A Structural Evolution-Based Anomaly Detection Method for Generalized Evolving Social Networks

2020 ◽  
Author(s):  
Huan Wang ◽  
Qing Gao ◽  
Hao Li ◽  
Hao Wang ◽  
Liping Yan ◽  
...  

Abstract Recently, text-based anomaly detection methods have obtained impressive results in social network services, but their applications are limited to social texts provided by users. To propose a method for generalized evolving social networks that have limited structural information, this study proposes a novel structural evolution-based anomaly detection method ($SeaDM$), which mainly consists of an evolutional state construction algorithm ($ESCA$) and an optimized evolutional observation algorithm ($OEOA$). $ESCA$ characterizes the structural evolution of the evolving social network and constructs the evolutional state to represent the macroscopic evolution of the evolving social network. Subsequently, $OEOA$ reconstructs the quantum-inspired genetic algorithm to discover the optimized observation vector of the evolutional state, which maximally reflects the state change of the evolving social network. Finally, $SeaDM$ combines $ESCA$ and $OEOA$ to evaluate the state change degrees and detect anomalous changes to report anomalies. Experimental results on real-world evolving social networks with artificial and real anomalies show that our proposed $SeaDM$ outperforms the state-of-the-art anomaly detection methods.

Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5895
Author(s):  
Jiansu Pu ◽  
Jingwen Zhang ◽  
Hui Shao ◽  
Tingting Zhang ◽  
Yunbo Rao

The development of the Internet has made social communication increasingly important for maintaining relationships between people. However, advertising and fraud are also growing incredibly fast and seriously affect our daily life, e.g., leading to money and time losses, trash information, and privacy problems. Therefore, it is very important to detect anomalies in social networks. However, existing anomaly detection methods cannot guarantee the correct rate. Besides, due to the lack of labeled data, we also cannot use the detection results directly. In other words, we still need human analysts in the loop to provide enough judgment for decision making. To help experts analyze and explore the results of anomaly detection in social networks more objectively and effectively, we propose a novel visualization system, egoDetect, which can detect the anomalies in social communication networks efficiently. Based on the unsupervised anomaly detection method, the system can detect the anomaly without training and get the overview quickly. Then we explore an ego’s topology and the relationship between egos and alters by designing a novel glyph based on the egocentric network. Besides, it also provides rich interactions for experts to quickly navigate to the interested users for further exploration. We use an actual call dataset provided by an operator to evaluate our system. The result proves that our proposed system is effective in the anomaly detection of social networks.


2020 ◽  
Vol 144 ◽  
pp. 26-35
Author(s):  
Rem V. Ryzhov ◽  
◽  
Vladimir A. Ryzhov ◽  

Society is historically associated with the state, which plays the role of an institution of power and government. The main task of the state is life support, survival, development of society and the sovereignty of the country. The main mechanism that the state uses to implement these functions is natural social networks. They permeate every cell of society, all elements of the country and its territory. However, they can have a control center, or act on the principle of self-organization (network centrism). The web is a universal natural technology with a category status in science. The work describes five basic factors of any social network, in particular the state, as well as what distinguishes the social network from other organizational models of society. Social networks of the state rely on communication, transport and other networks of the country, being a mechanism for the implementation of a single strategy and plan. However, the emergence of other strong network centers of competition for state power inevitably leads to problems — social conflicts and even catastrophes in society due to the destruction of existing social institutions. The paper identifies the main pitfalls using alternative social networks that destroy the foundations of the state and other social institutions, which leads to the loss of sovereignty, and even to the complete collapse of the country.


