Skip to main content
Top
Published in: Neural Computing and Applications 12/2023

07-01-2023 | Original Article

MedGraph: malicious edge detection in temporal reciprocal graph via multi-head attention-based GNN

Authors: Kai Chen, Ziao Wang, Kai Liu, Xiaofeng Zhang, Linhao Luo

Published in: Neural Computing and Applications | Issue 12/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the popularity of various online dating applications, it has become a crucial task to detect anomalous or malicious users from a large number of reciprocal users. Essentially, this task could be converted to a malicious edge detection problem, which is an important yet challenging task due to the following difficulties. First, malicious users may fake their profiles to avoid being detected by the service platform. Second, malicious behaviors, i.e., malicious edges, might vary from time to time which greatly challenges most existing approaches. To address the aforementioned issues, this paper proposes the multi-head attention-based GNN approach to detect malicious edges from a temporal reciprocal graph, called MedGraph. Particularly, the proposed MedGraph approach employs a transformer component to first capture both long-term and short-term behavior characteristics of malicious users from their historical interaction data. Then, a co-attention component is designed to differentiate important features that account for the prediction of malicious edges. We evaluate the proposed approach on two public datasets and one real-world dataset collected by ourselves. The promising results demonstrate that our approach could achieve state-of-the-art performance against a number of both baseline and SOTA approaches with respect to the widely adopted evaluation criteria.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):1–58CrossRef Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):1–58CrossRef
2.
go back to reference Sánchez PI, Müller E, Irmler O, Böhm K (2014) Local context selection for outlier ranking in graphs with multiple numeric node attributes. In: Proceedings of the 26th international conference on scientific and statistical database management, pp 1–12 Sánchez PI, Müller E, Irmler O, Böhm K (2014) Local context selection for outlier ranking in graphs with multiple numeric node attributes. In: Proceedings of the 26th international conference on scientific and statistical database management, pp 1–12
3.
go back to reference Bhuyan MH, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303–336CrossRef Bhuyan MH, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303–336CrossRef
4.
go back to reference Noble CC, Cook DJ (2003) Graph-based anomaly detection. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining, pp 631–636 Noble CC, Cook DJ (2003) Graph-based anomaly detection. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining, pp 631–636
5.
go back to reference Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31CrossRef Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31CrossRef
6.
go back to reference Zheng L, Li Z, Li J, Li Z, Gao J (2019) Addgraph: anomaly detection in dynamic graph using attention-based temporal gcn. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence. AAAI Press, pp 4419–4425 Zheng L, Li Z, Li J, Li Z, Gao J (2019) Addgraph: anomaly detection in dynamic graph using attention-based temporal gcn. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence. AAAI Press, pp 4419–4425
7.
go back to reference Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626–688MathSciNetCrossRef Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626–688MathSciNetCrossRef
8.
go back to reference Ranshous S, Shen S, Koutra D, Harenberg S, Faloutsos C, Samatova NF (2015) Anomaly detection in dynamic networks: a survey. Wiley Interdiscip Rev Comput Stat 7(3):223–247MathSciNetCrossRef Ranshous S, Shen S, Koutra D, Harenberg S, Faloutsos C, Samatova NF (2015) Anomaly detection in dynamic networks: a survey. Wiley Interdiscip Rev Comput Stat 7(3):223–247MathSciNetCrossRef
9.
go back to reference Hooi B, Song HA, Beutel A, Shah N, Shin K, Faloutsos C (2016) Fraudar: bounding graph fraud in the face of camouflage. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 895–904 Hooi B, Song HA, Beutel A, Shah N, Shin K, Faloutsos C (2016) Fraudar: bounding graph fraud in the face of camouflage. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 895–904
10.
go back to reference McConville R, Liu W, Miller P (2015) Vertex clustering of augmented graph streams. In: Proceedings of the 2015 SIAM international conference on data mining. SIAM, pp 109–117 McConville R, Liu W, Miller P (2015) Vertex clustering of augmented graph streams. In: Proceedings of the 2015 SIAM international conference on data mining. SIAM, pp 109–117
11.
