Identifying Provenance of Information and Anomalous Paths in Attributed Social Networks

被引:0
|
作者
Trivedi, Hetuk [1 ]
Bindu, P., V [2 ]
Thilagam, P. Santhi [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Mangalore, Karnataka, India
[2] Govt Coll Engn, Dept Comp Sci & Engn, Kannur, India
关键词
Social networks; Information provenance; Anomaly detection; Anomalous nodes; Information diffusion; Spreading cascade;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information provenance problem is an important and challenging problem in social network analysis and it deals with identifying the origin or source of information spread in a social network. In this paper, an approach for detecting the source of an information spread as well as suspicious anomalous paths in a social network is proposed. An anomalous path is a sequence of nodes that propagates an anomalous information to the given destination nodes who cause an anomalous event. The proposed approach is based on attribute-based anomalies and information cascading technique. The anomalous paths are identified in two steps. The first step assigns an anomalous score to each and every vertex in the given graph based on suspicious attributes. The second step detects the source and suspicious anomalous paths in the network using the anomaly scores. The approach is tested on datasets such as Enron and Facebook to demonstrate its effectiveness. Detecting anomalous paths is useful in several applications including identifying terrorist attacks communication path, disease spreading pattern, and match-fixing hidden path between bookie and a cricketer.
引用
收藏
页码:914 / 919
页数:6
相关论文
共 50 条
  • [1] Identifying the main paths of information diffusion in online social networks
    Zhu, Hengmin
    Yin, Xicheng
    Ma, Jing
    Hu, Wei
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 452 : 320 - 328
  • [2] Affinity Paths and information diffusion in social networks
    Luis Iribarren, Jose
    Moro, Esteban
    [J]. SOCIAL NETWORKS, 2011, 33 (02) : 134 - 142
  • [3] Identifying Users in Social Networks with Limited Information
    Vesdapunt, Norases
    Garcia-Molina, Hector
    [J]. 2015 IEEE 31ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2015, : 627 - 638
  • [4] Nonlinear anomalous information diffusion model in social networks
    Foroozani, Ahmad
    Ebrahimi, Morteza
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2021, 103
  • [5] Anomalous information diffusion in social networks: Twitter and Digg
    Foroozani, Ahmad
    Ebrahimi, Morteza
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2019, 134 : 249 - 266
  • [6] Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks
    Khan, Wasim
    Abidin, Shafiqul
    Arif, Mohammad
    Ishrat, Mohammad
    Haleem, Mohd
    Shaikh, Anwar Ahamed
    Farooqui, Nafees Akhtar
    Faisal, Syed Mohd
    [J]. Data Science and Management, 2024, 7 (02): : 89 - 98
  • [7] Identifying Bridges for Information Spread Control in Social Networks
    Wojtasiewicz, Michal
    Ciesielski, Krzysztof
    [J]. SOCIAL INFORMATICS, 2015, 8852 : 390 - 401
  • [8] A Distributed Algorithm for Identifying Information Hubs in Social Networks
    Ilyas, Muhammad U.
    Shafiq, Zubair
    Liu, Alex X.
    Radha, Hayder
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 629 - 640
  • [9] Predicting and Identifying Missing Node Information in Social Networks
    Eyal, Ron
    Rosenfeld, Avi
    Sina, Sigal
    Kraus, Sarit
    [J]. ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2014, 8 (03)
  • [10] Information Provenance in Social Media
    Barbier, Geoffrey
    Liu, Huan
    [J]. SOCIAL COMPUTING, BEHAVIORAL-CULTURAL MODELING AND PREDICTION, 2011, 6589 : 276 - 283