2016 ◽  
Vol 8 (3) ◽  
pp. 327-333 ◽  
Author(s):  
Rimas Ciplinskas ◽  
Nerijus Paulauskas

New and existing methods of cyber-attack detection are constantly being developed and improved because there is a great number of attacks and the demand to protect from them. In prac-tice, current methods of attack detection operates like antivirus programs, i. e. known attacks signatures are created and attacks are detected by using them. These methods have a drawback – they cannot detect new attacks. As a solution, anomaly detection methods are used. They allow to detect deviations from normal network behaviour that may show a new type of attack. This article introduces a new method that allows to detect network flow anomalies by using local outlier factor algorithm. Accom-plished research allowed to identify groups of features which showed the best results of anomaly flow detection according the highest values of precision, recall and F-measure. Kibernetinių atakų gausa ir įvairovė bei siekis nuo jų apsisaugoti verčia nuolat kurti naujus ir tobulinti jau esamus atakų aptikimo metodus. Kaip rodo praktika, dabartiniai atakų atpažinimo metodai iš esmės veikia pagal antivirusinių programų principą, t.y. sudaromi žinomų atakų šablonai, kuriais remiantis yra aptinkamos atakos, tačiau pagrindinis tokių metodų trūkumas – negalėjimas aptikti naujų, dar nežinomų atakų. Šiai problemai spręsti yra pasitelkiami anomalijų aptikimo metodai, kurie leidžia aptikti nukrypimus nuo normalios tinklo būsenos. Straipsnyje yra pateiktas naujas metodas, leidžiantis aptikti kompiuterių tinklo paketų srauto anomalijas taikant lokalių išskirčių faktorių algoritmą. Atliktas tyrimas leido surasti požymių grupes, kurias taikant anomalūs tinklo srautai yra atpažįstami geriausiai, t. y. pasiekiamos didžiausios tikslumo, atkuriamumo ir F-mato reikšmės.


Author(s):  
Ioannis Caragiannis ◽  
Evanthia Tsitsoka

We study the following fundamental graph problem that models the important task of deanonymizing social networks. We are given a graph representing an eponymous social network and another graph, representing an anonymous social network, which has been produced by the original one after removing some of its nodes and adding some noise on the links. Our objective is to correctly associate as many nodes of the anonymous network as possible to their corresponding node in the eponymous network. We present two algorithms that attack the problem by exploiting only the structure of the two graphs. The first one exploits bipartite matching computations and is relatively fast. The second one is a local search heuristic which can use the outcome of our first algorithm as an initial solution and further improve it. We have applied our algorithms on inputs that have been produced by well-known random models for the generation of social networks as well as on inputs that use real social networks. Our algorithms can tolerate noise at the level of up to 10%. Interestingly, our results provide further evidence to which graph generation models are most suitable for modeling social networks and distinguish them from unrealistic ones.


Author(s):  
William Takahiro Maruyama ◽  
Luciano Antonio Digiampietri

The prediction of relationships in a social network is a complex and extremely useful task to enhance or maximize collaborations by indicating the most promising partnerships. In academic social networks, prediction of relationships is typically used to try to identify potential partners in the development of a project and/or co-authors for publishing papers. This paper presents an approach to predict coauthorships combining artificial intelligence techniques with the state-of-the-art metrics for link predicting in social networks.


2021 ◽  
Vol 9 ◽  
Author(s):  
Jianliang Yang ◽  
Yuchen Pan

The outbreak of COVID-19 has caused a huge shock for human society. As people experience the attack of the COVID-19 virus, they also are experiencing an information epidemic at the same time. Rumors about COVID-19 have caused severe panic and anxiety. Misinformation has even undermined epidemic prevention to some extent and exacerbated the epidemic. Social networks have allowed COVID-19 rumors to spread unchecked. Removing rumors could protect people’s health by reducing people’s anxiety and wrong behavior caused by the misinformation. Therefore, it is necessary to research COVID-19 rumor detection on social networks. Due to the development of deep learning, existing studies have proposed rumor detection methods from different perspectives. However, not all of these approaches could address COVID-19 rumor detection. COVID-19 rumors are more severe and profoundly influenced, and there are stricter time constraints on COVID-19 rumor detection. Therefore, this study proposed and verified the rumor detection method based on the content and user responses in limited time CR-LSTM-BE. The experimental results show that the performance of our approach is significantly improved compared with the existing baseline methods. User response information can effectively enhance COVID-19 rumor detection.