go back to reference Zhao Y, Yu PS (2013) On graph stream clustering with side information. In: Proceedings of the 2013 SIAM international conference on data mining. SIAM, pp 139–150 Zhao Y, Yu PS (2013) On graph stream clustering with side information. In: Proceedings of the 2013 SIAM international conference on data mining. SIAM, pp 139–150
12.
13.
go back to reference Yu W, Cheng W, Aggarwal CC, Zhang K, Chen H, Wang W (2018) Netwalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: SIGKDD, pp 2672–2681 Yu W, Cheng W, Aggarwal CC, Zhang K, Chen H, Wang W (2018) Netwalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: SIGKDD, pp 2672–2681
14.
go back to reference Li D, Chen D, Jin B, Shi L, Goh J, Ng S-K (2019) Mad-gan: multivariate anomaly detection for time series data with generative adversarial networks. In: International conference on artificial neural networks. Springer, pp 703–716 Li D, Chen D, Jin B, Shi L, Goh J, Ng S-K (2019) Mad-gan: multivariate anomaly detection for time series data with generative adversarial networks. In: International conference on artificial neural networks. Springer, pp 703–716
15.
go back to reference Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G (2008) The graph neural network model. IEEE Trans Neural Netw 20(1):61–80CrossRef Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G (2008) The graph neural network model. IEEE Trans Neural Netw 20(1):61–80CrossRef
16.
go back to reference Benson AR, Gleich DF, Leskovec J (2016) Higher-order organization of complex networks. Science 353(6295):163–166CrossRef Benson AR, Gleich DF, Leskovec J (2016) Higher-order organization of complex networks. Science 353(6295):163–166CrossRef
17.
go back to reference Luo L, Liu K, Peng D, Ying Y, Zhang X (2020) A motif-based graph neural network to reciprocal recommendation for online dating. In: Proceedings of the international conference on neural information processing, pp 102–114 Luo L, Liu K, Peng D, Ying Y, Zhang X (2020) A motif-based graph neural network to reciprocal recommendation for online dating. In: Proceedings of the international conference on neural information processing, pp 102–114
18.
go back to reference Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: SIGKDD, pp 701–710 Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: SIGKDD, pp 701–710
19.
go back to reference Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 855–864 Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 855–864
20.
go back to reference Guthrie D, Allison B, Liu W, Guthrie L, Wilks Y (2006) A closer look at skip-gram modelling. In: LREC, pp 1222–1225 Guthrie D, Allison B, Liu W, Guthrie L, Wilks Y (2006) A closer look at skip-gram modelling. In: LREC, pp 1222–1225
21.
go back to reference Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser Ł, Polosukhin I (2017) Attention is all you need. In: Advances in neural information processing systems, pp 5998–6008 Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser Ł, Polosukhin I (2017) Attention is all you need. In: Advances in neural information processing systems, pp 5998–6008
22.
go back to reference Opsahl T, Panzarasa P (2009) Clustering in weighted networks. Soc Netw 31(2):155–163CrossRef Opsahl T, Panzarasa P (2009) Clustering in weighted networks. Soc Netw 31(2):155–163CrossRef
23.
go back to reference Aggarwal CC, Zhao Y, Philip SY (2011) Outlier detection in graph streams. In: 2011 IEEE 27th international conference on data engineering. IEEE, pp 399–409 Aggarwal CC, Zhao Y, Philip SY (2011) Outlier detection in graph streams. In: 2011 IEEE 27th international conference on data engineering. IEEE, pp 399–409
24.
go back to reference Ranshous S, Harenberg S, Sharma K, Samatova NF (2016) A scalable approach for outlier detection in edge streams using sketch-based approximations. In: Proceedings of the 2016 SIAM international conference on data mining. SIAM, pp 189–197 Ranshous S, Harenberg S, Sharma K, Samatova NF (2016) A scalable approach for outlier detection in edge streams using sketch-based approximations. In: Proceedings of the 2016 SIAM international conference on data mining. SIAM, pp 189–197
25.
go back to reference Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. In: Advances in neural information processing systems, pp 1024–1034 Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. In: Advances in neural information processing systems, pp 1024–1034
26.
go back to reference Hou D, Cong Y, Sun G, Dong J, Li J, Li K (2020) Fast multi-view outlier detection via deep encoder. IEEE Trans Big Data 1:1 Hou D, Cong Y, Sun G, Dong J, Li J, Li K (2020) Fast multi-view outlier detection via deep encoder. IEEE Trans Big Data 1:1
27.
