A review of social network centric anomaly detection techniques

被引:1
|
作者
Kaur, Ravneet [1 ]
Singh, Sarbjeet [1 ]
机构
[1] Panjab Univ, UIET, Dept Comp Sci & Engn, Chandigarh 160014, India
关键词
anomaly detection; classification; clustering; centrality; data mining; graph-based anomaly detection; online social networks; social network analysis; proximity; static networks; dynamic networks;
D O I
10.1504/IJCNDS.2016.10001611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks have gained much attention in the recent years in terms of their analysis for usage as well as detection of abnormal activities. Anomalous activities arise when someone shows a different behaviour than others in the network. Presence of these anomalies may pose a number of problems which need to be addressed. This paper discusses different types of anomalies and their novel categorisation based on various factors. A review of various techniques used for detecting anomalies along with underlying assumptions and reasons for the presence of such anomalies is also covered. A special reference is made to different data mining approaches used to detect anomalies. However, the major focus of paper is the analysis of social network centric anomaly detection approaches which are broadly classified as behaviour-based, structure-based and spectral-based. Each one of this classification further incorporates a number of techniques which are discussed in the paper.
引用
收藏
页码:358 / 386
页数:29
相关论文
共 50 条
  • [31] Anomaly detection and defense techniques in federated learning: a comprehensive review
    Zhang, Chang
    Yang, Shunkun
    Mao, Lingfeng
    Ning, Huansheng
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (06)
  • [32] Data Mining Approach for Anomaly Detection in Social Network Analysis
    Sudha, M. Swarna
    Priya, K. Arun
    Lakshmi, A. Kanaka
    Kruthika, A.
    Priya, D. Lakshmi
    Valarmathi, K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1862 - 1866
  • [33] egoDetect: Visual Detection and Exploration of Anomaly in Social Communication Network
    Pu, Jiansu
    Zhang, Jingwen
    Shao, Hui
    Zhang, Tingting
    Rao, Yunbo
    SENSORS, 2020, 20 (20) : 1 - 21
  • [34] Anomaly Detection in Social Media Using Recurrent Neural Network
    Shah, Shamoz
    Goyal, Madhu
    COMPUTATIONAL SCIENCE - ICCS 2019, PT IV, 2019, 11539 : 74 - 83
  • [35] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [36] Dynamic Network Anomaly Detection System by Using Deep Learning Techniques
    Lin, Peng
    Ye, Kejiang
    Xu, Cheng-Zhong
    CLOUD COMPUTING - CLOUD 2019, 2019, 11513 : 161 - 176
  • [37] Network Anomaly Detection Using Genetic Programming with Semantic Approximation Techniques
    Thi Huong Chu
    Quang Uy Nguyen
    2021 RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES (RIVF 2021), 2021, : 144 - 149
  • [38] A Performance Comparison of Feature Selection Techniques with SVM for Network Anomaly Detection
    Khaokaew, Yonchanok
    Anusas-amornkul, Tanapat
    2016 4TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2016, : 85 - 89
  • [39] Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques
    Ness, Stephanie
    Eswarakrishnan, Vishwanath
    Sridharan, Harish
    Shinde, Varun
    Janapareddy, Naga Venkata Prasad
    Dhanawat, Vineet
    IEEE ACCESS, 2025, 13 : 16133 - 16149
  • [40] NETWORK TRAFFIC ANOMALY DETECTION USING CLUSTERING TECHNIQUES AND PERFORMANCE COMPARISON
    Liu, Duo
    Lung, Chung-Horng
    Lambadaris, Ioannis
    Seddigh, Nabil
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 345 - 348