ANOM-DGCN: Detection of Anomalies in Dynamic Networks using Deviated Graph Convolution Network

被引:0
作者
Bhumika [1 ]
Das, Debasis [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Jodhpur, India
来源
2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC | 2022年
关键词
Anomaly Detection; Graph Convolution Network; Dynamic Networks;
D O I
10.1109/IWCMC55113.2022.9824978
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the digital era, the web and social networks have become an essential part of our society's daily lives. Generally, people worldwide use these networks to access or share information, but communication over these networks also has anomalous behavior. The anomalous behavior is the change in the network that is abnormal or rare occurrences that may relate to frauds, real-life events, shilling attacks, denial of service attacks, follower boosting etc. In this paper, we propose a novel method, i.e., ANOM-DGCN, which is modification of the graph convolution network. We use attributed graph that represents the network dynamics as attributes and communication as edges. We conduct experiments on publicly available datasets, such as Enron, DARPA, and TwitterSecurity, where our proposed method outperforms existing state-of-the-art models. ANOMDGCN present results with AUC of 83% and provide spatialtemporal metadata for further analysis.
引用
收藏
页码:1273 / 1278
页数:6
相关论文
共 24 条
  • [1] Bhatia S, 2020, Arxiv, DOI arXiv:1911.04464
  • [2] SEDANSPOT: Detecting Anomalies in Edge Streams
    Eswaran, Dhivya
    Faloutsos, Christos
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2018, : 953 - 958
  • [3] F. E. R. Commission, 2015, ENR DAT
  • [4] Graph-Based Fraud Detection in the Face of Camouflage
    Hooi, Bryan
    Shin, Kijung
    Song, Hyun Ah
    Beutel, Alex
    Shah, Neil
    Faloutsos, Christos
    [J]. ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2017, 11 (04)
  • [5] FRAUDAR: Bounding Graph Fraud in the Face of Camouflage
    Hooi, Bryan
    Song, Hyun Ah
    Beutel, Alex
    Shah, Neil
    Shin, Kijung
    Faloutsos, Christos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 895 - 904
  • [6] Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach
    Jiang, Meng
    Cui, Peng
    Beutel, Alex
    Faloutsos, Christos
    Yang, Shiqiang
    [J]. ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2016, 10 (04)
  • [7] A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks
    Kamarudin, Muhammad Hilmi
    Maple, Carsten
    Watson, Tim
    Safa, Nader Sohrabi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [8] Web traffic anomaly detection using C-LSTM neural networks
    Kim, Tae-Young
    Cho, Sung-Bae
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 106 : 66 - 76
  • [9] Fraud Detection in Dynamic Interaction Network
    Lin, Hao
    Liu, Guannan
    Wu, Junjie
    Zuo, Yuan
    Wan, Xin
    Li, Hong
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (10) : 1936 - 1950
  • [10] Lippmann Richard, 1999, Recent Advances in Intrusion Detection, V99, P829