Relevance-Aware Anomalous Users Detection in Social Network via Graph Neural Network

Anomalous users detection in social network is an imperative task for security problems. Motivated by the great power of Graph Neural Networks(GNNs), many current researches adopt GNN-based detectors to reveal the anomalous users. However, the increasing scale of social activities, explosive growth of users and manifold technical disguise render the user detection a difficult task. In this paper, we propose an innovate Relevance-aware Anomalous Users Detection model (RAU-GNN) to obtain a fine-grained detection result. RAU-GNN first extracts multiple relations of all types of users in social network, including both benign and anomalous users, and accordingly constructs the multiple user relation graph. Secondly, we employ relevance-aware GNN framework to learn the hidden features of users, and discriminate the anomalous users after discriminating. Concretely, by integrating Graph Convolution Network(GCN) and Graph Attention Network(GAT), we design a GCN-based relation fusion layer to aggregate initial information from different relations, and a GAT-based embedding layer to obtain the high-level embeddings. Lastly, we feed the learned representations to the following GNN layer in order to consolidate the node embedding by aggregating the final users' embeddings. We conduct extensive experiment on real-world datasets. The experimental results show that our approach can achieve high accuracy for anomalous users detection.

[1]  Jun Zhao,et al.  Multi-attributed heterogeneous graph convolutional network for bot detection , 2020, Inf. Sci..

[2]  Yu Huang,et al.  FdGars: Fraudster Detection via Graph Convolutional Networks in Online App Review System , 2019, WWW.

[3]  Jie Xu,et al.  D^2PS: A Dependable Data Provisioning Service in Multi-tenant Cloud Environment , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).

[4]  Philip S. Yu,et al.  Kollector: Detecting Fraudulent Activities on Mobile Devices Using Deep Learning , 2020, IEEE Transactions on Mobile Computing.

[5]  Zhenyu Wen,et al.  Performance-Aware Speculative Resource Oversubscription for Large-Scale Clusters , 2020, IEEE Transactions on Parallel and Distributed Systems.

[6]  James Caverlee,et al.  Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures , 2019, CIKM.

[7]  Hassan Hajjdiab,et al.  Detecting Fake Followers in Twitter: A Machine Learning Approach , 2017 .

[8]  Feifei Li,et al.  DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.

[9]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[10]  Xiaoyu Yang,et al.  Rumor Detection on Social Media with Graph Structured Adversarial Learning , 2020, IJCAI.

[11]  Nitesh V. Chawla,et al.  metapath2vec: Scalable Representation Learning for Heterogeneous Networks , 2017, KDD.

[12]  Qiben Yan,et al.  Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning , 2021, Comput. Secur..

[13]  Mark J. Embrechts,et al.  On the Use of the Adjusted Rand Index as a Metric for Evaluating Supervised Classification , 2009, ICANN.

[14]  Jacek M. Zurada,et al.  Normalized Mutual Information Feature Selection , 2009, IEEE Transactions on Neural Networks.

[15]  Rajiv Ranjan,et al.  TOPOSCH: Latency-Aware Scheduling Based on Critical Path Analysis on Shared YARN Clusters , 2020, 2020 IEEE 13th International Conference on Cloud Computing (CLOUD).

[16]  Christos Faloutsos,et al.  Detecting suspicious following behavior in multimillion-node social networks , 2014, WWW.

[17]  Philip S. Yu,et al.  Adversarial Directed Graph Embedding , 2020, AAAI.

[18]  Kathleen M. Carley,et al.  Its all in a name: detecting and labeling bots by their name , 2018, Computational and Mathematical Organization Theory.

[19]  Jie Xu,et al.  Reliable Computing Service in Massive-Scale Systems through Rapid Low-Cost Failover , 2017, IEEE Transactions on Services Computing.

[20]  Yizhou Sun,et al.  Heterogeneous Graph Transformer , 2020, WWW.

[21]  Dong Li,et al.  Spam Review Detection with Graph Convolutional Networks , 2019, CIKM.

[22]  Xinyu Dai,et al.  A Reinforced Generation of Adversarial Samples for Neural Machine Translation , 2019, ArXiv.

[23]  Ah Chung Tsoi,et al.  The Graph Neural Network Model , 2009, IEEE Transactions on Neural Networks.

[24]  Joel R. Tetreault,et al.  Abusive Language Detection in Online User Content , 2016, WWW.

[25]  Philip S. Yu,et al.  Knowledge-Preserving Incremental Social Event Detection via Heterogeneous GNNs , 2021, WWW.

[26]  Philip S. Yu,et al.  HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network , 2020, IEEE Transactions on Knowledge and Data Engineering.

[27]  Philip S. Yu,et al.  Lime: Low-Cost and Incremental Learning for Dynamic Heterogeneous Information Networks , 2021, IEEE Transactions on Computers.

[28]  Zhenyu Wen,et al.  GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds , 2020, IEEE Transactions on Parallel and Distributed Systems.

[29]  Irwin King,et al.  MAGNN: Metapath Aggregated Graph Neural Network for Heterogeneous Graph Embedding , 2020, WWW.

[30]  WangLizhe,et al.  Orchestrating the Development Lifecycle of Machine Learning-Based IoT Applications: A Taxonomy and Survey , 2020 .

[31]  Barbara Carminati,et al.  A deep learning model for Twitter spam detection , 2020, Online Soc. Networks Media.

[32]  Modeling Relation Paths for Knowledge Base Completion via Joint Adversarial Training , 2020 .

[33]  Pietro Liò,et al.  Graph Attention Networks , 2017, ICLR.

[34]  Héctor M. Pérez Meana,et al.  Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization , 2018, Sensors.

[35]  Philip S. Yu,et al.  Streaming Social Event Detection and Evolution Discovery in Heterogeneous Information Networks , 2021, ACM Trans. Knowl. Discov. Data.

[36]  Philip S. Yu,et al.  Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection , 2020, SIGIR.

[37]  Philip S. Yu,et al.  Hierarchical Taxonomy-Aware and Attentional Graph Capsule RCNNs for Large-Scale Multi-Label Text Classification , 2019, IEEE Transactions on Knowledge and Data Engineering.

[38]  Sujuan Qin,et al.  A Social Bots Detection Model Based on Deep Learning Algorithm , 2018, 2018 IEEE 18th International Conference on Communication Technology (ICCT).

[39]  Alessandro Flammini,et al.  Detection of Novel Social Bots by Ensembles of Specialized Classifiers , 2020, CIKM.

[40]  Jun Zhang,et al.  Twitter spam detection based on deep learning , 2017, ACSW.

[41]  Philip S. Yu,et al.  Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged Fraudsters , 2020, CIKM.

[42]  Roberto Di Pietro,et al.  Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..

[43]  Philip S. Yu,et al.  Pairwise Learning for Name Disambiguation in Large-Scale Heterogeneous Academic Networks , 2020, 2020 IEEE International Conference on Data Mining (ICDM).

[44]  Yanfang Ye,et al.  Key Player Identification in Underground Forums over Attributed Heterogeneous Information Network Embedding Framework , 2019, CIKM.

[45]  Senzhang Wang,et al.  Motif-Matching Based Subgraph-Level Attentional Convolutional Network for Graph Classification , 2020, AAAI.