Advertisement

Detecting Anomalies in Dynamic Networks

  • N. N. R. Ranga SuriEmail author
  • Narasimha Murty M
  • G. Athithan
Chapter
Part of the Intelligent Systems Reference Library book series (ISRL, volume 155)

Abstract

This chapter deals with an important analysis task over dynamic networks, namely exploring the time varying characteristics of anomalies present in such networks. In this direction, a graph mining based framework is considered that takes a sequence of network snapshots as input for analysis. It defines various categories of temporal anomalies typically encountered in such an exploration and characterizes them appropriately to enable their detection. An experimental study of this framework over benchmark graph data sets is presented here to demonstrate the evolving behavior of the anomalies detected as per the categories defined.

References

  1. 1.
    Akoglu, L., McGlohon, M., Faloutsos, C.: Oddball: spotting anomalies in weighted graphs. In: 14th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD), pp. 410–421. Hyderabad, India (2010)CrossRefGoogle Scholar
  2. 2.
    Anagnostopoulos, A., Kumar, R., Mahdian, M., Upfal, E., Vandin, F.: Algorithms on evolving graphs. In: ACM ITCS. Cambridge, Massachussets, USA (2012)Google Scholar
  3. 3.
    Bridges, R.A., Collins, J.P., Ferragut, E.M., Laska, J.A., Sullivan, B.D.: Multi-level anomaly detection in time-varying graph data. In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, pp. 579–583. ACM, Paris, France (2015)Google Scholar
  4. 4.
    Chakrabarti, D.: Autopart: parameter-free graph partitioning and outlier detection. In: PKDD, pp. 112–124 (2004)Google Scholar
  5. 5.
    Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3) (2009)CrossRefGoogle Scholar
  6. 6.
    Eberle, W., Holder, L.: Discovering structural anomalies in graph-based data. In: IEEE ICDM Workshops, pp. 393–398 (2007)Google Scholar
  7. 7.
    Eberle, W., Holder, L.: Streaming data analytics for anomalies in graphs. In: 2015 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, Waltham, USA, pp. 1–6 (2015)Google Scholar
  8. 8.
    Gupta, M., Gao, J., Aggarwal, C.C., Han, J.: Outlier Detection for Temporal Data. Synthesis Lectures on Data Mining and Knowledge Discovery. Morgan & Claypool Publishers (2014)Google Scholar
  9. 9.
    He, W., Hu, G., Zhou, Y.: Large-scale ip network behavior anomaly detection and identification using substructure-based approach and multivariate time series mining. Telecommun. Syst. 50(1), 1–13 (2012)CrossRefGoogle Scholar
  10. 10.
    Kim, M., Leskovec, J.: Latent multi-group memebership graph model. In: 29th International Conference on Machine Learning (ICML). Edinburgh, Scotland, UK (2012)Google Scholar
  11. 11.
    Leskovec, J., Krevl, A.: SNAP Datasets: stanford large network dataset collection. http://snap.stanford.edu/data (2014)
  12. 12.
    Ley, M.: DBLP—some lessons learned. In: PVLDB, vol. 2, issue 2, pp. 1493–1500 (2009)CrossRefGoogle Scholar
  13. 13.
    Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G., Lakhina, A.: Detection and identification of network anomalies using sketch subspaces. In: ACM SIGCOMM Conference on Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, pp. 147–152 (2006)Google Scholar
  14. 14.
    Linked stream benchmark data generator. http://code.google.com/p/lsbench
  15. 15.
    Mitra, S., Bagchi, A.: Modeling temporal variation in social network: an evolutionary web graph approach. In: B. Furht (ed.) Handbook of Social Network Technologies, pp. 169–184. Springer (2010)Google Scholar
  16. 16.
    Mongiovi, M., Bogdanov, P., Ranca, R., Singh, A.K., Papalexakis, E.E., Faloutsos, C.: Netspot: spotting significant anomalous regions on dynamic networks. In: SDM. Austin, Texas (2013)CrossRefGoogle Scholar
  17. 17.
    Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: SIGKDD, Washington, DC, USA, pp. 631–636 (2003)Google Scholar
  18. 18.
    Ohnishi, K., Koppen, M., Yoshida, K.: Evolutionary linkage creation between information sources in P2P networks. Evol. Intell. 5(4), 245–259 (2012)CrossRefGoogle Scholar
  19. 19.
    Papalexakis, E.E., Akoglu, L., Ienco, D.: Do more views of a graph help? community detection and clustering in multi-graphs. In: Fusion. Istanbul, Turkey (2013)Google Scholar
  20. 20.
    Rossi, R.A., Neville, J., Gallagher, B., Henderson, K.: Modeling dynamic behavior in large evolving graphs. In: WSDM. Rome, Italy (2013)Google Scholar
  21. 21.
    Suri, N.N.R.R., Murty, M.N., Athithan, G.: Characterizing temporal anomalies in evolving networks. In: 18th Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Part-I, vol. LNAI 8443, pp. 422–433. Springer, Switzerland, Tainan, Taiwan (2014)CrossRefGoogle Scholar
  22. 22.
    Suri, N.N.R.R., Murty, M.N., Athithan, G.: Data mining techniques for outlier detection. In: Q. Zhang, R.S. Segall, M. Cao (eds.) Visual Analytics and Interactive Technologies: Data, Text and Web Mining Applications, chap. 2, pp. 22–38. IGI Global, New York, USA (2011)Google Scholar
  23. 23.
    Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Signal Process. 51(8), 2191–2204 (2003)CrossRefGoogle Scholar
  24. 24.
    Toahchoodee, M., Ray, I., McConnell, R.M.: Using graph theory to represent a spatio-temporal role-based access control model. Int. J. Next Gener. Comput. 1(2) (2010)Google Scholar
  25. 25.
    Yu, W., Aggarwal, C.C., Ma, S., Wang, H.: On anomalous hotspot discovery in graph streams. In: ICDM (2013)Google Scholar
  26. 26.
    Zainal, A., Maarof, M.A., Shamsuddin, S.M., Abraham, A.: Ensemble of one-class classifiers for network intrusion detection system. In: The Fourth International Conference on Information Assurance and Security, IEEE Computer Society, Napoli, Italy, pp. 180–185 (2008)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • N. N. R. Ranga Suri
    • 1
    Email author
  • Narasimha Murty M
    • 2
  • G. Athithan
    • 3
  1. 1.Centre for Artificial Intelligence and Robotics (CAIR)BangaloreIndia
  2. 2.Department of Computer Science and AutomationIndian Institute of Science (IISc)BangaloreIndia
  3. 3.Defence Research and Development Organization (DRDO)New DelhiIndia

Personalised recommendations