A survey of data mining and social network analysis based anomaly detection techniques

被引:54
|
作者
Kaur, Ravneet [1 ]
Singh, Sarbjeet [1 ]
机构
[1] Panjab Univ, Univ Inst Engn & Technol, Chandigarh, UT, India
关键词
Anomaly detection; Online social networks; Social network analysis; Data mining; Graph based anomaly detection; INTRUSION DETECTION; CLUSTERING-ALGORITHM; COMMUNITY STRUCTURE; SYSTEM; MODEL;
D O I
10.1016/j.eij.2015.11.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing trend of online social networks in different domains, social network analysis has recently become the center of research. Online Social Networks (OSNs) have fetched the interest of researchers for their analysis of usage as well as detection of abnormal activities. Anomalous activities in social networks represent unusual and illegal activities exhibiting different behaviors than others present in the same structure. This paper discusses different types of anomalies and their novel categorization based on various characteristics. A review of number of techniques for preventing and detecting anomalies along with underlying assumptions and reasons for the presence of such anomalies is covered in this paper. The paper presents a review of number of data mining approaches used to detect anomalies. A special reference is made to the analysis of social network centric anomaly detection techniques which are broadly classified as behavior based, structure based and spectral based. Each one of this classification further incorporates number of techniques which are discussed in the paper. The paper has been concluded with different future directions and areas of research that could be addressed and worked upon. (C) 2015 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University. This is an open access article under the CC BY-NC-ND license (http://creativecommons. org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:199 / 216
页数:18
相关论文
共 50 条
  • [1] The Key Techniques of the Network Anomaly Detection Based on Data Mining
    He Xiaobo
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1896 - 1899
  • [2] Data Mining Approach for Anomaly Detection in Social Network Analysis
    Sudha, M. Swarna
    Priya, K. Arun
    Lakshmi, A. Kanaka
    Kruthika, A.
    Priya, D. Lakshmi
    Valarmathi, K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1862 - 1866
  • [3] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
  • [4] A Survey on Blockchain Anomaly Detection Using Data Mining Techniques
    Li, Ji
    Gu, Chunxiang
    Wei, Fushan
    Chen, Xi
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 491 - 504
  • [5] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [6] The Research of Network Anomaly Detection Technology Based on Data Mining
    Wu, Chunhong
    Xia, Wenzhong
    Liu, Fengyun
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1689 - 1692
  • [7] Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques
    Agarwal, Basant
    Mittal, Namita
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 996 - 1003
  • [8] Data mining methodology for anomaly detection in network data
    Caruso, Costantina
    Malerba, Donato
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT II, PROCEEDINGS, 2007, 4693 : 109 - 116
  • [9] Efficient Classification Mechanism for Network Intrusion Detection System Based on Data Mining Techniques: a Survey
    Subaira, A. S.
    Scholar, P. G.
    Anitha, P.
    2014 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2014, : 274 - 280
  • [10] Anomaly Detection System of Wireless Communication Network Based on Data Mining
    Chen Ningjun
    Gao Zhinian
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 1257 - 1262