A survey of data mining and social network analysis based anomaly detection techniques

被引:54
|
作者
Kaur, Ravneet [1 ]
Singh, Sarbjeet [1 ]
机构
[1] Panjab Univ, Univ Inst Engn & Technol, Chandigarh, UT, India
关键词
Anomaly detection; Online social networks; Social network analysis; Data mining; Graph based anomaly detection; INTRUSION DETECTION; CLUSTERING-ALGORITHM; COMMUNITY STRUCTURE; SYSTEM; MODEL;
D O I
10.1016/j.eij.2015.11.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing trend of online social networks in different domains, social network analysis has recently become the center of research. Online Social Networks (OSNs) have fetched the interest of researchers for their analysis of usage as well as detection of abnormal activities. Anomalous activities in social networks represent unusual and illegal activities exhibiting different behaviors than others present in the same structure. This paper discusses different types of anomalies and their novel categorization based on various characteristics. A review of number of techniques for preventing and detecting anomalies along with underlying assumptions and reasons for the presence of such anomalies is covered in this paper. The paper presents a review of number of data mining approaches used to detect anomalies. A special reference is made to the analysis of social network centric anomaly detection techniques which are broadly classified as behavior based, structure based and spectral based. Each one of this classification further incorporates number of techniques which are discussed in the paper. The paper has been concluded with different future directions and areas of research that could be addressed and worked upon. (C) 2015 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University. This is an open access article under the CC BY-NC-ND license (http://creativecommons. org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:199 / 216
页数:18
相关论文
共 50 条
  • [31] Real Anomaly Detection in Telecommunication Multidimensional Data Using Data Mining Techniques
    Choros, Kazimierz
    COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, PT I, 2010, 6421 : 11 - 19
  • [32] Applying fuzzy data mining to network unsupervised anomaly detection
    Xiang, G
    Min, W
    Zhao, RC
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1249 - 1253
  • [33] Survey of Analysis of Crime Detection Techniques Using Data Mining and Machine Learning
    Prabakaran, S.
    Mitra, Shilpa
    PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [34] Anomaly Detection Based on Mining Six Local Data Features and BP Neural Network
    Zhang, Yu
    Zhu, Yuanpeng
    Li, Xuqiao
    Wang, Xiaole
    Guo, Xutong
    SYMMETRY-BASEL, 2019, 11 (04):
  • [35] Churn Analysis of Online Social Network Users Using Data Mining Techniques
    Long, Xi
    Yin, Wenjing
    An, Le
    Ni, Haiying
    Huang, Lixian
    Luo, Qi
    Chen, Yan
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, IMECS 2012, VOL I, 2012, : 551 - 556
  • [36] Algorithm Optimization of Anomaly Detection Based on Data Mining
    Zhang, Lei
    Chen, Yong
    Liao, Shaowen
    2018 10TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2018, : 402 - 404
  • [37] The Coal Production Anomaly Detection Based on Data Mining
    Wang Guanghui
    Kuang Yali
    Wang Zhangguo
    MEASUREMENT TECHNOLOGY AND ITS APPLICATION, PTS 1 AND 2, 2013, 239-240 : 744 - 748
  • [38] Anomaly Detection in Admission or Selection Examinations using Data Mining Techniques
    Ashaduzzaman, Md
    Roy, Shanto
    Zaman, Shihabuz
    Ferdaus, Abu Ahmed
    2020 2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2020,
  • [39] A survey of Big Data in social media using data mining techniques
    Gole, Sheela
    Tidke, Bharat
    ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [40] Collective Anomaly Detection Techniques for Network Traffic Analysis
    Ahmed M.
    Annals of Data Science, 2018, 5 (4) : 497 - 512