ONLINE ANOMALY DETECTION WITH EXPERT SYSTEM FEEDBACK IN SOCIAL NETWORKS

被引:0
|
作者
Horn, Corinne [1 ]
Willett, Rebecca [1 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
关键词
anomaly detection; exponential families; sequential probability assignment; label-efficient prediction; filtering;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
In this paper, we propose examining the participants in various meetings or communications within a social network, and using sequential inference based on these participant lists to quickly and accurately predict anomalies in the content of those communications. The proposed approach consists of two main elements: (1) filtering, or assigning a belief or likelihood to each successive measurement based upon our ability to predict it from previous noisy observations, and (2) hedging, or flagging potential anomalies by comparing the current belief against a time-varying and data-adaptive threshold. The threshold is adjusted based on feedback requested from an expert system. In general, parsing communication data can require nontrivial computational resources, but since parsed data is only used sparingly for feedback, the overall computational complexity of the proposed approach is relatively low. Regret bounds quantify the performance of the proposed approach, and experiments on the Enron email database demonstrate its efficacy.
引用
收藏
页码:1936 / 1939
页数:4
相关论文
共 50 条
  • [21] A Comparative Study of Expert Search Strategies in Online Social Networks
    Joung, Yuh-Jzer
    Chen, Shy-Min
    Wu, Chih-Chang
    Chiu, Terry Hui-Ye
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2013, : 960 - 967
  • [22] Rule-based expert system for maritime anomaly detection
    Roy, Jean
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE IX, 2010, 7666
  • [23] A Hybrid Online Offline System for Network Anomaly Detection
    Odiathevar, Murugaraj
    Seah, Winston K. G.
    Frean, Marcus
    [J]. 2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [24] Incorporating Expert Feedback into Active Anomaly Discovery
    Das, Shubhomoy
    Wong, Weng-Keen
    Dietterich, Thomas
    Fern, Alan
    Emmott, Andrew
    [J]. 2016 IEEE 16TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2016, : 853 - 858
  • [25] Anomaly Detection in Social-Aware IoT Networks
    Tang, Jine
    Qin, Taishan
    Kong, Deliang
    Zhou, Zhangbing
    Li, Xiaocui
    Wu, Yongdong
    Gu, Junhua
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3162 - 3176
  • [26] An efficient framework for anomaly detection in attributed social networks
    Khan W.
    Haroon M.
    [J]. International Journal of Information Technology, 2022, 14 (6) : 3069 - 3076
  • [27] Detection of Account Cloning in Online Social Networks
    Punkamol, Dechana
    Marukatat, Rangsipan
    [J]. 2020 8TH INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS (IEECON), 2020,
  • [28] Online Diffusion Source Detection in Social Networks
    Wang, Haishuai
    Zhang, Peng
    Chen, Ling
    Liu, Huan
    Zhang, Chengqi
    [J]. 2015 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2015,
  • [29] On Link Stability Detection for Online Social Networks
    Zhang, Ji
    Tao, Xiaohui
    Tan, Leonard
    Lin, Jerry Chun-Wei
    Li, Hongzhou
    Chang, Liang
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2018, PT I, 2018, 11029 : 320 - 335
  • [30] Toward Worm Detection in Online Social Networks
    Xu, Wei
    Zhang, Fangfang
    Zhu, Sencun
    [J]. 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 11 - 20