Graph Anomaly Detection Based on Steiner Connectivity and Density

被引:16
作者
Cadena, Jose [1 ,2 ,3 ]
Chen, Feng [4 ]
Vullikanti, Anil [1 ,2 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24060 USA
[2] Virginia Tech, Biocomplex Inst, Blacksburg, VA 24060 USA
[3] Lawrence Livermore Natl Lab, Machine Learning Grp, Livermore, CA 94550 USA
[4] SUNY Albany, Dept Comp Sci, Albany, NY 12222 USA
基金
美国国家科学基金会;
关键词
Approximation algorithms; dense subgraph mining; graph anomaly detection; graph mining; parameterized complexity; scan statistics; HIGHER CRITICISM; SUBSET SCAN; ALGORITHMS; EVENTS;
D O I
10.1109/JPROC.2018.2813311
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Detecting "hotspots" and "anomalies" is a recurring problem with a wide range of applications, such as social network analysis, epidemiology, finance, and biosurveillance, among others. Networks are a common abstraction in these applications for representing complex relationships. Typically, these networks are dynamic-, i.e., they evolve over time. A number of methods have been proposed for anomaly detection in such dynamic network data sets, which are primarily based on changes in network properties. We provide a survey of the various formulations of anomaly detection in dynamic networks with a focus on "window-based" methods. Window-based methods first define a time window of past network snapshots to model normal behavior and then mark a snapshot as anomalous if it has significantly different patterns from those observed in the time window. We describe two classes of techniques: 1) generalizations of Steiner connectivity; and 2) dense subgraph mining. Both have been used extensively in window-based graph anomaly detection. We summarize the key problem formulations that have been studied using these approaches, and we describe details of some of the main techniques.
引用
收藏
页码:829 / 845
页数:17
相关论文
共 104 条
[51]   Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming [J].
Goemans, MX ;
Williamson, DP .
JOURNAL OF THE ACM, 1995, 42 (06) :1115-1145
[52]  
Goldberg A. V., 1984, TECH REP
[53]  
Hauptmann M., 2013, A compendium on steiner tree problems
[54]   BAYESIAN ANOMALY DETECTION METHODS FOR SOCIAL NETWORKS [J].
Heard, Nicholas A. ;
Weston, David J. ;
Platanioti, Kiriaki ;
Hand, David J. .
ANNALS OF APPLIED STATISTICS, 2010, 4 (02) :645-662
[55]  
Hegde C, 2015, PR MACH LEARN RES, V37, P928
[56]   FRAUDAR: Bounding Graph Fraud in the Face of Camouflage [J].
Hooi, Bryan ;
Song, Hyun Ah ;
Beutel, Alex ;
Shah, Neil ;
Shin, Kijung ;
Faloutsos, Christos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :895-904
[57]  
Iyengar S. K., 2007, LINKAGE DISEQUILIBRI
[58]   Goodness-of-fit tests via phi-divergences [J].
Jager, Leah ;
Wellner, Jon A. .
ANNALS OF STATISTICS, 2007, 35 (05) :2018-2053
[59]   Less is more: Sparse graph mining with Compact Matrix Decomposition [J].
Sun, Jimeng ;
Xie, Yinglian ;
Zhang, Hui ;
Faloutsos, Christos .
Statistical Analysis and Data Mining, 2008, 1 (01) :6-22
[60]   A spatial scan statistic for multinomial data [J].
Jung, Inkyung ;
Kulldorff, Martin ;
Richard, Otukei John .
STATISTICS IN MEDICINE, 2010, 29 (18) :1910-1918