Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements

Document Type : Original Article

Authors

1 Computer Engineering Department, Bu-Ali SIna University

2 Computer Engineering Department, Engineering Faculty,, Bu-Ali SIna University

Abstract

Since the detection of anomalies in dynamic social networks takes place in a sequence of graphs over time, in addition to the storage management challenge, the detection process is difficult due to the slow evolution of graphs. A number of graphs are selected in the specified time frame, and by examining the changes of these graphs, the possible anomalies are detected. Therefore, choosing the number of time points (graphs) in the sequence of graphs is an important challenge in the detection of anomalies. In this paper, a novel method is proposed to detect anomalies based on structural data extracted from dynamic social network graphs. By extracting the centrality indicators from the network graph and their normalized mean, the    activity criterion for each individual has been defined. Over time, changes in the activity criterion for each individual are measured and marked as the possibility of normal or abnormal behavior. If the individual's behavior measure exceeds a certain threshold, it is reported as an anomaly. The results show that the     proposed method detects more anomalies with the accuracy and recall of 64.29 and 81.82 respectively, for the VAST 2008 data set. It also, detects more anomalies by selecting different number of time points in the graph sequence.
 

Keywords


[1]     Y. Liu and S. Chawla, “Social Media Anomaly Detection: Challenges and Solutions,” in Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 2317-2318, 2015.##
[2]     R. Yu, X. He, and Y. Liu, “Glad: Group Anomaly Detection In Social Media Analysis,” ACM Transactions on Knowledge Discovery from Data  ACM T Knowl Discov D, vol. 10, no. 2, pp. 1-22, 2015.##
[3]     G. Shahmohammadi and S. Kamalizadeh, “Providing a Method for Identifying Phishing Website of Internet Payment Service, ” Electronic and Cyber Defense, vol. 4, no. 3, pp. 11-26, 2016. [Online]. Available: https://ecdj.ihu.ac.ir/article_200116_a099f2e1cdcda998bb5178d572a36436.pdf.##
[4]     V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,” ACM computing surveys ACM Comput. Surv., vol. 41, no. 3, pp. 1-58, 2009.##
[5]     M. E. Newman, D. J. Watts, and S. H. Strogatz,  “Random Graph Models of Social Networks,” Proceedings of the national academy of sciences, vol. 99, no. 1, pp.             2566-2572, 2002.##
[6]     L. Akoglu, H. Tong, and D. Koutra, “Graph Based Anomaly Detection and Description: A Survey,” Data mining and knowledge discovery Data Min Knowl Disc, vol. 29, no. 3, pp. 626-688, 2015.##
[7]     M. Zamini and S. M. H. Hasheminejad,  “A Comprehensive Survey of Anomaly Detection in Banking, Wireless Sensor Networks, Social Networks, and Healthcare, ” Intelligent Decision Technologies              FRONT ARTIF INTEL AP, vol. 13, no. 2, pp. 229-270, 2019.##
[8]     S. Ranshous, S. Shen, D. Koutra, S. Harenberg, C. Faloutsos, and N. F. Samatova,  “Anomaly Detection in Dynamic Networks: A Survey, ” Wiley Interdisciplinary Reviews: Computational Statistics, vol. 7, no. 3, pp. 223-247, 2015.##
[9]     R. Hassanzadeh, R. Nayak, and D. Stebila, “Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks,” in International Conference on Web Information Systems Engineering, Springer, pp.       624-630, 2012.##
[10]   K. Das, S. Samanta, and M. Pal, “Study on Centrality Measures in Social Networks: A Survey,” Social Network Analysis and Mining, vol. 8, no. 1, p. 13, 2018.##
[11]   F. Riquelme, P. Gonzalez-Cantergiani, X. Molinero, and M. Serna, “Centrality Measure in Social Networks Based on Linear Threshold Model,” Knowledge-Based Systems Knowl-Based Syst., vol. 140, pp. 92-102, 2018.##
[12]   M. Z. Al-Taie and S. Kadry, Python for Graph and Network Analysis, Springer, 2017.##
[13]   A. Hagberg, D. Schult, and P. Swart,  “NetworkX Reference, Release 2.3,” NetworkX Developers, Last updated on Apr. 11, 2019.##
[14]   M. Mirzaee and A. Mahabadi, “Anomaly Detection Method in Attributed Graph, Based on Community Detection and Feature Selection,” Electronic and Cyber Defense, 2019.##
[15]   N. A. Heard, D. J. Weston, K. Platanioti, and D. J. Hand,  “Bayesian Anomaly Detection Methods for Social Networks,” The Annals of Applied Statistics, vol. 4, no. 2, pp. 645-662, 2010.##
[16]   M. G. Vigliotti and C. Hankin,  “Discovery of anomalous behaviour in temporal networks,” Social Networks, vol. 41, pp. 18-25, 2015.##
[17]   V. K. Giri and S. Sachdeva, “Anomaly Detection in Social Networks,” in 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), IEEE, pp. 698-703, 2019.##
[18]   R. Kaur and S. Singh, ”A Comparative Analysis of Structural Graph Metrics to Identify Anomalies in Online Social Networks,” Computers & Electrical Engineering Comput. Electr. Eng., vol. 57, pp. 294-310, 2017.##
 
Volume 9, Issue 1 - Serial Number 33
Serial No. 33, Spring Quarterly
April 2021
Pages 115-123
  • Receive Date: 28 April 2020
  • Revise Date: 12 November 2020
  • Accept Date: 14 November 2020
  • Publish Date: 21 April 2021