skip to main content
10.1145/2433396.2433496acmconferencesArticle/Chapter ViewAbstractPublication PageswsdmConference Proceedingsconference-collections
abstract

Anomaly, event, and fraud detection in large network datasets

Published:04 February 2013Publication History

ABSTRACT

Detecting anomalies and events in data is a vital task, with numerous applications in security, finance, health care, law enforcement, and many others. While many techniques have been developed in past years for spotting outliers and anomalies in unstructured collections of multi-dimensional points, with graph data becoming ubiquitous, techniques for structured graph data have been of focus recently. As objects in graphs have long-range correlations, novel technology has been developed for abnormality detection in graph data.

The goal of this tutorial is to provide a general, comprehensive overview of the state-of-the-art methods for anomaly, event, and fraud detection in data represented as graphs. As a key contribution, we provide a thorough exploration of both data mining and machine learning algorithms for these detection tasks. We give a general framework for the algorithms, categorized under various settings: unsupervised vs.(semi-)supervised, for static vs. dynamic data. We focus on the scalability and effectiveness aspects of the methods, and highlight results on crucial real-world applications, including accounting fraud and opinion spam detection.

References

  1. L. Akoglu, R. Chandy, and C. Faloutsos. Opinion fraud detection in review networks. In Technical Report CMU-CS-12-130, 2012.Google ScholarGoogle Scholar
  2. L. Akoglu and C. Faloutsos. Event detection in time series of mobile communication graphs. In Army Science Conference, 2010.Google ScholarGoogle Scholar
  3. L. Akoglu, M. McGlohon, and C. Faloutsos. OddBall: Spotting anomalies in weighted graphs. In PAKDD, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Eberle and L. B. Holder. Anomaly detection in data represented as graphs. Intell. Data Anal., 11(6):663--689, 2007. Google ScholarGoogle ScholarCross RefCross Ref
  5. L. Getoor, N. Friedman, D. Koller, A. Pfeffer, and B. Taskar. Probabilistic relational models. In Intro. to Stat. Relational Learning. MIT Press, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  6. Z. Gyogyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with TrustRank. In Proc. VLDB, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. McGlohon, S. Bay, M. G. Anderle, D. M. Steier, and C. Faloutsos. Snare: a link analytic system for graph labeling and risk detection. In KDD, pages 1265--1274, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. C. Noble and D. J. Cook. Graph-based anomaly detection. In KDD, pages 631--636, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Pandit, D. H. Chau, S. Wang, and C. Faloutsos. Netprobe: a fast and scalable system for fraud detection in online auction networks. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Pincombe. Anomaly detection in time series of graphs using arma processes. ASOR Bulletin., 24(4):2--10, 2005.Google ScholarGoogle Scholar
  11. P. Sen, G. Namata, M. Bilgic, L. Getoor, B. Gallagher, and T. Eliassi-Rad. Collective classification in network data. AI Magazine, 29(3):93--106, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Sun, C. Faloutsos, S. Papadimitriou, and P. S. Yu. Graphscope: parameter-free mining of large time-evolving graphs. In KDD, pages 687--696, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos. Neighborhood formation and anomaly detection in bipartite graphs. In ICDM, pages 418--425, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B. Taskar, P. Abbeel, and D. Koller. Discriminative probabilistic models for relational data. In UAI, pages 485--492, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Anomaly, event, and fraud detection in large network datasets

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WSDM '13: Proceedings of the sixth ACM international conference on Web search and data mining
        February 2013
        816 pages
        ISBN:9781450318693
        DOI:10.1145/2433396

        Copyright © 2013 Copyright is held by the owner/author(s)

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 February 2013

        Check for updates

        Qualifiers

        • abstract

        Acceptance Rates

        Overall Acceptance Rate498of2,863submissions,17%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader