skip to main content
10.1145/3340531.3412070acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
short-paper

Generative Adversarial Attributed Network Anomaly Detection

Published: 19 October 2020 Publication History

Abstract

Anomaly detection is a useful technique in many applications such as network security and fraud detection. Due to the insufficiency of anomaly samples as training data, it is usually formulated as an unsupervised model learning problem. In recent years there is a surge of adopting graph data structure in numerous applications. Detecting anomaly in an attributed network is more challenging than the sample based task because of the sample information representations in the form of graph nodes and edges. In this paper, we propose a generative adversarial attributed network (GAAN) anomaly detection framework. The fake graph nodes are generated by a generator module with Gaussian noise as input. An encoder module is employed to map both real and fake graph nodes into a latent space. To encode the graph structure information into the node latent representation, we compute the sample covariance matrix for real nodes and fake nodes respectively. A discriminator is trained to recognize whether two connected nodes are from the real or fake graph. With the learned encoder module output, an anomaly evaluation measurement considering the sample reconstruction error and real-sample identification confidence is employed to make prediction. We conduct extensive experiments on benchmark datasets and compare with state-of-the-art attributed graph anomaly detection methods. The superior AUC score demonstrates the effectiveness of the proposed method.

Supplementary Material

MP4 File (3340531.3412070.mp4)
In this paper, we propose a generative adversarial attributed network (GAAN) anomaly detection framework

References

[1]
Samet Akcay, Amir Atapour-Abarghouei, and Toby P Breckon. Ganomaly: Semi-supervised anomaly detection via adversarial training.In Asian Conference on Computer Vision, 2018.
[2]
Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, and Jöorg Sander. Lof: Identifying density-based local outliers. 29(2), 2000.
[3]
Varun Chandola, Arindam Banerjee, and Vipin Kumar. Anomaly detection: A survey. ACM Comput. Surv., 41(1), July 2009.
[4]
Pin-Yu Chen, Sutanay Choudhury, and Alfred O Hero. Multi-centrality graph spectral decompositions and their application to cyber intrusion detection. In IEEE International Conference on Acoustics, Speech and Signal Processing, 2016.
[5]
Kaize Ding, Jundong Li, Bhanushali Rohit, and Huan Liu. Deepanomaly detection on attributed networks. In SIAM International Conference on Data Mining, 2019.
[6]
Haoyi Fan, Fengbin Zhang, and Zuoyong Li. Anomalydae: Dual autoencoder for anomaly detection on attributed networks. In International Conference on Acoustics, Speech, and Signal Processing, 2020.
[7]
Elies Gherbi, Blaise Hanczar, Jean-Christophe Janodet, and Witold Klaudel. An encoding adversarial network for anomaly detection. In Asian Conference on Machine Learning, 2019.1
[8]
Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In International Conference on Neural Information Processing Systems, 2014.
[9]
Xia Hu, Jiliang Tang, and Huan Liu. Online social spammer detection. In AAAI Conference on Artificial Intelligence, 2014.
[10]
Dongxu Huang, Dejun Mu, Libin Yang, and Xiaoyan Cai. Codetect: financial fraud detection with anomaly feature detection. 2018.
[11]
Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. International Conference on Learning Representations, 2014.
[12]
Danai Koutra and Christos Faloutsos. Individual and collective graph mining: principles, algorithms, and applications. Synthesis Lectures on Data Mining and Knowledge Discovery, 9(2):1--206, 2017.
[13]
Mu-Chu Lee, Bin Gao, and Ruofei Zhang. Rare query expansion through generative adversarial networks in search advertising. InACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018.
[14]
Zhen Peng, Minnan Luo, Jundong Li, Huan Liu, and Qinghua Zheng. Anomalous: A joint modeling approach for anomaly detection on attributed networks. In International Joint Conference on Artificial Intelligence, 2018.
[15]
Ryan A. Rossi and Nesreen K. Ahmed. The network data repository with interactive graph analytics and visualization. In AAAI Conference on Artificial Intelligence, 2015.2
[16]
Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua. Adversarial training towards robust multimedia recommender system. IEEE Transactions on Knowledge and Data Engineering, 2019.
[17]
Hongwei Wang, Jia Wang, Jialin Wang, Miao Zhao, Weinan Zhang, Fuzheng Zhang, Xing Xie, and Minyi Guo. Graphgan: Graph representation learning with generative adversarial nets. IEEE Transactions on Knowledge and Data Engineering, 2017.
[18]
Xiaowei Xu, Nurcan Yuruk, Zhidan Feng, and Thomas Schweiger. Scan: A structural clustering algorithm for networks. Number 3, pages 824--833, 01 2007.
[19]
Houssam Zenati, Chuan Sheng Foo, Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. Efficient GAN-based anomaly detection, 2018.

