A review of social network centric anomaly detection techniques

被引:1
作者
Kaur, Ravneet [1 ]
Singh, Sarbjeet [1 ]
机构
[1] Panjab Univ, UIET, Dept Comp Sci & Engn, Chandigarh 160014, India
关键词
anomaly detection; classification; clustering; centrality; data mining; graph-based anomaly detection; online social networks; social network analysis; proximity; static networks; dynamic networks;
D O I
10.1504/IJCNDS.2016.10001611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks have gained much attention in the recent years in terms of their analysis for usage as well as detection of abnormal activities. Anomalous activities arise when someone shows a different behaviour than others in the network. Presence of these anomalies may pose a number of problems which need to be addressed. This paper discusses different types of anomalies and their novel categorisation based on various factors. A review of various techniques used for detecting anomalies along with underlying assumptions and reasons for the presence of such anomalies is also covered. A special reference is made to different data mining approaches used to detect anomalies. However, the major focus of paper is the analysis of social network centric anomaly detection approaches which are broadly classified as behaviour-based, structure-based and spectral-based. Each one of this classification further incorporates a number of techniques which are discussed in the paper.
引用
收藏
页码:358 / 386
页数:29
相关论文
共 86 条
  • [51] The self-organizing map
    Kohonen, T
    [J]. NEUROCOMPUTING, 1998, 21 (1-3) : 1 - 6
  • [52] Kriegel H.P., 2009, PROC 18 ACM C INF KN, P1649, DOI DOI 10.1145/1645953.1646195
  • [53] Bayesian event classification for intrusion detection
    Kruegel, C
    Mutz, D
    Robertson, W
    Valeur, F
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 14 - 23
  • [54] Kryszkiewicz M, 2010, LECT NOTES ARTIF INT, V6086, P60, DOI 10.1007/978-3-642-13529-3_8
  • [55] Expanding the Boundaries of Your Research Using Social Media: Stand-Up and Be Counted
    Kumar, M. Jagadesh
    [J]. IETE TECHNICAL REVIEW, 2014, 31 (04) : 255 - 257
  • [56] The link-prediction problem for social networks
    Liben-Nowell, David
    Kleinberg, Jon
    [J]. JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2007, 58 (07): : 1019 - 1031
  • [57] Miller BA, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P179, DOI 10.1109/ISI.2013.6578815
  • [58] Misra S, 2012, IEEE GLOB COMM CONF, P1647, DOI 10.1109/GLOCOM.2012.6503350
  • [59] MORADI M, 2004, P 2004 IEEE INT C AD
  • [60] Nanopoulos A., 2001, Proceedings of the 27th International Conference on Very Large Data Bases, P331