Relevance-Aware Anomalous Users Detection in Social Network

—Anomalous users detection in social network is an imperative task for security problems. Graph Neural Networks (GNNs) have been widely applied to reveal the suspicious nodes or relevance by aggregating the neighborhood information. However, the increasing scale of users’ behaviors and interactions as well as the manifold camouflage techniques have largely complicated the discrimination process, which result in the serious loss of detection accuracy. In this paper, we propose an innovate Relevance-aware Anomalous Users Detection model (R AUD ), which extracts and learns both the explicit and implicit relevance from meta data based on heterogeneous information network (H IN ) and GNNs. We employ two distinct exploring layers including a self-attention layer and a similarity calculation layer to fully consider the users’ intimacy across different relationships, and a following fusion layer based on graph convolution network(GCN) to consolidate the similarity and enhance the node embedding. We evaluate our proposed model with real-world datasets and results show our approach can achieve over 90% accuracy for user classification, far better than other comparable baselines

[1]  Philip S. Yu,et al.  Lime: Low-Cost and Incremental Learning for Dynamic Heterogeneous Information Networks , 2021, IEEE Transactions on Computers.

[2]  Philip S. Yu,et al.  Knowledge-Preserving Incremental Social Event Detection via Heterogeneous GNNs , 2021, WWW.

[3]  Jun Zhao,et al.  Multi-attributed heterogeneous graph convolutional network for bot detection , 2020, Inf. Sci..

[4]  Philip S. Yu,et al.  Pairwise Learning for Name Disambiguation in Large-Scale Heterogeneous Academic Networks , 2020, 2020 IEEE International Conference on Data Mining (ICDM).

[5]  Philip S. Yu,et al.  Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged Fraudsters , 2020, CIKM.

[6]  Hao Peng,et al.  Modeling relation paths for knowledge base completion via joint adversarial training , 2020, Knowl. Based Syst..

[7]  Barbara Carminati,et al.  A deep learning model for Twitter spam detection , 2020, Online Soc. Networks Media.

[8]  Xiaoyu Yang,et al.  Rumor Detection on Social Media with Graph Structured Adversarial Learning , 2020, IJCAI.

[9]  A. Flammini,et al.  Detection of Novel Social Bots by Ensembles of Specialized Classifiers , 2020, CIKM.

[10]  Philip S. Yu,et al.  Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection , 2020, SIGIR.

[11]  Yizhou Sun,et al.  Heterogeneous Graph Transformer , 2020, WWW.

[12]  Irwin King,et al.  MAGNN: Metapath Aggregated Graph Neural Network for Heterogeneous Graph Embedding , 2020, WWW.

[13]  Shujian Huang,et al.  A Reinforced Generation of Adversarial Examples for Neural Machine Translation , 2019, ACL.

[14]  Dong Li,et al.  Spam Review Detection with Graph Convolutional Networks , 2019, CIKM.

[15]  Philip S. Yu,et al.  Hierarchical Taxonomy-Aware and Attentional Graph Capsule RCNNs for Large-Scale Multi-Label Text Classification , 2019, IEEE Transactions on Knowledge and Data Engineering.

[16]  Philip S. Yu,et al.  Fine-grained Event Categorization with Heterogeneous Graph Convolutional Networks , 2019, IJCAI.

[17]  Yu Huang,et al.  FdGars: Fraudster Detection via Graph Convolutional Networks in Online App Review System , 2019, WWW.

[18]  Kathleen M. Carley,et al.  Its all in a name: detecting and labeling bots by their name , 2018, Computational and Mathematical Organization Theory.

[19]  Sujuan Qin,et al.  A Social Bots Detection Model Based on Deep Learning Algorithm , 2018, 2018 IEEE 18th International Conference on Communication Technology (ICCT).

[20]  Hassan Hajjdiab,et al.  Detecting Fake Followers in Twitter: A Machine Learning Approach , 2017 .

[21]  Pietro Liò,et al.  Graph Attention Networks , 2017, ICLR.

[22]  A. Swami,et al.  metapath2vec: Scalable Representation Learning for Heterogeneous Networks , 2017, KDD.

[23]  Jun Zhang,et al.  Twitter spam detection based on deep learning , 2017, ACSW.

[24]  Roberto Di Pietro,et al.  Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..

[25]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[26]  Christos Faloutsos,et al.  Detecting suspicious following behavior in multimillion-node social networks , 2014, WWW.

[27]  Mark J. Embrechts,et al.  On the Use of the Adjusted Rand Index as a Metric for Evaluating Supervised Classification , 2009, ICANN.

[28]  P. Estévez,et al.  Normalized Mutual Information Feature Selection , 2009, IEEE Transactions on Neural Networks.

[29]  Qiben Yan,et al.  Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning , 2021, Comput. Secur..

[30]  Ah Chung Tsoi,et al.  The Graph Neural Network Model , 2009, IEEE Transactions on Neural Networks.