Cited By

View all
  • (2025)Adversarial Deep Learning for Network Anomaly DetectionProceedings of the Third International Conference on Cognitive and Intelligent Computing, Volume 210.1007/978-981-97-9266-5_51(523-533)Online publication date: 26-Feb-2025
  • (2025)Enhancing Detection Accuracy and Security in Deep LearningProceedings of the Third International Conference on Cognitive and Intelligent Computing, Volume 210.1007/978-981-97-9266-5_48(485-497)Online publication date: 26-Feb-2025
  • (2024)Recognition of Yuan blue and white porcelain produced in Jingdezhen based on graph anomaly detection combining portable X-ray fluorescence spectrometryHeritage Science10.1186/s40494-024-01193-612:1Online publication date: 6-Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge Management
October 2020
3619 pages
ISBN:9781450368599
DOI:10.1145/3340531
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 October 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. attributed networks
  3. gan

Qualifiers

  • Short-paper

Conference

CIKM '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)170
  • Downloads (Last 6 weeks)13
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Adversarial Deep Learning for Network Anomaly DetectionProceedings of the Third International Conference on Cognitive and Intelligent Computing, Volume 210.1007/978-981-97-9266-5_51(523-533)Online publication date: 26-Feb-2025
  • (2025)Enhancing Detection Accuracy and Security in Deep LearningProceedings of the Third International Conference on Cognitive and Intelligent Computing, Volume 210.1007/978-981-97-9266-5_48(485-497)Online publication date: 26-Feb-2025
  • (2024)Recognition of Yuan blue and white porcelain produced in Jingdezhen based on graph anomaly detection combining portable X-ray fluorescence spectrometryHeritage Science10.1186/s40494-024-01193-612:1Online publication date: 6-Mar-2024
  • (2024)An Energy-centric Framework for Category-free Out-of-distribution Node Detection in GraphsProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671939(908-919)Online publication date: 25-Aug-2024
  • (2024)GAD-NR: Graph Anomaly Detection via Neighborhood ReconstructionProceedings of the 17th ACM International Conference on Web Search and Data Mining10.1145/3616855.3635767(576-585)Online publication date: 4-Mar-2024
  • (2024)A New Scheme for Abnormal Data Transmission Behavior Detection with Network-Wide Perspective2024 10th International Symposium on System Security, Safety, and Reliability (ISSSR)10.1109/ISSSR61934.2024.00021(122-133)Online publication date: 16-Mar-2024
  • (2024)Simultaneously Detecting Node and Edge Level Anomalies on Heterogeneous Attributed Graphs2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10650265(1-10)Online publication date: 30-Jun-2024
  • (2024)Semi-supervised Graph Anomaly Detection via Multi-view Contrastive Learning2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10650001(1-8)Online publication date: 30-Jun-2024
  • (2024)Anomaly Detection on Attributed Network Based on Hyperbolic Radial Distance2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10649904(1-8)Online publication date: 30-Jun-2024
  • (2024)Graph Anomaly Detection with Domain-Agnostic Pre-Training and Few-Shot Adaptation2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00209(2667-2680)Online publication date: 13-May-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media