks (OSN) anomalous nodes becomes increasingly essential to identify malicious activities. The abnormal nodes suspiciously construct improbable links to other benign accounts. Inspired by the significant achievements of deep learning in current computer vision problems, we propose DeepFriend as a novel supervised neural network to classify abnormal nodes using labeled link features dataset. This paper proposes a model to classify malicious vertices using nodes' link information by training extensive features with dynamic deep learning architecture. To construct dynamic deep learning, we present a generic function called WalkPool pooling to optimize our network performance. By demonstrating our model, we gain higher accuracy than standard learning algorithms in the abnormal nodes’ classification.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abeer A-M, Maha H, Nada A-S, Hemalatha M (2016) Security issues in social networking sites. Int J Appl Eng Res 11–12:7672–7675 Abeer A-M, Maha H, Nada A-S, Hemalatha M (2016) Security issues in social networking sites. Int J Appl Eng Res 11–12:7672–7675
Zurück zum Zitat Adamic LA, Adar E (2005) How to search a social network. Soc Netw 27(3):187–203CrossRef Adamic LA, Adar E (2005) How to search a social network. Soc Netw 27(3):187–203CrossRef
Zurück zum Zitat Ahmed NM, Chen L (2016) An efficient algorithm for link prediction in temporal uncertain social networks. Inf Sci 331:120–136MathSciNetCrossRef Ahmed NM, Chen L (2016) An efficient algorithm for link prediction in temporal uncertain social networks. Inf Sci 331:120–136MathSciNetCrossRef
Zurück zum Zitat Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS (2017) Sybil defense techniques in online social networks: a survey. IEEE Access 5:1200–1219CrossRef Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS (2017) Sybil defense techniques in online social networks: a survey. IEEE Access 5:1200–1219CrossRef
Zurück zum Zitat Anglano C, Canonico M, Guazzone M (2017) Analysis of telegram messenger on android smartphones. Digit Investig 23:31–49CrossRef Anglano C, Canonico M, Guazzone M (2017) Analysis of telegram messenger on android smartphones. Digit Investig 23:31–49CrossRef
Zurück zum Zitat Barabási A-L, Jeong H, Néda Z, Ravasz E, Schubert A, Vicsek T (2002) Evolution of the social network of scientific collaborations. Phys A Stat Mech Appl 311(3):590–614MathSciNetCrossRef Barabási A-L, Jeong H, Néda Z, Ravasz E, Schubert A, Vicsek T (2002) Evolution of the social network of scientific collaborations. Phys A Stat Mech Appl 311(3):590–614MathSciNetCrossRef
Zurück zum Zitat Bindu P, Thilagam S (2016) Mining social networks for anomalies: Methods and challenges. J Netw Comput Appl 68:213–229CrossRef Bindu P, Thilagam S (2016) Mining social networks for anomalies: Methods and challenges. J Netw Comput Appl 68:213–229CrossRef
Zurück zum Zitat Bliss CA, Frank MR, Danforth CM, Dodds PS (2014) An evolutionary algorithm approach to link prediction in dynamic social networks. J Comput Sci 5(5):750–764MathSciNetCrossRef Bliss CA, Frank MR, Danforth CM, Dodds PS (2014) An evolutionary algorithm approach to link prediction in dynamic social networks. J Comput Sci 5(5):750–764MathSciNetCrossRef
Zurück zum Zitat Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang DU (2006) Complex networks: structure and dynamics. Phys Rep 424(4–5):175–308MathSciNetCrossRef Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang DU (2006) Complex networks: structure and dynamics. Phys Rep 424(4–5):175–308MathSciNetCrossRef
Zurück zum Zitat Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321–357CrossRef Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321–357CrossRef
Zurück zum Zitat Chiu C, Zhan J (2018) Deep learning for link prediction in dynamic networks using weak estimators. IEEE Access 6:35937–35945CrossRef Chiu C, Zhan J (2018) Deep learning for link prediction in dynamic networks using weak estimators. IEEE Access 6:35937–35945CrossRef
Zurück zum Zitat Gong Q et al (2018) DeepScan: exploiting deep learning for malicious account detection in location-based social networks. IEEE Commun Mag 56(11):21–27CrossRef Gong Q et al (2018) DeepScan: exploiting deep learning for malicious account detection in location-based social networks. IEEE Commun Mag 56(11):21–27CrossRef
Zurück zum Zitat Goodfellow, Bengio, Courville (2016) Deep learning. Books, p 184. Goodfellow, Bengio, Courville (2016) Deep learning. Books, p 184.
Zurück zum Zitat Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining
Zurück zum Zitat Jie HJ, Wanda P (2020) RunPool: a dynamic pooling layer for convolution neural network. Int J Comput Intell Syst 13(1):66–76CrossRef Jie HJ, Wanda P (2020) RunPool: a dynamic pooling layer for convolution neural network. Int J Comput Intell Syst 13(1):66–76CrossRef
Zurück zum Zitat Kalchbrenner N, Grefenstette E, Blunsom P (2014) A convolutional neural network for modelling sentences. In: Proceedings of the 52nd annual meeting of the association for computational linguistics. association for computational linguistics Kalchbrenner N, Grefenstette E, Blunsom P (2014) A convolutional neural network for modelling sentences. In: Proceedings of the 52nd annual meeting of the association for computational linguistics. association for computational linguistics
Zurück zum Zitat Katz L (1953) A new status index derived from sociometric analysis. Psychometrika 18(1):39–43CrossRef Katz L (1953) A new status index derived from sociometric analysis. Psychometrika 18(1):39–43CrossRef
Zurück zum Zitat Kipf T, Welling M (2017) Semi-supervised classification with graph convolutional networks. arXiv, abs/1609.02907 Kipf T, Welling M (2017) Semi-supervised classification with graph convolutional networks. arXiv, abs/1609.02907
Zurück zum Zitat Kökciyan N, Yolum P (2016) ProGuard: a semantic approach to detect privacy violations in online social networks. IEEE Trans Knowl Data Eng 28(10):2724–2737CrossRef Kökciyan N, Yolum P (2016) ProGuard: a semantic approach to detect privacy violations in online social networks. IEEE Trans Knowl Data Eng 28(10):2724–2737CrossRef
Zurück zum Zitat LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324CrossRef LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324CrossRef
Zurück zum Zitat LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521:436–444CrossRef LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521:436–444CrossRef
Zurück zum Zitat Lin L, Xu L, Zhou S, Wu W (2014) The social feature-based priority relation graph of mobile social networks. In: 2014 IEEE 17th International Conference on Computational Science and Engineering, Chengdu, pp 1921–1926. Lin L, Xu L, Zhou S, Wu W (2014) The social feature-based priority relation graph of mobile social networks. In: 2014 IEEE 17th International Conference on Computational Science and Engineering, Chengdu, pp 1921–1926.
Zurück zum Zitat Liu B-H, Hsu Y-P, Ke W-C (2014) Virus infection control in online social networks based on probabilistic communities. Int J Commun Syst 27:4481–4491CrossRef Liu B-H, Hsu Y-P, Ke W-C (2014) Virus infection control in online social networks based on probabilistic communities. Int J Commun Syst 27:4481–4491CrossRef
Zurück zum Zitat Liu F, Liu B, Sun C, Liu M, Wang X (2015) Deep belief network-based approaches for link prediction in signed social networks. Entropy 17(4):2140–2169CrossRef Liu F, Liu B, Sun C, Liu M, Wang X (2015) Deep belief network-based approaches for link prediction in signed social networks. Entropy 17(4):2140–2169CrossRef
Zurück zum Zitat Liu Z, Li S, Zhang Y, Yun X, Peng C (2020) Ringer: systematic mining of malicious domains by dynamic graph convolutional network. In: Computational Science—ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020. Liu Z, Li S, Zhang Y, Yun X, Peng C (2020) Ringer: systematic mining of malicious domains by dynamic graph convolutional network. In: Computational Science—ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020.
Zurück zum Zitat Li T, Wang B, Jiang Y, Zhang Y, Yan Y (2018) Restricted Boltzmann machine-based approaches for link prediction in dynamic networks. IEEE Access 6:29940–29951CrossRef Li T, Wang B, Jiang Y, Zhang Y, Yan Y (2018) Restricted Boltzmann machine-based approaches for link prediction in dynamic networks. IEEE Access 6:29940–29951CrossRef
Zurück zum Zitat Li X, Xin Y, Zhao C, Yang Y, Chen Y (2020) Graph convolutional networks for privacy metrics in online social networks. Appl Sci 10:1327CrossRef Li X, Xin Y, Zhao C, Yang Y, Chen Y (2020) Graph convolutional networks for privacy metrics in online social networks. Appl Sci 10:1327CrossRef
Zurück zum Zitat Looks M, Herreshoff M, Hutchins D, Norvig P (2017) Deep learning with dynamic computation graphs. In: ICLR conference Looks M, Herreshoff M, Hutchins D, Norvig P (2017) Deep learning with dynamic computation graphs. In: ICLR conference
Zurück zum Zitat Newman MEJ (2001) Clustering and preferential attachment in growing networks. Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Top 64(2): 025102 Newman MEJ (2001) Clustering and preferential attachment in growing networks. Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Top 64(2): 025102