go back to reference Huang C, Min G, Wu Y, Ying Y, Pei K, Xiang Z (2017) Time series anomaly detection for trustworthy services in cloud computing systems. IEEE Trans Big Data 8:60–72CrossRef Huang C, Min G, Wu Y, Ying Y, Pei K, Xiang Z (2017) Time series anomaly detection for trustworthy services in cloud computing systems. IEEE Trans Big Data 8:60–72CrossRef
28.
go back to reference Ling Z, Qiu RC, He X, Chu L (2019) A new approach of exploiting self-adjoint matrix polynomials of large random matrices for anomaly detection and fault location. IEEE Trans Big Data 7:548–558CrossRef Ling Z, Qiu RC, He X, Chu L (2019) A new approach of exploiting self-adjoint matrix polynomials of large random matrices for anomaly detection and fault location. IEEE Trans Big Data 7:548–558CrossRef
29.
go back to reference Chen X, Song X, Ren R, Zhu L, Cheng Z, Nie L (2020) Fine-grained privacy detection with graph-regularized hierarchical attentive representation learning. ACM Trans Inf Syst 38:1–26 Chen X, Song X, Ren R, Zhu L, Cheng Z, Nie L (2020) Fine-grained privacy detection with graph-regularized hierarchical attentive representation learning. ACM Trans Inf Syst 38:1–26
31.
go back to reference Liu Y, Wu Y-FB (2020) Fned: a deep network for fake news early detection on social media. ACM Trans Inf Syst (TOIS) 38(3):1–33MathSciNetCrossRef Liu Y, Wu Y-FB (2020) Fned: a deep network for fake news early detection on social media. ACM Trans Inf Syst (TOIS) 38(3):1–33MathSciNetCrossRef
32.
go back to reference Bilgin CC, Yener B (2006) Dynamic network evolution: models, clustering, anomaly detection. IEEE Netw (1) Bilgin CC, Yener B (2006) Dynamic network evolution: models, clustering, anomaly detection. IEEE Netw (1)
33.
go back to reference Wang H, Tang M, Park Y, Priebe CE (2013) Locality statistics for anomaly detection in time series of graphs. IEEE Trans Signal Process 62(3):703–717MathSciNetCrossRefMATH Wang H, Tang M, Park Y, Priebe CE (2013) Locality statistics for anomaly detection in time series of graphs. IEEE Trans Signal Process 62(3):703–717MathSciNetCrossRefMATH
34.
go back to reference Shin K, Hooi B, Faloutsos C (2016) M-zoom: fast dense-block detection in tensors with quality guarantees. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, pp 264–280 Shin K, Hooi B, Faloutsos C (2016) M-zoom: fast dense-block detection in tensors with quality guarantees. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, pp 264–280
35.
go back to reference Cormode G, Muthukrishnan S (2005) An improved data stream summary: the count-min sketch and its applications. J Algorithms 55(1):58–75MathSciNetCrossRefMATH Cormode G, Muthukrishnan S (2005) An improved data stream summary: the count-min sketch and its applications. J Algorithms 55(1):58–75MathSciNetCrossRefMATH
36.
go back to reference Chang S, Han W, Tang J, Qi G-J, Aggarwal CC, Huang TS (2015) Heterogeneous network embedding via deep architectures. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, pp 119–128 Chang S, Han W, Tang J, Qi G-J, Aggarwal CC, Huang TS (2015) Heterogeneous network embedding via deep architectures. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, pp 119–128
37.
go back to reference Ergen T, Mirza AH, Kozat SS (2017) Unsupervised and semi-supervised anomaly detection with lstm neural networks. arXiv preprint arXiv:1710.09207 Ergen T, Mirza AH, Kozat SS (2017) Unsupervised and semi-supervised anomaly detection with lstm neural networks. arXiv preprint arXiv:​1710.​09207
38.
go back to reference Economides MJ, Nolte KG et al (1989) Reservoir stimulation, vol 2. Prentice Hall, Englewood Cliffs Economides MJ, Nolte KG et al (1989) Reservoir stimulation, vol 2. Prentice Hall, Englewood Cliffs
39.
go back to reference Ng A et al (2011) Sparse autoencoder. CS294A Lect Notes 72:1–19 Ng A et al (2011) Sparse autoencoder. CS294A Lect Notes 72:1–19
40.
go back to reference Ailon N, Jaiswal R, Monteleoni C (2009) Streaming k-means approximation. In: Advances in neural information processing systems, pp 10–18 Ailon N, Jaiswal R, Monteleoni C (2009) Streaming k-means approximation. In: Advances in neural information processing systems, pp 10–18
41.
go back to reference Cho K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078 Cho K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv preprint arXiv:​1406.​1078
Metadata
Title
MedGraph: malicious edge detection in temporal reciprocal graph via multi-head attention-based GNN
Authors
Kai Chen
Ziao Wang
Kai Liu
Xiaofeng Zhang
Linhao Luo
Publication date
07-01-2023
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 12/2023
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-022-08065-9

Other articles of this Issue 12/2023

Neural Computing and Applications 12/2023 Go to the issue

S.i.: Ai Based Techniques and Applications for Intelligent Iot Systems

Recognition method for stone carved calligraphy characters based on a convolutional neural network

Premium Partner