Skip to main content

Advertisement

Log in

An efficient framework for anomaly detection in attributed social networks

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Anomaly Detection on attributed networks has recently drawn significant attention from researchers and is widely used in a number of high-impact areas. The majority of current approaches focus on shallow learning methods such as community analysis, ego network or selection of subspace method. These approaches have network sparsity and data nonlinearity problems, and they do not even capture the intricate relationships between various information sources. Deep learning approaches like graph autoencoders suffer from the problem of ignoring the latent codes’ embedding distribution, which results in poor representation in many instances. In this paper, we present a new framework for detecting anomalies on attributed networks. First, our framework utilizes a dual variational autoencoder for considering the potential data distribution. Lastly, the Gaussian Mixture Model is used to approximate the latent vector density, resulting in anomaly detection from measuring sample energy. Extensive experiments on attributed networks prove that the proposed framework significantly outperforms the existing methods, proving the efficiency of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Khan W, Haroon M (2021) An exhaustive review on state-of-the-art techniques for anomaly detection on attributed networks. April, https://turcomat.org/index.php/turkbilmat/article/view/5537/4640

  2. Kalnoor G, Gowrishankar S (2021) A model for intrusion detection system using hidden Markov and variational Bayesian model for IoT based wireless sensor network. Int J Inf Technol. https://doi.org/10.1007/s41870-021-00748-1

    Article  Google Scholar 

  3. Verma KK, Singh BM, Dixit A (2022) A review of supervised and unsupervised machine learning techniques for suspicious behavior recognition in intelligent surveillance system. Int J Inf Technol 14(1):397–410. https://doi.org/10.1007/s41870-019-00364-0

    Article  Google Scholar 

  4. Ashok Kumar D, Venugopalan SR (2019) A design of a parallel network anomaly detection algorithm based on classification. Int J Inf Technol. https://doi.org/10.1007/s41870-019-00356-0

    Article  Google Scholar 

  5. Wang Y-N, Wang J, Fan X, Song Y (2020) Network traffic anomaly detection algorithm based on intuitionistic fuzzy time series graph mining. IEEE Access 8:63381–63389. https://doi.org/10.1109/ACCESS.2020.2983986

    Article  Google Scholar 

  6. Ye F, Huang C, Cao J, Li M, Zhang Y, Lu C (2022) Attribute restoration framework for anomaly detection. IEEE Trans Multimedia 24:116–127. https://doi.org/10.1109/TMM.2020.3046884

    Article  Google Scholar 

  7. Khan AN, Fan MY, Nazeer MI, Memon RA, Malik A, Husain MA (2019) An efficient separable reversible data hiding using paillier cryptosystem for preserving privacy in cloud domain. Electron. https://doi.org/10.3390/electronics8060682

    Article  Google Scholar 

  8. Khan AN, Yu Fan M, Malik A, Memon RA (2019) Learning from privacy preserved encrypted data on cloud through supervised and unsupervised machine learning. https://doi.org/10.1109/ICOMET.2019.8673524

  9. Khan AN, Nazarian H, Golilarz NA, Addeh A, Li JP, Khan GA (2020) Brain tumor classification using efficient deep features of MRI scans and support vector machine. In: 2020 17th International computer conference on wavelet active media technology and information processing (ICCWAMTIP), p 314–318

  10. Khan AN, Fan MY, Malik A, Husain MA (2019) Advancements in reversible data hiding in encrypted images using public key cryptography. https://doi.org/10.1109/ICCT46177.2019.8969030

  11. Peng Z, Luo M, Li J, Xue L, Zheng Q (2022) A deep multi-view framework for anomaly detection on attributed networks. IEEE Trans Knowl Data Eng 34(6):2539–2552. https://doi.org/10.1109/TKDE.2020.3015098

    Article  Google Scholar 

  12. Bai T, Zhang Y, Wu B, Nie JY (2020) Temporal graph neural networks for social recommendation. In: Proceedings—2020 IEEE international conference on big data, big data 2020, p 898–903. https://doi.org/10.1109/BigData50022.2020.9378444

  13. Rasool M, Khan W. Big data: study in structured and unstructured data

  14. Liu Z, Zhou J, Chen C, Li X, Yang X, Song L (2018) Heterogeneous graph neural networks for malicious account detection. Int Conf Inf Knowl Manag Proc 1:2077–2086. https://doi.org/10.1145/3269206.3272010

    Article  Google Scholar 

  15. Kundra H, Khan W, Malik M, Rane KP, Neware R, Jain V (2021) Quantum-inspired firefly algorithm integrated with cuckoo search for optimal path planning. Int J Mod Phys C. https://doi.org/10.1142/S0129183122500188

    Article  Google Scholar 

  16. Gao J, Liang F, Fan W, Wang C, Sun Y, Han J (2010) On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, p 813–822

  17. Perozzi B, Akoglu L (2016) Scalable anomaly ranking of attributed neighborhoods. In: Proceedings of the 2016 SIAM international conference on data mining, p 207–215

