A review of social network centric anomaly detection techniques

被引:1
|
作者
Kaur, Ravneet [1 ]
Singh, Sarbjeet [1 ]
机构
[1] Panjab Univ, UIET, Dept Comp Sci & Engn, Chandigarh 160014, India
关键词
anomaly detection; classification; clustering; centrality; data mining; graph-based anomaly detection; online social networks; social network analysis; proximity; static networks; dynamic networks;
D O I
10.1504/IJCNDS.2016.10001611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks have gained much attention in the recent years in terms of their analysis for usage as well as detection of abnormal activities. Anomalous activities arise when someone shows a different behaviour than others in the network. Presence of these anomalies may pose a number of problems which need to be addressed. This paper discusses different types of anomalies and their novel categorisation based on various factors. A review of various techniques used for detecting anomalies along with underlying assumptions and reasons for the presence of such anomalies is also covered. A special reference is made to different data mining approaches used to detect anomalies. However, the major focus of paper is the analysis of social network centric anomaly detection approaches which are broadly classified as behaviour-based, structure-based and spectral-based. Each one of this classification further incorporates a number of techniques which are discussed in the paper.
引用
收藏
页码:358 / 386
页数:29
相关论文
共 50 条
  • [31] egoDetect: Visual Detection and Exploration of Anomaly in Social Communication Network
    Pu, Jiansu
    Zhang, Jingwen
    Shao, Hui
    Zhang, Tingting
    Rao, Yunbo
    SENSORS, 2020, 20 (20) : 1 - 21
  • [32] Anomaly Detection in Social Media Using Recurrent Neural Network
    Shah, Shamoz
    Goyal, Madhu
    COMPUTATIONAL SCIENCE - ICCS 2019, PT IV, 2019, 11539 : 74 - 83
  • [33] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [34] Dynamic Network Anomaly Detection System by Using Deep Learning Techniques
    Lin, Peng
    Ye, Kejiang
    Xu, Cheng-Zhong
    CLOUD COMPUTING - CLOUD 2019, 2019, 11513 : 161 - 176
  • [35] Network Anomaly Detection Using Genetic Programming with Semantic Approximation Techniques
    Thi Huong Chu
    Quang Uy Nguyen
    2021 RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES (RIVF 2021), 2021, : 144 - 149
  • [36] A Performance Comparison of Feature Selection Techniques with SVM for Network Anomaly Detection
    Khaokaew, Yonchanok
    Anusas-amornkul, Tanapat
    2016 4TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2016, : 85 - 89
  • [37] NETWORK TRAFFIC ANOMALY DETECTION USING CLUSTERING TECHNIQUES AND PERFORMANCE COMPARISON
    Liu, Duo
    Lung, Chung-Horng
    Lambadaris, Ioannis
    Seddigh, Nabil
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 345 - 348
  • [38] Review on event detection techniques in social multimedia
    Garg, Muskan
    Kumar, Mukesh
    ONLINE INFORMATION REVIEW, 2016, 40 (03) : 347 - 361
  • [39] A review of rumor detection techniques in social networks
    Liu, Yao
    Shen, Hao
    Shi, Lei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (03) : 3561 - 3578
  • [40] Data preprocessing for anomaly based network intrusion detection: A review
    Davis, Jonathan J.
    Clark, Andrew J.
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 353 - 375