Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &Amp; Data Mining 2018
DOI: 10.1145/3219819.3220040
|View full text |Cite
|
Sign up to set email alerts
|

SpotLight

Abstract: How do we spot interesting events from e-mail or transportation logs? How can we detect port scan or denial of service attacks from IP-IP communication data? In general, given a sequence of weighted, directed or bipartite graphs, each summarizing a snapshot of activity in a time window, how can we spot anomalous graphs containing the sudden appearance or disappearance of large dense subgraphs (e.g., near bicliques) in near real-time using sublinear memory? To this end, we propose a randomized sketching-based a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 106 publications
(13 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“… Chan et al (2008) detected spatiotemporal changes that are correlated in dynamic graphs. SpotLight ( Eswaran et al 2018 ) spots large dense subgraphs that appear or disappear suddenly. SDREGION ( Wong et al 2018 ) finds subgraphs such that their densities monotonically increase or decrease across time.…”
Section: Introductionmentioning
confidence: 99%
“… Chan et al (2008) detected spatiotemporal changes that are correlated in dynamic graphs. SpotLight ( Eswaran et al 2018 ) spots large dense subgraphs that appear or disappear suddenly. SDREGION ( Wong et al 2018 ) finds subgraphs such that their densities monotonically increase or decrease across time.…”
Section: Introductionmentioning
confidence: 99%
“…Within dynamic networks, the definition of an anomalous object varies widely depending on the specific application context. Based on the diverse nature of anomalies that can occur in such evolving structures, the scope of detection tasks can range from identifying abnormal nodes [12], [16]- [18] and edges [5], [19]- [21] to pinpointing anomalous subgraphs [22], [23]. Early approaches mainly leverage the shallow mechanisms to detect anomalies in dynamic graphs.…”
Section: A Anomaly Detection In Dynamic Graphsmentioning
confidence: 99%
“…MTHL [12] distinguishes normal and anomalous nodes according to their distances to the learned hypersphere center. SpotLight [23] guarantees a large mapped distance between anomalous and normal graphs in the sketch space with a randomized sketching technique.…”
Section: A Anomaly Detection In Dynamic Graphsmentioning
confidence: 99%
“…queries, like time-stamped nodes [6,7] or entire graph snapshots [8][9][10][11], have also been proposed. These algorithms also vary in the way they define an anomaly and use the context.…”
Section: Introductionmentioning
confidence: 99%
“…These algorithms also vary in the way they define an anomaly and use the context. Namely, nodes may be deemed abnormal if they suddenly change their centrality [6] or communication counts [7], while graphs may be considered abnormal if they have sudden densifications [9], spectrum changes [10], or community re-configurations [11], to list some examples.…”
Section: Introductionmentioning
confidence: 99%