Skip to main content

An Embedding Scheme for Detecting Anomalous Block Structured Graphs

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9078))

Abstract

Graph-based anomaly detection plays a vital role in various application domains such as network intrusion detection, social network analysis and road traffic monitoring. Although these evolving networks impose a curse of dimensionality on the learning models, they usually contain structural properties that anomaly detection schemes can exploit. The major challenge is finding a feature extraction technique that preserves graph structure while balancing the accuracy of the model against its scalability. We propose the use of a scalable technique known as random projection as a method for structure aware embedding, which extracts relational properties of the network, and present an analytical proof of this claim. We also analyze the effect of embedding on the accuracy of one-class support vector machines for anomaly detection on real and synthetic datasets. We demonstrate that the embedding can be effective in terms of scalability without detrimental influence on the accuracy of the learned model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chandola, V., Banerjee, A., Kumar, V.: Anomaly Detection: A Survey. ACM Computing Surveys 4(3), 1–58 (2009)

    Article  Google Scholar 

  2. Ding, Q., Katenka, N., Barford, P., Kolaczyk, E.D., Crovella, M.: Intrusion as (anti)social communication: characterization and detection. In: Proceedings of the 18th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 886–894 (2012)

    Google Scholar 

  3. Henderson, K., Eliassi-Rad, T., Faloutsos, C., Akoglu, L., Li, L., Maruhashi, K., Prakash, B.A., Tong, H.: Metricforensics: a multi-level approach for mining volatile graphs. In: Proceedings of the 16th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 163–172 (2010)

    Google Scholar 

  4. Aggarwal, C.C., Zhao, Y., Yu, and P.S.: Outlier detection in graph streams. In: Proceedings of the 27th International Conference on Data Engineering (ICDE), pp. 399–409 (2011)

    Google Scholar 

  5. Shaw, B., Jebara, T.: Minimum volume embedding. In: Proceedings of the 11th International Conference on Artificial Intelligence and Statistics, pp. 460–467 (2007)

    Google Scholar 

  6. Shaw, B., Jebara, T.: Structure preserving embedding. In: Proceedings of the 26th International Conference on Machine Learning, pp. 937–944 (2009)

    Google Scholar 

  7. Johnson, W.B., Lindenstrauss, J.: Extensions of Lipschitz mappings into a Hilbert space. In: Conference in Modern Analysis and Probability, pp. 189–206 (1984)

    Google Scholar 

  8. Schlkopf, B., Williamson, R.C., Smola, A., Shawe-Taylor, J.: Support vector method for novelty detection. In: NIPS, vol. 12, pp. 582–588 (1999)

    Google Scholar 

  9. Cook, D., Holder, L.: Mining Graph Data. Wiley (2007)

    Google Scholar 

  10. Kang, U., Faloutsos, C.: Big graph mining: algorithms and discoveries. ACM SIGKDD Explorations Newsletter 14(2), 29–36 (2012)

    Article  Google Scholar 

  11. Riesen, K., Bunke, H.: Classification and clustering of vector space embedded graphs. In: Emerging Topics in Computer Vision and Its Applications, pp. 49–70. World Scientific (2012)

    Google Scholar 

  12. Neuhaus, M., Bunke, H.: Bridging the Gap Between Graph Edit Distance and Kernel Machines. World Scientific (2007)

    Google Scholar 

  13. Moshtaghi, M., Leckie, C., Karunasekera, S., Bezdek, J.C., Rajasegarar, S., Palaniswami, M.: Incremental elliptical boundary estimation for anomaly detection in wireless sensor networks. In: Proceedings of the 11th IEEE International Conference on Data Mining, pp. 467–476 (2011)

    Google Scholar 

  14. Rajasegarar, S., Leckie, C., Bezdek, J.C., Palaniswami, M.: Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks. IEEE Transactions on Information Forensics and Security 5(3), 518–533 (2010)

    Article  Google Scholar 

  15. Akoglu, L., Tong, H., Koutra, D.: Graph-based Anomaly Detection and Description: A Survey. Data Mining and Knowledge Discovery, pp. 1–63 (2014)

    Google Scholar 

  16. Chung, F.R.K.: Spectral Graph Theory. American Mathematical Society (1997)

    Google Scholar 

  17. Belkin, M., Niyogi, P.: Laplacian Eigenmaps for Dimensionality Reduction and Data Representation. Neural Computation, pp. 1373–1396 (2002)

    Google Scholar 

  18. Newman, M.: Modularity and community structure in networks. In: Proceedings of the National Academy of Sciences, vol. 23, pp. 8577–8582 (2006)

    Google Scholar 

  19. Chan, J., Liu, W., Kan, A., Leckie, C., Bailey, J., Ramamohanarao, K.: Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation. In: Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, pp. 811–816 (2013)

    Google Scholar 

  20. Achlioptas, D.: Database-friendly Random Projections: Johnson-Lindenstrauss with Binary Coins. Journal of Computer and System Sciences 66(4), 671–687 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  21. http://www-personal.umich.edu/~mejn/netdata/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lida Rashidi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Rashidi, L., Rajasegarar, S., Leckie, C. (2015). An Embedding Scheme for Detecting Anomalous Block Structured Graphs. In: Cao, T., Lim, EP., Zhou, ZH., Ho, TB., Cheung, D., Motoda, H. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2015. Lecture Notes in Computer Science(), vol 9078. Springer, Cham. https://doi.org/10.1007/978-3-319-18032-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18032-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18031-1

  • Online ISBN: 978-3-319-18032-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics