Interactive Anomaly Detection on Attributed Networks

被引:98
作者
Ding, Kaize [1 ]
Li, Jundong [1 ]
Liu, Huan [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
来源
PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'19) | 2019年
关键词
D O I
10.1145/3289600.3290964
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Performing anomaly detection on attributed networks concerns with finding nodes whose patterns or behaviors deviate significantly from the majority of reference nodes. Its success can be easily found in many real-world applications such as network intrusion detection, opinion spam detection and system fault diagnosis, to name a few. Despite their empirical success, a vast majority of existing efforts are overwhelmingly performed in an unsupervised scenario due to the expensive labeling costs of ground truth anomalies. In fact, in many scenarios, a small amount of prior human knowledge of the data is often effortless to obtain, and getting it involved in the learning process has shown to be effective in advancing many important learning tasks. Additionally, since new types of anomalies may constantly arise over time especially in an adversarial environment, the interests of human expert could also change accordingly regarding to the detected anomaly types. It brings further challenges to conventional anomaly detection algorithms as they are often applied in a batch setting and are incapable to interact with the environment. To tackle the above issues, in this paper, we investigate the problem of anomaly detection on attributed networks in an interactive setting by allowing the system to proactively communicate with the human expert in making a limited number of queries about ground truth anomalies. Our objective is to maximize the true anomalies presented to the human expert after a given budget is used up. Along with this line, we formulate the problem through the principled multi-armed bandit framework and develop a novel collaborative contextual bandit algorithm, named GraphUCB. In particular, our developed algorithm: (1) explicitly models the nodal attributes and node dependencies seamlessly in a joint framework; and (2) handles the exploration-exploitation dilemma when querying anomalies of different types. Extensive experiments on real-world datasets show the improvement of the proposed algorithm over the state-of-the-art algorithms.
引用
收藏
页码:357 / 365
页数:9
相关论文
共 54 条
[1]  
Achtert E., 2013, Proceedings of the ACM SIGMOD International Conference on Management of Data, P1009, DOI [10.1145/2463676.2463696, DOI 10.1145/2463676.2463696]
[2]  
Agarwal D., 2007, P 24 INT C MACH LEAR, P721, DOI [DOI 10.1145/1273496.1273587, 10.1145/1273496.1273587]
[3]  
Aggarwal C.C., 2015, The Data Mining, P237
[4]  
Agrawal S, 2013, INT C MACH LEARN, P127
[5]   Graph based anomaly detection and description: a survey [J].
Akoglu, Leman ;
Tong, Hanghang ;
Koutra, Danai .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) :626-688
[6]  
[Anonymous], ICDM
[7]  
[Anonymous], 2014, WWW, DOI DOI 10.1145/2566486.2567993
[8]  
[Anonymous], 2010, PAKDD
[9]  
[Anonymous], 1985, Herbert Robbins Selected Papers
[10]  
[Anonymous], BANDIT PROCESSES DYN