Skip to main content

Detecting Hybrid Anomalies Using an Unsupervised Approach in Online Social Networks

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1563))

Included in the following conference series:

  • 994 Accesses

Abstract

Over the last decade, there has been significant interest in detecting hybrid anomalies in Online Social Networks (OSN). However, there remain several questions regarding the evaluation of these systems and the nature of anomaly. In order to answer these questions, further research must be conducted on anomaly definitions and development for social networks. This is achieved through datasets that represent a balanced testing environment and contains anomalies with selected characteristics. In this paper, we propose an artificial injection agent as a security solution for evaluating detecting users’ abnormal behavior in OSN. The proposed agent creates synthetic anomaly and injects it into the data to utilize the detection accuracy in a Bayesian Network Classifier. We evaluated the effectiveness of the proposed technique concerning the detection of the injected anomalies. Using our approach, we were able to detect the injected anomalies with a success rate of 94% and no false alarm rates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Brauckhoff, D., Wagner, A., May, M.: FLAME: A Flow-Level Anomaly Modeling Engine. In: CSET (2008)

    Google Scholar 

  2. Hawkins, D.M.: Identification of Outliers, vol. 11. Chapman and Hall, London (1980)

    Book  Google Scholar 

  3. Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C., Samatova, N.F.: Anomaly detection in dynamic networks: a survey. Wiley Interdiscip. Rev. Comput. Stat. 7(3), 223–247 (2015)

    Article  MathSciNet  Google Scholar 

  4. Zhang, J., Paschalidis, I.C.: Statistical anomaly detection via composite hypothesis testing for Markov models. IEEE Trans. Sig. Process. 66(3), 589–602 (2018)

    Article  MathSciNet  Google Scholar 

  5. Wazid, M., Das, A.K.: An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks. Wirel. Pers. Commun. 90(4), 1971–2000 (2016). https://doi.org/10.1007/s11277-016-3433-3

    Article  Google Scholar 

  6. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)

    Article  Google Scholar 

  7. Wallschläger, M., Gulenko, A., Schmidt, F., Kao, O., Liu, F.: Automated anomaly detection in virtualized services using deep packet inspection. Procedia Comput. Sci. 110, 510–515 (2017)

    Article  Google Scholar 

  8. Kumar, S.: Classification and detection of computer intrusions. ProQuest Dissertations Publishing (1995)

    Google Scholar 

  9. Kumar, A., Saradhi, V.V., Venkatesh, T.: Network-wide volume anomaly detection using alternate matrix decomposition techniques. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE (2017)

    Google Scholar 

  10. Eberle, W., Holder, L.: Anomaly detection in data represented as graphs. Intell. Data Anal. 11(6), 663–689 (2007)

    Article  Google Scholar 

  11. Priebe, C.E., et al.: Statistical inference on attributed random graphs: fusion of graph features and content: an experiment on time series of Enron graphs. Comput. Stat. Data Anal. 54(7), 1766–1776 (2010)

    Article  MathSciNet  Google Scholar 

  12. Zhang, Y., Debroy, S., Calyam, P.: Network-wide anomaly event detection and diagnosis with perfSONAR. IEEE Trans. Netw. Serv. Manage. 13(3), 666–680 (2016)

    Article  Google Scholar 

  13. Lu, Y., et al.: An unsupervised approach to anomaly detection in music datasets. In: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval. ACM (2016)

    Google Scholar 

  14. Hochenbaum, J., Vallis, O.S., Kejariwal, A.: Automatic anomaly detection in the cloud via statistical learning. arXiv preprint arXiv:1704.07706 (2017)

  15. Grinstein, G., Plaisant, C., Laskowski, S., O’Connell, T., Scholtz, J., Whiting, M.: VAST 2008 challenge: introducing mini-challenges. In: IEEE Symposium on Visual Analytics Science and Technology, VAST’08, 19 October 2008, pp. 195–196. IEEE (2019)

    Google Scholar 

  16. Heard, N.A., Weston, D.J., Platanioti, K., Hand, D.J.: Bayesian anomaly detection methods for social networks. Ann. Appl. Stat. 4(2), 645–662 (2010)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Randa Aljably .

Editor information

Editors and Affiliations

Ethics declarations

Declarations of interest

The authors declare no conflict of interest.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aljably, R., Al-Rodhaan, M., Tian, Y. (2022). Detecting Hybrid Anomalies Using an Unsupervised Approach in Online Social Networks. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_50

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0852-1_50

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0851-4

  • Online ISBN: 978-981-19-0852-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics