2018 IEEE International Conference on Data Mining (ICDM) 2018
DOI: 10.1109/icdm.2018.00117
|View full text |Cite
|
Sign up to set email alerts
|

SedanSpot: Detecting Anomalies in Edge Streams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
66
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 62 publications
(67 citation statements)
references
References 21 publications
0
66
0
1
Order By: Relevance
“…This allows one to design scalable approximation algorithms to solve the underlying problems. There has been extensive work on estimating triangles (cycles of length three) in graphs [19,21], butterflies (cycles of length four) in bipartite graphs [15], and anomaly detection [8] when the graph is input as a stream of edges. A framework for estimating the number of connected induced sub-graphs on three and four vertices is presented in [6].…”
Section: Related Workmentioning
confidence: 99%
“…This allows one to design scalable approximation algorithms to solve the underlying problems. There has been extensive work on estimating triangles (cycles of length three) in graphs [19,21], butterflies (cycles of length four) in bipartite graphs [15], and anomaly detection [8] when the graph is input as a stream of edges. A framework for estimating the number of connected induced sub-graphs on three and four vertices is presented in [6].…”
Section: Related Workmentioning
confidence: 99%
“…Another survey ( Gupta et al 2014 ) applied outlier detection methods to temporal data. Recently, researchers targeted the outlier “bridge edges" in a streaming of graphs ( Eswaran et al 2018 ; Aggarwal et al 2011 ) or a streaming of separate point-to-point edges ( Eswaran and Faloutsos 2018 ; Takahashi et al 2011 ). Our proposed outlier detection method deals with the new target of information walks, which considers both overall structural and temporal patterns.…”
Section: Related Workmentioning
confidence: 99%
“…We use a simulation-based test of information walk outliers in the network of information walks in order to (1) demonstrate the efficacy of the model for the information walks network; (2) complement the proposed BPR-IW model of walk prediction since the users of an intelligent network platform may not have time to focus on every walk and check the prediction of its future direction while an overall outlier detection function could filter some “abnormal” or “new” walks and remind users to check. In related work ( Savage et al 2014 ; Ranshous et al 2015 ; Eswaran and Faloutsos 2018 ; Takahashi et al 2011 ), researchers have targeted different parts in a graph to build a specific outlier detection algorithm, including nodes, subgraphs, separate point-to-point edges (e.g., TCP-IP communication, connections between new accounts in social networks). Herein we are the first to implement outlier detection for a whole information walk, which differs from prior work due to the existence of the same single “walker” or information flow along the sequence of visited nodes.…”
Section: Introductionmentioning
confidence: 99%
“…A summary of the related work is listed in Table 1. There are reviews addressing the chal- Scientific Work Reviews [19,27] Graph-based methods [2,12,13,36,37,41,42] Graph-based and time-sensitive methods [1,45] Machine learning-based [6,14,32] Statistical processes [33,44,48,50] Wavelet analysis [25,31,35] Industrial Intrusion Detection [3,15,18,20,23,28,34,38,39,46] lenge of anomaly detection for intrusion detection. García-Teodoro et al address the challenges of this field of work while presenting techniques and systems [19].…”
Section: Related Workmentioning
confidence: 99%
“…Pasqualetti et al present a method specifically for detecting attacks on Cyber-Physical Systems (CPSs) while considering graph-properties [37]. A different kind of approach for detecting anomalies in graph is presented by Eswaran and Faloutsos [13]. They consider dynamic graphs and look at the edges in any given time step, called an edge stream.…”
Section: Related Workmentioning
confidence: 99%