scispace - formally typeset
Open AccessJournal ArticleDOI

Graph based anomaly detection and description: a survey

TLDR
This survey aims to provide a general, comprehensive, and structured overview of the state-of-the-art methods for anomaly detection in data represented as graphs, and gives a general framework for the algorithms categorized under various settings.
Abstract
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as security, finance, health care, and law enforcement. While numerous techniques have been developed in past years for spotting outliers and anomalies in unstructured collections of multi-dimensional points, with graph data becoming ubiquitous, techniques for structured graph data have been of focus recently. As objects in graphs have long-range correlations, a suite of novel technology has been developed for anomaly detection in graph data. This survey aims to provide a general, comprehensive, and structured overview of the state-of-the-art methods for anomaly detection in data represented as graphs. As a key contribution, we give a general framework for the algorithms categorized under various settings: unsupervised versus (semi-)supervised approaches, for static versus dynamic graphs, for attributed versus plain graphs. We highlight the effectiveness, scalability, generality, and robustness aspects of the methods. What is more, we stress the importance of anomaly attribution and highlight the major techniques that facilitate digging out the root cause, or the `why', of the detected anomalies for further analysis and sense-making. Finally, we present several real-world applications of graph-based anomaly detection in diverse domains, including financial, auction, computer traffic, and social networks. We conclude our survey with a discussion on open theoretical and practical challenges in the field.

read more

Citations
More filters
Journal ArticleDOI

New approach for APT malware detection on the workstation based on process profile

TL;DR: In this article , the authors proposed a new approach to APT malware detection on workstations based on the technique of analyzing and evaluating process profiles, where processes are collected and aggregated into process profiles of APTs and Graph2Vec graph analysis algorithm is used to extract the characteristics of the process profile.
Proceedings Article

Subnetwork Mining with Spatial and Temporal Smoothness.

TL;DR: A novel algorithm for mining a succinct set of subnetworks that are predictive and evolve along with the progression of global network states, designed in the framework of logistic regression that fits a model for multi-states of network samples.
Journal ArticleDOI

Automatic Recognition of Anomalous Patterns in Discharges by Applying Deep Learning

TL;DR: A study of the application of deep learning and architecture called Autoencoder to detect anomalies predicting (encode-decode) in a discharge of nuclear fusion.
Proceedings ArticleDOI

Fraudulent user detection on rating networks based on expanded balance theory and GCNs

TL;DR: This paper proposes an end-to-end framework based on Graph Convolutional Networks (GCNs) and expanded balance theory, which properly incorporates both the signs and directions of edges and provides new insight into the behavior of users in rating networks.
Posted Content

Delving Into Deep Walkers: A Convergence Analysis of Random-Walk-Based Vertex Embeddings.

TL;DR: It is proved that, under some weak assumptions, vertex embeddings derived from random walks do indeed converge both in the single limit of the number of random walks and in the double limit of both $N and the length of each random walk.
References
More filters
Journal ArticleDOI

Collective dynamics of small-world networks

TL;DR: Simple models of networks that can be tuned through this middle ground: regular networks ‘rewired’ to introduce increasing amounts of disorder are explored, finding that these systems can be highly clustered, like regular lattices, yet have small characteristic path lengths, like random graphs.
Book

Matrix computations

Gene H. Golub
Journal ArticleDOI

Emergence of Scaling in Random Networks

TL;DR: A model based on these two ingredients reproduces the observed stationary scale-free distributions, which indicates that the development of large networks is governed by robust self-organizing phenomena that go beyond the particulars of the individual systems.
Book

Time series analysis, forecasting and control

TL;DR: In this article, a complete revision of a classic, seminal, and authoritative book that has been the model for most books on the topic written since 1970 is presented, focusing on practical techniques throughout, rather than a rigorous mathematical treatment of the subject.