  18. Perozzi B, Akoglu L (2018) Discovering communities and anomalies in attributed graphs: interactive visual exploration and summarization. ACM Trans Knowl Discov from Data 12(2):1–40

    Article  Google Scholar 

  19. Perozzi B, Akoglu L, Iglesias Sánchez P, Müller E (2014) Focused clustering and outlier detection in large attributed graphs. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, p 1346–1355

  20. Bhuyan MH, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303–336

    Article  Google Scholar 

  21. Ding K, Li J, Bhanushali R, Liu H (2019) Deep anomaly detection on attributed networks. In: SIAM international conference on data mining, SDM 2019, no 2, p 594–602. https://doi.org/10.1137/1.9781611975673.67

  22. Li Y, Huang X, Li J, Du M, Zou N (2019) SpeCAE: spectral autoencoder for anomaly detection in attributed networks. In: International conference on information and knowledge management proceedings, p 2233–2236. https://doi.org/10.1145/3357384.3358074

  23. Fan H, Zhang F, Li Z (2020) AnomalyDAE: Dual autoencoder for anomaly detection on attributed networks. In: ICASSP 2020–2020 IEEE international conference on acoustics, speech and signal processing (ICASSP), p 5685–5689

  24. Li J, Dani H, Hu X, Liu H (2017) Radar: residual analysis for anomaly detection in attributed networks. In: IJCAI, 2017, p 2152–2158

  25. Peng Z, Luo M, Li J, Liu H, Zheng Q (2018) Anomalous: a joint modeling approach for anomaly detection on attributed networks. In: IJCAI international joint conferences on artificial intelligence, vol 2018 July, p 3513–3519. https://doi.org/10.24963/ijcai.2018/488

  26. Chami I, Abu-El-Haija S, Perozzi B, Ré C, Murphy K (2020) Machine learning on graphs: a model and comprehensive taxonomy. arXiv Prepr. arXiv2005.03675

  27. Zhu D, Ma Y, Liu Y (2020) Deepad: a joint embedding approach for anomaly detection on attributed networks. In: International conference on computational science, p 294–307

  28. Pan Y, Zou J, Qiu J, Wang S, Hu G, Pan Z (2022) Joint network embedding of network structure and node attributes via deep autoencoder. Neurocomputing 468:198–210

    Article  Google Scholar 

  29. Shi P, Zhao Z, Zhong H, Shen H, Ding L (2021) An improved agglomerative hierarchical clustering anomaly detection method for scientific data. Concurr Comput Pract Exp 33(6):e6077

    Article  Google Scholar 

  30. Vincent P, Larochelle H, Lajoie I, Bengio Y, Manzagol P-A, Bottou L (2010) Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J Mach Learn Res 11(12):3371–3408

    MathSciNet  MATH  Google Scholar 

  31. Ma X et al (2021) A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans Knowl Data Eng. https://doi.org/10.1109/TKDE.2021.3118815

    Article  Google Scholar 

  32. Müller E, Sánchez PI, Mülle Y, Böhm K (2013) Ranking outlier nodes in subspaces of attributed graphs. In: 2013 IEEE 29th international conference on data engineering workshops (ICDEW), p 216–222

  33. Sánchez PI, Müller E, Laforet F, Keller F, Böhm K (2013) Statistical selection of congruent subspaces for mining attributed graphs. In: 2013 IEEE 13th international conference on data mining, p 647–656

  34. Zhang D, Yin J, Zhu X, Zhang C (2018) Network representation learning: a survey. IEEE Trans Big Data 6(1):3–28

    Article  Google Scholar 

  35. Fan H, Zhang F, Li Z (2020) Anomalydae: dual autoencoder for anomaly detection on attributed networks. In: ICASSP, IEEE International conference on acoustics, speech, and signal processing—proceedings, vol 2020-May, p 5685–5689. https://doi.org/10.1109/ICASSP40776.2020.9053387

  36. Zhang F, Fan H, Wang R, Li Z, Liang T (2022) Deep dual support vector data description for anomaly detection on attributed networks. Int J Intell Syst 37(2):1509–1528

    Article  Google Scholar 

  37. Pei Y, Huang T, van Ipenburg W, Pechenizkiy M (2021) ResGCN: attention-based deep residual modeling for anomaly detection on attributed networks. Mach Learn p 1–23

  38. Wang X, Jin B, Du Y, Cui P, Tan Y, Yang Y (2021) One-class graph neural networks for anomaly detection in attributed networks. Neural Comput Appl 33(18):12073–12085. https://doi.org/10.1007/s00521-021-05924-9

    Article  Google Scholar 

  39. Zong, B. et al (2018) Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International conference on learning representations

Download references

Acknowledgements

This work is acknowledged under Integral University manuscript No IU/R&D/2022-MCN0001490.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wasim Khan.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, W., Haroon, M. An efficient framework for anomaly detection in attributed social networks. Int. j. inf. tecnol. 14, 3069–3076 (2022). https://doi.org/10.1007/s41870-022-01044-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-022-01044-2

Keywords

Navigation