Zurück zum Zitat Nurse JRC, Erola A, Goldsmith M, Creese S (2015) Investigating the leakage of sensitive personal and organizational information in email headers. J Internet Services Inf Secur (JISIS) 5:70–84 Nurse JRC, Erola A, Goldsmith M, Creese S (2015) Investigating the leakage of sensitive personal and organizational information in email headers. J Internet Services Inf Secur (JISIS) 5:70–84
Zurück zum Zitat Perozzi B, Al-Rfou R, Skiena S (2014) DeepWalk: online learning of social representations. In: KDD '14 Perozzi B, Al-Rfou R, Skiena S (2014) DeepWalk: online learning of social representations. In: KDD '14
Zurück zum Zitat Qin Y, Jia R, Zhang J, Wu W, Wang X (2016) Impact of social relation and group size in multicast ad hoc networks. IEEE/ACM Trans Netw 24(4):1989–2004CrossRef Qin Y, Jia R, Zhang J, Wu W, Wang X (2016) Impact of social relation and group size in multicast ad hoc networks. IEEE/ACM Trans Netw 24(4):1989–2004CrossRef
Zurück zum Zitat Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Social Netw 39:62–70CrossRef Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Social Netw 39:62–70CrossRef
Zurück zum Zitat Sharma V, You I, Kumar R (2017) ISMA: intelligent sensing model for anomalies detection in cross-platform OSNs with a case study on IoT. IEEE Access 5:3284–3301CrossRef Sharma V, You I, Kumar R (2017) ISMA: intelligent sensing model for anomalies detection in cross-platform OSNs with a case study on IoT. IEEE Access 5:3284–3301CrossRef
Zurück zum Zitat Sohrabi MK, Karimi F (2018) A feature selection approach to detect spam in the facebook social network. Arab J Sci Eng 43(2):949–958CrossRef Sohrabi MK, Karimi F (2018) A feature selection approach to detect spam in the facebook social network. Arab J Sci Eng 43(2):949–958CrossRef
Zurück zum Zitat Taigman Y, Yang M, Ranzato M, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: Computer vision and pattern recognition (CVPR), IEEE conference on pattern recognition, pp 1701–1708 Taigman Y, Yang M, Ranzato M, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: Computer vision and pattern recognition (CVPR), IEEE conference on pattern recognition, pp 1701–1708
Zurück zum Zitat Theodoridis S, Pikrakis A, Koutroumbas K, Cavouras D (2010) Introduction to pattern recognition: a MATLAB approach. Academic, San Diego, CA, USA Theodoridis S, Pikrakis A, Koutroumbas K, Cavouras D (2010) Introduction to pattern recognition: a MATLAB approach. Academic, San Diego, CA, USA
Zurück zum Zitat Vigliotti MG, Hankin C (2015) Discovery of anomalous behaviour in temporal networks. Social Netw 41:18–22CrossRef Vigliotti MG, Hankin C (2015) Discovery of anomalous behaviour in temporal networks. Social Netw 41:18–22CrossRef
Zurück zum Zitat Wanda P, Jie HJ (2020) DeepProfile: finding fake profile in online social network using dynamic CNN. J Inf Secur Appl 52: 102465 Wanda P, Jie HJ (2020) DeepProfile: finding fake profile in online social network using dynamic CNN. J Inf Secur Appl 52: 102465
Zurück zum Zitat Wanda P, Marselina Endah H, Jie HJ (2020) DeepOSN: Bringing deep learning as malicious detection scheme in online social network. IAES Int J Artif Intell (IJ-AI) 9(1):146CrossRef Wanda P, Marselina Endah H, Jie HJ (2020) DeepOSN: Bringing deep learning as malicious detection scheme in online social network. IAES Int J Artif Intell (IJ-AI) 9(1):146CrossRef
Zurück zum Zitat Wang P, Xu B, Wu Y, Zhou X (2015) Link prediction in social networks: The state-of-the-art. Sci China Inf Sci 58(1):1–38 Wang P, Xu B, Wu Y, Zhou X (2015) Link prediction in social networks: The state-of-the-art. Sci China Inf Sci 58(1):1–38
Zurück zum Zitat Zhou F, Liu L, Zhang K, Trajcevski G, Wu J, Zhong T (2018) DeepLink: a deep learning approach for user identity linkage. In: IEEE INFOCOM 2018—IEEE conference on computer communications, Honolulu, HI, pp 1313–1321 Zhou F, Liu L, Zhang K, Trajcevski G, Wu J, Zhong T (2018) DeepLink: a deep learning approach for user identity linkage. In: IEEE INFOCOM 2018—IEEE conference on computer communications, Honolulu, HI, pp 1313–1321
Metadaten
Titel
DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning
verfasst von
Putra Wanda
Huang J. Jie
Publikationsdatum
01.12.2021
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2021
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-021-00742-2

Weitere Artikel der Ausgabe 1/2021

Social Network Analysis and Mining 1/2021 Zur Ausgabe

Premium Partner