Proceedings of the 2013 SIAM International Conference on Data Mining 2013
DOI: 10.1137/1.9781611972832.4
|View full text |Cite
|
Sign up to set email alerts
|

NetSpot: Spotting Significant Anomalous Regions on Dynamic Networks

Abstract: How to spot and summarize anomalies in dynamic networks such as road networks, communication networks and social networks? An anomalous event, such as a traffic accident, a denial of service attack or a chemical spill, can affect several near-by edges and make them behave abnormally, over several consecutive time-ticks. We focus on spotting and summarizing such significant anomalous regions, spanning space (i.e. nearby edges), as well as time.Our first contribution is the problem formulation, namely finding al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 78 publications
(55 citation statements)
references
References 26 publications
0
55
0
Order By: Relevance
“…is the posterior probability of seeing n t e interactions given the counts in the previous days, and µ = 0.05 is a significance threshold. This weighing function [14] is positiveincreasing if the posterior probability is less than µ and negative-decreasing otherwise. After assigning weights to edges, we solve the Heaviest Dynamic Subgraph problem [4] using algorithm ColCodeNW (See Section 5.3.3).…”
Section: Scalabilitymentioning
confidence: 99%
“…is the posterior probability of seeing n t e interactions given the counts in the previous days, and µ = 0.05 is a significance threshold. This weighing function [14] is positiveincreasing if the posterior probability is less than µ and negative-decreasing otherwise. After assigning weights to edges, we solve the Heaviest Dynamic Subgraph problem [4] using algorithm ColCodeNW (See Section 5.3.3).…”
Section: Scalabilitymentioning
confidence: 99%
“…Many recent research studies have also employed these methods in order to detect the behavior of the network and whether it is a normal or malicious case [12,27].…”
Section: Related Workmentioning
confidence: 99%
“…Outlier elimination from aggregate query results by discovering appropriate predicates is proposed in [16]. Recent trends in outlier detection include the investigation of techniques that are particularly significant for big data analysis, such as dealing with high dimensionality, e.g., [17,18], and considering graph-based data types common in social networks, e.g., [19,20], categorical data [21] and video streams [22]. Apart from the fact that outliers are important in many applications, their discovery allows the data set to be "cleaned" to apply a particular model [23], while in many cases, their detection is a by-product of clustering, e.g., as in [24].…”
Section: Static Outlier Detectionmentioning
confidence: 99%