Outlier and anomalous behavior detection in social networks using constraint programming

Outlier and anomaly detection are widely used in several fields of study such as social networks, statistics, and knowledge discovery. In social networks, it is useful to detect structural abnormalities which are different from the typical behavior of the social network in order to maintain the network security and privacy. In this paper, we suggest a new approach for outlier and anomalous behavior detection in social networks based on combined graph pattern matching and constraint programming. For this purpose, we utilize the Constraint Programming (CP) techniques for matching the original graph data with the graph pattern data, to detect two formalized anomalies: anomalous nodes and anomalous edges. We also introduce a neighborhood constraint formalization that aims to precise the anomaly that replaced specific node as well as the changes that it made within the networks. Finally, we present our experimental results that show the effectiveness and efficiency of our approach in terms of computational time and matching accuracy.

[1]  D. Hand,et al.  Bayesian anomaly detection methods for social networks , 2010, 1011.1788.

[2]  Teofilo F. Gonzalez,et al.  P-Complete Approximation Problems , 1976, J. ACM.

[3]  Danai Koutra,et al.  Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.

[4]  Jean-Charles Régin,et al.  A Filtering Algorithm for Constraints of Difference in CSPs , 1994, AAAI.

[5]  Jiawei Han,et al.  Community Distribution Outlier Detection in Heterogeneous Information Networks , 2013, ECML/PKDD.

[6]  P. V. Beek,et al.  A fast and simple algorithm for bounds consistency of the all different constraint , 2003, IJCAI 2003.

[7]  Fosca Giannotti,et al.  Finding redundant and complementary communities in multidimensional networks , 2011, CIKM '11.

[8]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[9]  Mario Vento,et al.  A (sub)graph isomorphism algorithm for matching large graphs , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Hans-Peter Kriegel,et al.  Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection , 2012, Data Mining and Knowledge Discovery.

[11]  Jun Gao,et al.  A Scalable Algorithm for Detecting Community Outliers in Social Networks , 2012, WAIM.

[12]  M. Newman,et al.  The structure of scientific collaboration networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.

[13]  Edward M. Reingold,et al.  Backtrack programming techniques , 1975, CACM.

[14]  Salvatore J. Stolfo,et al.  A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.

[15]  Paul Shaw,et al.  Using Constraint Programming and Local Search Methods to Solve Vehicle Routing Problems , 1998, CP.

[16]  Christos Faloutsos,et al.  oddball: Spotting Anomalies in Weighted Graphs , 2010, PAKDD.

[17]  Christos Faloutsos,et al.  Graph evolution: Densification and shrinking diameters , 2006, TKDD.

[18]  Donald W. Loveland,et al.  A machine program for theorem-proving , 2011, CACM.

[19]  Christophe Rigotti,et al.  Finding Collections of k-Clique Percolated Components in Attributed Graphs , 2012, PAKDD.

[20]  Yizhou Sun,et al.  On community outliers and their efficient detection in information networks , 2010, KDD.

[21]  Solomon W. Golomb,et al.  Backtrack Programming , 1965, JACM.

[22]  Talel Abdessalem,et al.  Casting a web of trust over Wikipedia: an interaction-based approach , 2011, WWW.

[23]  Hans-Peter Kriegel,et al.  A survey on unsupervised outlier detection in high‐dimensional numerical data , 2012, Stat. Anal. Data Min..

[24]  Philip S. Yu,et al.  Outlier detection in graph streams , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[25]  Vipin Kumar,et al.  Algorithms for Constraint-Satisfaction Problems: A Survey , 1992, AI Mag..

[26]  Klemens Böhm,et al.  Ranking outlier nodes in subspaces of attributed graphs , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).

[27]  Lawrence B. Holder,et al.  Discovering Structural Anomalies in Graph-Based Data , 2007, Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007).

[28]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[29]  Vic Barnett,et al.  Outliers in Statistical Data , 1980 .