A survey of data mining and social network analysis based anomaly detection techniques

被引:54
|
作者
Kaur, Ravneet [1 ]
Singh, Sarbjeet [1 ]
机构
[1] Panjab Univ, Univ Inst Engn & Technol, Chandigarh, UT, India
关键词
Anomaly detection; Online social networks; Social network analysis; Data mining; Graph based anomaly detection; INTRUSION DETECTION; CLUSTERING-ALGORITHM; COMMUNITY STRUCTURE; SYSTEM; MODEL;
D O I
10.1016/j.eij.2015.11.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing trend of online social networks in different domains, social network analysis has recently become the center of research. Online Social Networks (OSNs) have fetched the interest of researchers for their analysis of usage as well as detection of abnormal activities. Anomalous activities in social networks represent unusual and illegal activities exhibiting different behaviors than others present in the same structure. This paper discusses different types of anomalies and their novel categorization based on various characteristics. A review of number of techniques for preventing and detecting anomalies along with underlying assumptions and reasons for the presence of such anomalies is covered in this paper. The paper presents a review of number of data mining approaches used to detect anomalies. A special reference is made to the analysis of social network centric anomaly detection techniques which are broadly classified as behavior based, structure based and spectral based. Each one of this classification further incorporates number of techniques which are discussed in the paper. The paper has been concluded with different future directions and areas of research that could be addressed and worked upon. (C) 2015 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University. This is an open access article under the CC BY-NC-ND license (http://creativecommons. org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:199 / 216
页数:18
相关论文
共 50 条
  • [41] Anomaly detection in network security based on nonparametric techniques
    Kim, Eunhye
    Kim, Sehun
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 3240 - 3241
  • [42] A Survey of Tax Risk Detection Using Data Mining Techniques
    Zheng, Qinghua
    Xu, Yiming
    Liu, Huixiang
    Shi, Bin
    Wang, Jiaxiang
    Dong, Bo
    ENGINEERING, 2024, 34 : 43 - 59
  • [43] Optical fiber network anomaly analysis algorithm based on Bayesian partition data mining
    Liu Y.
    Huo X.
    Liu Z.
    Hongwai yu Jiguang Gongcheng/Infrared and Laser Engineering, 2021, 50 (08):
  • [44] BGP Anomaly Detection Techniques: A Survey
    Al-Musawi, Bahaa
    Branch, Philip
    Armitage, Grenville
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01): : 377 - 396
  • [45] A survey of data mining techniques
    Maojo, V
    Sanandrés, J
    MEDICAL DATA ANALYSIS, PROCEEDINGS, 2000, 1933 : 17 - 22
  • [46] A comprehensive survey of anomaly detection techniques for high dimensional big data
    Srikanth Thudumu
    Philip Branch
    Jiong Jin
    Jugdutt (Jack) Singh
    Journal of Big Data, 7
  • [47] Anomaly Detection Based on Convex Analysis: A Survey
    Wang, Tong
    Cai, Mengsi
    Ouyang, Xiao
    Cao, Ziqiang
    Cai, Tie
    Tan, Xu
    Lu, Xin
    FRONTIERS IN PHYSICS, 2022, 10
  • [48] A comprehensive survey of anomaly detection techniques for high dimensional big data
    Thudumu, Srikanth
    Branch, Philip
    Jin, Jiong
    Singh, Jugdutt
    JOURNAL OF BIG DATA, 2020, 7 (01)
  • [49] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [50] Study of data mining in social network analysis
    Beijing University of Posts and Telecommunications, Beijing, China
    不详
    J. Inf. Comput. Sci., 16 (5947-5955):