Proceedings of the 2016 SIAM International Conference on Data Mining 2016
DOI: 10.1137/1.9781611974348.22
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable Approach for Outlier Detection in Edge Streams Using Sketch-based Approximations

Abstract: Dynamic graphs are a powerful way to model an evolving set of objects and their ongoing interactions. A broad spectrum of systems, such as information, communication, and social, are naturally represented by dynamic graphs. Outlier (or anomaly) detection in dynamic graphs can provide unique insights into the relationships of objects and identify novel or emerging relationships. To date, outlier detection in dynamic graphs has been studied in the context of graph streams, focusing on the analysis and comparison… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(35 citation statements)
references
References 21 publications
0
35
0
Order By: Relevance
“…It builds a generative model for edges in a node cluster, and the model can also be used to produce anomalous score for a given edge. • CM-Sketch [Ranshous et al, 2016]. It uses the local structural feature and historical behavior near an edge to measure whether the edge is anomalous or not.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…It builds a generative model for edges in a node cluster, and the model can also be used to produce anomalous score for a given edge. • CM-Sketch [Ranshous et al, 2016]. It uses the local structural feature and historical behavior near an edge to measure whether the edge is anomalous or not.…”
Section: Methodsmentioning
confidence: 99%
“…Besides the structural features, the temporal ones are considered in the anomaly detection. CM-Sketch [Ranshous et al, 2016] is a sketch-based method, which uses the local structural information and historical behavior near an edge to decide whether the edge is anomalous or not. Spot-Light [Eswaran et al, 2018] randomly samples a series of node sets from the entire node set, and encodes the the graph at each timestamp to a vector by computing the overlap between these sets and the nodes of current edge set.…”
Section: Anomaly Detection In Dynamic Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…(iv) Anomalous edge detection approaches [2,17,22]: The first two methods score the likelihood of an edge based on the community structure [2], prior occurrence preferential attachment and homophily information [22]. By scoring edges independent of each other, these methods miss complex structural (e.g., dense subgraph) anomalies.…”
Section: Related Workmentioning
confidence: 99%
“…Examples include transportation logs (w cabs travel from location s to location d), network communication logs (w packets sent by IP address s to We consider the problem of near real-time anomaly detection in such settings. Due to the fluid nature of what is considered 'normal', prior works typically focus on detecting specific anomalous changes to the graph, e.g., bridge edges [22,26], hotspot nodes [31], changes to community structure [27,28], graph metrics [8,10], etc. In this work, we focus on detecting anomalies involving the sudden appearance or disappearance of a large dense directed subgraphs (near bicliques), which is useful in numerous applications: detecting attacks (port scan, denial of service) in network communication logs, interesting/fraudulent behavior creating spikes of activity in user-user communication logs (scammers who operate fast and in bulk), important events (holidays, large delays) creating abnormal traffic in/out flow to certain locations, etc.…”
Section: Introductionmentioning
confidence: 99%