2018 ◽  
Vol 2018 ◽  
pp. 1-18 ◽  
Author(s):  
Gesu Li ◽  
Zhipeng Cai ◽  
Guisheng Yin ◽  
Zaobo He ◽  
Madhuri Siddula

The recommender system is mainly used in the e-commerce platform. With the development of the Internet, social networks and e-commerce networks have broken each other’s boundaries. Users also post information about their favorite movies or books on social networks. With the enhancement of people’s privacy awareness, the personal information of many users released publicly is limited. In the absence of items rating and knowing some user information, we propose a novel recommendation method. This method provides a list of recommendations for target attributes based on community detection and known user attributes and links. Considering the recommendation list and published user information that may be exploited by the attacker to infer other sensitive information of users and threaten users’ privacy, we propose the CDAI (Infer Attributes based on Community Detection) method, which finds a balance between utility and privacy and provides users with safer recommendations.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Md. Shafiur Rahman ◽  
Sajal Halder ◽  
Md. Ashraf Uddin ◽  
Uzzal Kumar Acharjee

AbstractAnomaly detection has been an essential and dynamic research area in the data mining. A wide range of applications including different social medias have adopted different state-of-the-art methods to identify anomaly for ensuring user’s security and privacy. The social network refers to a forum used by different groups of people to express their thoughts, communicate with each other, and share the content needed. This social networks also facilitate abnormal activities, spread fake news, rumours, misinformation, unsolicited messages, and propaganda post malicious links. Therefore, detection of abnormalities is one of the important data analysis activities for the identification of normal or abnormal users on the social networks. In this paper, we have developed a hybrid anomaly detection method named DT-SVMNB that cascades several machine learning algorithms including decision tree (C5.0), Support Vector Machine (SVM) and Naïve Bayesian classifier (NBC) for classifying normal and abnormal users in social networks. We have extracted a list of unique features derived from users’ profile and contents. Using two kinds of dataset with the selected features, the proposed machine learning model called DT-SVMNB is trained. Our model classifies users as depressed one or suicidal one in the social network. We have conducted an experiment of our model using synthetic and real datasets from social network. The performance analysis demonstrates around 98% accuracy which proves the effectiveness and efficiency of our proposed system.


Author(s):  
Rasim M. Alguliyev ◽  
Ramiz M. Aliguliyev ◽  
Gunay Y. Niftaliyeva (Iskandarli)

Nowadays, improvement of governance, ensuring security and timely detection of propaganda against the government are major problems of e-government. The extraction of hidden social networks operating against the state in e-government is one of the key factors to ensure the security in e-government. In this article, a method has been proposed for extracting hidden social networks to improve e-government management, prevent promotion against the government and ensure the security. In this approach, hidden social networks are extracted through the analysis of user's comments via opinion and text mining technologies. The authors assume that all comments are written in one language. Unlike previous methods, to detect social relationships between actors, content analysis technology, namely opinion mining technology was used in the proposed approach.


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1007
Author(s):  
Yupeng Cao ◽  
Jiangwei Cao ◽  
Zhiguo Zhou ◽  
Zhiwen Liu

In order to ensure flight safety and eliminate hidden dangers, it is very important to detect aircraft track anomalies, which include track deviations and track outliers. Many existing track anomaly detection methods cannot make full use of multidimensional information of the relevant track. Based on this problem, an aircraft track anomaly detection method based on the combination of the Multidimensional Outlier Descriptor (MOD) and the Bi-directional Long-Short Time Memory network (Bi-LSTM) is proposed in this paper. Firstly, track deviation detection is transformed into the track density classification problem, and then a multidimensional outlier descriptor is designed to detect track deviation. Secondly, track outliers detection is transformed into a prediction problem, and then a Bi-LSTM model is designed to detect track outliers. Experimental results based on real aircraft track data indicate that the accuracy of the proposed method is 96% and the recall rate is 97.36%. It can detect both track deviation and track outliers effectively.


Sign in / Sign up

Export Citation Format

Share Document