Anomaly Detection in Social Networks

被引:0
|
作者
Giri, Vivek Kumar [1 ]
Sachdeva, Shelly [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Delhi, India
关键词
Social Networks; Anomaly Detection; Closeness Centrality; Stars; Cliques; Power Law; CENTRALITY;
D O I
10.1109/confluence.2019.8776957
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social Networks provides a mode of information sharing forindividuals from anywhere in the world. Diverse domains, such as,entertainment, education, business, and medical are using it. Excessive utilization of social media may cause various types of illegal activities like spurns, rumor spreading. In order to avoid these activities, it is necessary to detect them. Two types of data can be extracted from social networks: the behavioral data that represents the users' activities on the social media platform; and the structural data that represents the topological aspects of the networks. The useful information contained by data can be studied by graph theory for anomaly detection task. Existing structural features like degree, edge count, average betweenness centrality and brokerage lack in terms of accuracy and produce false positive and false negative. To reduce the amount of false positive and false negative we have used a new graph metric closeness centrality for anomaly detection task andapplied the proposed method on three datasets collected from a social networkrepository. The comparability and efficiency of different methods have been studied using statistical quantities like F-score, precision, andrecall. Experimental results show that the relationship between closeness centrality of an egonet and number of edges in egonet is capable to catch most of the anomalies and have higher F-score value than degree, average betweenness centrality and brokerage.
引用
收藏
页码:698 / 703
页数:6
相关论文
共 50 条
  • [21] AD-C: A new node anomaly detection based on community detection in social networks
    Keyvanpour M.R.
    Shirzad M.B.
    Ghaderi M.
    [J]. International Journal of Electronic Business, 2020, 15 (03) : 199 - 222
  • [22] A trust-based detection scheme to explore anomaly prevention in social networks
    Xu Wu
    [J]. Knowledge and Information Systems, 2019, 60 : 1565 - 1586
  • [23] Anomaly Detection in Online Social Networks Using Structure-Based Technique
    Rezaei, Abdolazim
    Kasirun, Zarinah Mohd
    Rohani, Vala Ali
    Khodadadi, Touraj
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 619 - +
  • [24] Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection
    Aljably, Randa
    Tian, Yuan
    Al-Rodhaan, Mznah
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [25] A trust-based detection scheme to explore anomaly prevention in social networks
    Wu, Xu
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 60 (03) : 1565 - 1586
  • [26] Anomaly Recognition in Online Social Networks
    Rawat, Ashish
    Gugnani, Gunjan
    Shastri, Minakshi
    Kumar, Pardeep
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 109 - 118
  • [27] Comparison of Anomaly Detection Techniques In Networks
    Kunjumon, Anu
    Madhu, Arun
    Kizhakkethottam, Jubilant J.
    [J]. PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORKS SECURITY (ICSNS 2015), 2015,
  • [28] Robust Anomaly Detection in Dynamic Networks
    Wang, Jing
    Paschalidis, Ioannis Ch.
    [J]. 2014 22ND MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2014, : 428 - 433
  • [29] Deep Anomaly Detection with Deviation Networks
    Pang, Guansong
    Shen, Chunhua
    van den Hengel, Anton
    [J]. KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 353 - 362
  • [30] Compressive Anomaly Detection in Large Networks
    Li, Xiao
    Poor, H. Vincent
    Scaglione, Anna
    [J]. 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 985 - 988