Skip to main content
Log in

Anomaly detection in dynamic attributed networks

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Graph anomaly detection plays a central role in many emerging network applications, ranging from cloud intrusion detection to online payment fraud detection. It has been studied under the contexts of dynamic graphs and attributed graphs separately. In many practical applications, graphs with dynamic attributes provide crucial information for such detections, yet there exist few studies on discovering anomalies in dynamic attributed graphs. Therein, we present a novel framework for defining and detecting anomalies in dynamic attributed graphs, where communities and outliers are mined in succession. Specifically, we propose a community detection model that combines dynamic graph clustering with learning of latent network structures into a unified optimization problem. The latent network is inferred from cascade data, and our model can sufficiently incorporate time-dependent attribute information for identifying dynamic changes. We then rank all the graph nodes according to their deviance from both their closest community centers and historical behaviors. Experiments on synthetic and real-world datasets illustrate the effectiveness of our model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. https://www.ipd.kit.edu/~muellere/consub/.

References

  1. Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31

    Article  Google Scholar 

  2. Akoglu L, Faloutsos C (2010) Event detection in time series of mobile communication graphs. In: Proceedings of army science conference

  3. Akoglu L, McGlohon M, Faloutsos C (2010) Oddball: spotting anomalies in weighted graphs. In: Proceedings of the 14th Pacific-Asia conference on knowledge discovery and data mining, pp 410–421

  4. Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626–688

    Article  MathSciNet  Google Scholar 

  5. Bello GA, Harenberg S, Agrawal A, Samatova NF (2016) Community detection in dynamic attributed graphs. In: International conference on advanced data mining and applications, pp 329–344

  6. Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303–336

    Article  Google Scholar 

  7. Boyd S, Parikh N, Chu E, Peleato B, Eckstein J (2011) Distributed optimization and statistical learning via the alternating direction method of multipliers. Found Trends Mach Learn 3(1):1–122

    Article  Google Scholar 

  8. Desmier E, Plantevit M, Robardet C, Boulicaut J (2012) Cohesive co-evolution patterns in dynamic attributed graphs. In: International conference on discovery science, pp 110–124

  9. Desmier E, Plantevit M, Robardet C, Boulicaut JF (2013) Trend mining in dynamic attributed graphs. In: Joint European conference on machine learning and knowledge discovery in databases, pp 654–669

  10. Eswaran D, Faloutsos C, Guha S (2018) Spotlight: detecting anomalies in streaming graphs. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1378–1386

  11. Gao J, Liang F, Fan W, Wang C, Sun Y, Han J (2010a) On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM international conference on knowledge discovery and data mining, pp 813–822

  12. Huang J, Nie F, Huang H, Ding C (2014) Robust manifold nonnegative matrix factorization. ACM Trans Knowl Discov Data 8(3):11

    Article  Google Scholar 

  13. Jindal N, Liu B (2007) Review spam detection. In: Proceedings of the 16th international conference on world wide web, pp 1189–1190

  14. Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28(1):1051–1058

    Article  Google Scholar 

  15. Li J, Dani H, Hu X, Liu H (2017) Radar: residual analysis for anomaly detection in attributed networks. In: Proceedings of the 26th international joint conference on artificial intelligence, pp 2152–2158

  16. Li Z, Yang Y, Liu J, Zhou X, Lu H (2012) Unsupervised feature selection using nonnegative spectral analysis. In: Proceedings of the twenty-sixth AAAI conference on artificial intelligence, pp 1026–1032

  17. Liu S, Yamada M, Collier N, Sugiyama M (2013) Change-point detection in time-series data by relative density-ratio estimation. Neural Netw 43:72–83

    Article  Google Scholar 

  18. Müller E, Sánchez P, Mülle Y, Klemens B (2013) Ranking outlier nodes in subspaces of attributed graphs. In: IEEE 29th international conference on data engineering workshops, pp 216–222

  19. Miller BA, Arcolano N, Bliss NT (2013) Efficient anomaly detection in dynamic, attributed graphs: emerging phenomena and big data. In: 2013 IEEE international conference on intelligence and security informatics (ISI), pp 179–184

  20. Noble C, Cook D (2003) Graph-based anomaly detection. In: Proceedings of the 9th ACM international conference on knowledge discovery and data mining, pp 631–636

  21. Noble CC, Diane DJ (2003) Graph-based anomaly detection. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining, pp 631–636

