Overview on Graph Based Anomaly Detection

被引:0
|
作者
Li Z. [1 ,2 ]
Jin X.-L. [1 ,2 ]
Zhuang C.-Z. [1 ,2 ]
Sun Z. [1 ,2 ]
机构
[1] Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing
[2] School of Computer and Control Engineering, University of Chinese Academy of Sciences, Beijing
来源
Ruan Jian Xue Bao/Journal of Software | 2021年 / 32卷 / 01期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Data mining; Graph anomaly detection; Graph data mining;
D O I
10.13328/j.cnki.jos.006100
中图分类号
学科分类号
摘要
In recent years, with the popularization of Web 2.0, people pay more and more attentions to the graph anomaly detection. The graph anomaly detection plays an increasingly vital role in the field of fraud detection, intrusion detection, false voting, and zombie fan analysis. This paper presents a survey on existing approaches to address this problem and reviews the recent developed techniques to detect graph anomalies. The graph-oriented anomaly detection is divided into two types, the anomaly detection on static graph and the anomaly detection on dynamic graph. Existing work on static graph anomaly detection have identified two types of anomalies: One is individual anomaly that refers to the abnormal behaviors of individual entity, the other is group anomaly that occurs due to unusual patterns of groups. The anomaly on dynamic graph can be divided into three types: Isolated individual anomaly, group anomaly, and event anomaly. This paper introduces the current research progress of each kind of anomaly detection methods, and summarizes the key technologies, common frameworks, application fields, common data sets, and performance evaluation methods of graph-oriented anomaly detection. Finally, future research directions on graph anomaly detection are discussed. © Copyright 2021, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:167 / 193
页数:26
相关论文
共 86 条
  • [1] Moonesinghe HDK, Tan PN., Outrank: A graph-based outlier detection framework using random walk, Int'l Journal on Artificial Intelligence Tools, 17, 1, pp. 19-36, (2008)
  • [2] Guo JY, Li RH, Zhang Y, Wang GR., Graph neural network based anomaly detection in dynamic networks, Ruan Jian Xue Bao/ Journal of Software, 31, 3, pp. 748-762, (2020)
  • [3] Akoglu L, Tong H, Koutra D., Graph based anomaly detection and description: A survey, Data Mining and Knowledge Discovery, 29, 3, pp. 626-688, (2015)
  • [4] Gogoi P, Bhattacharyya DK, Borah B, Et al., A survey of outlier detection methods in network anomaly identification, The Computer Journal, 54, 4, pp. 570-588, (2011)
  • [5] Gupta M, Gao J, Aggarwal CC, Et al., Outlier detection for temporal data: A survey, IEEE Trans. on Knowledge and Data Engineering, 26, 9, pp. 2250-2267, (2014)
  • [6] Ranshous S, Shen S, Koutra D, Et al., Anomaly detection in dynamic networks: A survey, Wiley Interdisciplinary Reviews: Computational Statistics, 7, 3, pp. 223-247, (2015)
  • [7] Yu R, Qiu H, Wen Z, Et al., A survey on social media anomaly detection, ACM SIGKDD Explorations Newsletter, 18, 1, pp. 1-14, (2016)
  • [8] Zhang YQ, Lv SQ, Fan D., Anomaly detection in online social networks, Chinese Journal of Computers, 10, pp. 2011-2027, (2015)
  • [9] Mao JL, Jin CQ, Zhang ZG, Zhou AY., Anomaly detection for trajectory big data: Advancements and framework, Ruan Jian Xue Bao/Journal of Software, 28, 1, pp. 17-34, (2017)
  • [10] Mo Q, Yang K., Overview of Web spammer detection, Ruan Jian Xue Bao/Journal of Software, 25, 7, pp. 1505-1526, (2014)