F-FADE: Frequency Factorization for Anomaly Detection in Edge Streams

被引:25
作者
Chang, Yen-Yu [1 ]
Li, Pan [2 ]
Sosic, Rok [1 ]
Afifi, M. H. [3 ]
Schweighauser, Marco [3 ]
Leskovec, Jure [1 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Purdue Univ, W Lafayette, IN 47907 USA
[3] Barracuda Networks, Campbell, CA USA
来源
WSDM '21: PROCEEDINGS OF THE 14TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING | 2021年
关键词
anomaly detection; dynamic network; account takeout protection;
D O I
10.1145/3437963.3441806
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Edge streams are commonly used to capture interactions in dynamic networks, such as email, social, or computer networks. The problem of detecting anomalies or rare events in edge streams has a wide range of applications. However, it presents many challenges due to lack of labels, a highly dynamic nature of interactions, and the entanglement of temporal and structural changes in the network. Current methods are limited in their ability to address the above challenges and to efficiently process a large number of interactions. Here, we propose F-FADE, a new approach for detection of anomalies in edge streams, which uses a novel frequency-factorization technique to efficiently model the time-evolving distributions of frequencies of interactions between node-pairs. The anomalies are then determined based on the likelihood of the observed frequency of each incoming interaction. F-FADE is able to handle in an online streaming setting a broad variety of anomalies with temporal and structural changes, while requiring only constant memory. Our experiments on one synthetic and six real-world dynamic networks show that F-FADE achieves state of the art performance and may detect anomalies that previous methods are unable to find.
引用
收藏
页码:589 / 597
页数:9
相关论文
共 49 条
[21]   BAYESIAN ANOMALY DETECTION METHODS FOR SOCIAL NETWORKS [J].
Heard, Nicholas A. ;
Weston, David J. ;
Platanioti, Kiriaki ;
Hand, David J. .
ANNALS OF APPLIED STATISTICS, 2010, 4 (02) :645-662
[22]  
Ho G, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P1273
[23]  
Hu RJ, 2016, PROC INT CONF DATA, P385, DOI 10.1109/ICDE.2016.7498256
[24]   Social phishing [J].
Jagatic, Tom N. ;
Johnson, Nathaniel A. ;
Jakobsson, Markus ;
Menczer, Filippo .
COMMUNICATIONS OF THE ACM, 2007, 50 (10) :94-100
[25]  
Jeh Glen, 2003, P 12 INT C WORLD WID, P271
[26]  
Leskovec J, 2010, J MACH LEARN RES, V11, P985
[27]  
Li JD, 2017, PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P2152
[28]  
Lippmann R, 1999, RECENT ADV INTRUSION, P829
[29]   Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs [J].
Manzoor, Emaad ;
Milajerdi, Sadegh M. ;
Akoglu, Leman .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :1035-1044
[30]   Dynamic Anomalography: Tracking Network Anomalies Via Sparsity and Low Rank [J].
Mardani, Morteza ;
Mateos, Gonzalo ;
Giannakis, Georgios B. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2013, 7 (01) :50-66