  22. Papadimitriou P, Dasdan A, Garcia-Molina H (2010) Web graph similarity for anomaly detection. J Internet Serv Appl 1(1):19–30

    Article  Google Scholar 

  23. Peng Z, Luo M, Li J, Liu H, Zheng Q (2018) Anomalous: a joint modeling approach for anomaly detection on attributed networks. In: Proceedings of the 27th international joint conference on artificial intelligence, pp 3513–3519

  24. Perozzi B, Akoglu L (2018) Discovering communities and anomalies in attributed graphs: Interactive visual exploration and summarization. ACM Trans Knowl Discov Data 12(2):24

    Article  Google Scholar 

  25. Perozzi B, Akoglu L, Sánchez P, Müller E (2014) Focused clustering and outlier detection in large attributed graphs. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1346–1355

  26. Ranshous S, Shen S, Koutra D, Harenberg S et al (2015) Anomaly detection in dynamic networks: a survey. Wiley Interdiscip Rev Comput Stat 7(3):223–247

    Article  MathSciNet  Google Scholar 

  27. Rodriguez M, Balduzzi D, Schölkopf B (2011) Uncovering the temporal dynamics of diffusion networks. In: 28th International conference on machine learning, pp 561–568

  28. Rodriguez MG, J JL, Schölkopf B (2013) Structure and dynamics of information pathways in online media. In: Proceedings of the sixth ACM international conference on web search and data mining, pp 23–32

  29. Rossi R, Gallagher B, Neville J (2012) Role-dynamics: fast mining of large dynamic networks. In: Proceedings of the 21st international conference on world wide web, ACM, pp 997–1006

  30. Sangnier M, Gauthier J, Rakotomamonjy A (2016) Early and reliable event detection using proximity space representation. In: Proceedings of The 33rd international conference on machine learning, pp 2310–2319

  31. Shams R, Mercer RE (2016) Supervised classification of spam emails with natural language stylometry. Neural Comput Appl 27(8):2315–2331

    Article  Google Scholar 

  32. Shi J, Malik J (2000) Normalized cuts and image segmentation. IEEE Trans Pattern Anal Mach Intell 22(8):888–905

    Article  Google Scholar 

  33. Shoubridge P, Kraetzl M, Wallis W, Bunke H (2002) Detection of abnormal change in a time series of graphs. J Interconnect Netw 3(1–2):85–101

    Article  Google Scholar 

  34. Somasundaram A, Reddy S (2019) Parallel and incremental credit card fraud detection model to handle concept drift and data imbalance. Neural Comput Appl 31(1):3–14

    Article  Google Scholar 

  35. Srivastava A, Kundu A, Sural S, Majumdar A (2008) Credit card fraud detection using hidden markov mode. IEEE Trans Depend Secure Comput 5(1):37–48

    Article  Google Scholar 

  36. Sun H, Huang J, Han J, Deng H, Zhao P, Feng B (2010) gskeletonclu: density-based network clustering via structure-connected tree division or agglomeration. In: Proceedings of the 10th IEEE international conference on data mining, pp 481–490

  37. Sun J, Qu H, Chakrabarti D, Faloutsos C (2005) Neighborhood formation and anomaly detection in bipartite graphs. In: Proceedings of the 5th IEEE international conference on data mining, pp 418–425

  38. Chandola V, Banerjee VKA (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):1–58

    Article  Google Scholar 

  39. Xu X, Yuruk N, Feng Z, Schweiger T (2007) Scan: a structural clustering algorithm for networks. In: Proceedings of the 13th ACM international conference on knowledge discovery and data mining, pp 824–833

  40. Yang Y, Shen H, Ma Z, Huang Z, Zhou X (2011) \(l_{2,1}\)-norm regularized discriminative feature selection for unsupervised learning. Int Joint Conf Artif Intell 22:1589–1594

    Google Scholar 

Download references

Acknowledgements

This work was supported in part  by the National Natural Science Foundation of China (Grant No. 11671379, 11991021), and Beijing Academy of Artificial Intelligence (BAAI).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lingfeng Niu.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, R., Zhang, Q., Zhang, P. et al. Anomaly detection in dynamic attributed networks. Neural Comput & Applic 33, 2125–2136 (2021). https://doi.org/10.1007/s00521-020-05091-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-020-05091-3

Keywords

Navigation