Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Detecting and Assessing Anomalous Evolutionary Behaviors of Nodes in Evolving Social Networks

Published: 23 January 2019 Publication History

Abstract

Based on the performance of entire social networks, anomaly analysis for evolving social networks generally ignores the otherness of the evolutionary behaviors of different nodes, such that it is difficult to precisely identify the anomalous evolutionary behaviors of nodes (AEBN). Assuming that a node's evolutionary behavior that generates and removes edges normally follows stable evolutionary mechanisms, this study focuses on detecting and assessing AEBN, whose evolutionary mechanisms deviate from their past mechanisms, and proposes a link prediction detection (LPD) method and a matrix perturbation assessment (MPA) method. LPD describes a node's evolutionary behavior by fitting its evolutionary mechanism, and designs indexes for edge generation and removal to evaluate the extent to which the evolutionary mechanism of a node's evolutionary behavior can be fitted by a link prediction algorithm. Furthermore, it detects AEBN by quantifying the differences among behavior vectors that characterize the node's evolutionary behaviors in different periods. In addition, MPA considers AEBN as a perturbation of the social network structure, and quantifies the effect of AEBN on the social network structure based on matrix perturbation analysis. Extensive experiments on eight disparate real-world networks demonstrate that analyzing AEBN from the perspective of evolutionary mechanisms is important and beneficial.

References

[1]
L. A. Adamic and E. Adar. 2003. Friends and neighbors on the web. Social Networks 25, 3 (2003), 211--230
[2]
R. Ahmed and G. Karypis. 2015. Algorithms for mining the coevolving relational motifs in dynamic networks. ACM Transactions on Knowledge Discovery from Data 10, 1 (2015), 4.
[3]
N. M. Ahmed and L. Chen. 2016. An efficient algorithm for link prediction in temporal uncertain social networks. Information Sciences 331 (2016), 120--136.
[4]
L. M. Aiello, A. Barrat, R. Schifanella, C. Cattuto, B. Markines, and F. Menczer. 2012. Friendship prediction and homophily in social media. ACM Transactions on the Web 6, 2 (2012), 1--33.
[5]
Leman Akoglu and Christos Faloutsos. 2008. Event detection in time series of mobile communication graphs. In Army Science Conference.
[6]
L. Akoglu, H. Tong, and D. Koutra. 2015. Graph based anomaly detection and description: a survey. Data Mining and Knowledge Discovery 29, 3 (2015), 626--688.
[7]
Ferraz Costa Alceu, Yamaguchi Yuto, Juci Machado Traina Agma, Traina Caetano, and Faloutsos Christos. 2017. Modeling temporal activity to detect anomalous behavior in social media. ACM Transactions on Knowledge Discovery from Data 11, 4 (2017), 49.
[8]
M. Araujo, S. Papadimitriou, S. Günnemann, C. Faloutsos, P. Basu, and A. Swami. 2014. Com2: fast automatic discovery of temporal (comet) communities. In PAKDD'14.
[9]
B. Barzel and A. L. Barabási. 2013. Network link prediction by global silencing of indirect correlations. Nature Biotechnology 31, 8 (2013), 720--725.
[10]
S. P. Borgatti, A. Mehra, D. J. Brass, and G. Labianca. 2009. Network analysis in the social sciences. Science 323, 5916 (2009), 892.
[11]
C. Chelmis and V. K. Prasanna. 2013. Social link prediction in online social tagging systems. ACM Transactions on Information Systems 31, 4 (2013), 1--27.
[12]
J. Chen and Y. Saad. 2012. Dense subgraph extraction with application to community detection. IEEE Transactions on Knowledge and Data Engineering 24, 7 (2012), 1216--1230.
[13]
A. Clauset, C. Moore, and M. E. Newman. 2008. Hierarchical structure and the prediction of missing links in networks. Nature 453, 7191 (2008), 98--101.
[14]
K. Do, T. Tran, S. Venkatesh. 2018. Energy-based anomaly detection for mixed data. Knowledge and Information Systems 57, 2, 413--435.
[15]
Xiaowen Dong, Mavroeidis Dimitrios, Calabrese Francesco, and Frossard Pascal. 2015. Multiscale event detection in social media. Data Mining and Knowledge Discovery 29, 5 (2015), 1374--1405.
[16]
Stilo Giovanni and Velardi Paola. 2016. Efficient temporal mining of micro-blog texts and its application to event discovery. Data Mining and Knowledge Discovery 30, 2 (2016), 372--402.
[17]
G. Grinstein, C. Plaisant, S. Laskowski, T. O'Connell, J. Scholtz, and M. Whiting. 2008. VAST 2008 Challenge: Introducing mini-challenges. In VAST'2008.
[18]
R. Guimerà and M. Sales-Pardo. 2010. Missing and spurious interactions and the reconstruction of complex networks. In National Academy of Sciences of the United States of America 106, 52 (2010), 22073.
[19]
M. Gupta, J. Gao, Y. Sun, and J. Han. 2012. Integrating community matching and outlier detection for mining evolutionary community outliers. In SIGKDD'12.
[20]
M. Hamdi, V. Krishnamurthy, and G. Yin. 2014. Tracking a Markov-modulated stationary degree distribution of a dynamic random graph. IEEE Transactions on Information Theory 60, 10 (2014), 6609--6625.
[21]
J. A. Hanley and B. J. Mcneil. 1982. The meaning and use of the area under a receiver operating characteristic (roc) curve. Radiology 143, 1 (1982), 29--36. -->
[22]
K. Henderson, B. Gallagher, T. Eliassi-Rad, H. Tong, S. Basu, and L. Akoglu. 2012. RolX: structural role extraction and mining in large graphs. In SDMKDD'12. 1231--1239.
[23]
M. Hoefer. 2013. Local matching dynamics in social networks. Information and Computation 222, 4 (2013), 113--124.
[24]
Lvlin Hou, M. Small, and S. Lao. 2014. Maximum entropy networks are more controllable than preferential attachment networks. Physics Letters A 378, 46 (2014), 3426--3430.
[25]
W. Hu and G. G. Yen. 2015. Adaptive multiobjective particle swarm optimization based on parallel cell coordinate system. IEEE Transactions on Evolutionary Computation 19, 1 (2015), 1--18.
[26]
H. Huang, J. Tang, L. Liu, J. D. Luo, and X. Fu. 2015. Triadic closure pattern analysis and prediction in social networks. IEEE Transactions on Knowledge and Data Engineering 27, 12 (2015), 3374--3389.
[27]
S. D. Hunt and J. R. Deller. 1995. Selective training of feed forward artificial neural networks using matrix perturbation theory. Neural Networks 8, 6 (1995), 931--944.
[28]
R. Ibrahim, A. Elbagoury, M. S. Kamel, and F. Karray. 2018. Tools and approaches for topic detection from twitter streams: survey. Knowledge and Information Systems 54, 3 (2018), 511--539.
[29]
A. Jonnalagadda, and L. Kuppusamy. 2018. Overlapping community detection in social networks using coalitional games. Knowledge and Information Systems 56, 3 (2018), 637--661.
[30]
U. Kang, S. Papadimitriou, J. Sun, and H. Tong. 2011. Centralities in large networks: algorithms and observations. In SDM'11.
[31]
B. Klimt and Y. Yang. 2004. The enron corpus: a new dataset for email classification research. Lecture Notes in Computer Science 3201 (2004), 217--226.
[32]
Danai Koutra, Neil Shah, Joshua T. Vogelstein, Brian Gallagher, and Christos Faloutsos. 2016. DeltaCon: principled massive-graph similarity function with attribution. ACM Transactions on Knowledge Discovery from Data 10, 3 (2016), 1--43.
[33]
J. Leskovec and C. Faloutsos. 2006. Sampling from large graphs. In SIGKDD'06.
[34]
J. Leskovec, J. Kleinberg, and C. Faloutsos. 2006. Overview of the 2003 KDD cup. In SIGKDD'06. 149--151.
[35]
J. Leskovec, J. Kleinberg, and C. Faloutsos. 2007. Graph Evolution: densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data 1, 1 (2007), 2.
[36]
J. Leskovec, K. J. Lang, and M. Mahoney. 2010. Empirical comparison of algorithms for network community detection. In WWW'10.
[37]
K. Lewis, M. Gonzalez, and J. Kaufman. 2012. Social selection and peer influence in an online social network. National Academy of Sciences of the United States of America 109, 1 (2012), 68--72.
[38]
D. Liben-Nowell and J. Kleinberg. 2007. The link-prediction problem for social networks. Journal of the American Society for Information Science and Technology 58, 7 (2007), 1019--1031.
[39]
Y. H. Lin, S. H. Shao, Y. Wang, and X. Yin. 2015. A low temperature expansion for matrix quantum mechanics. Journal of High Energy Physics 5 (2015), 136.
[40]
L. Lü and T. Zhou. 2011. Link prediction in complex networks: a survey. Physica A Statistical Mechanics and Its Applications 390, 6 (2011), 1150--1170.
[41]
L. Lü, C. H. Jin, and T. Zhou. 2009. Similarity index based on local paths for link prediction of complex networks. Physical Review E 80, 4 (2009), 593--598.
[42]
L. Lü, L. Pan, T. Zhou, Y. C. Zhang, and H. E. Stanley. 2015. Toward link predictability of complex networks. Proceedings of the National Academy of Sciences of the United States of America 112, 8 (2015), 2325.
[43]
A. Mahmood, M. Small, S. Almaadeed, and N. Rajpoot. 2017. Using geodesic space density gradients for network community detection. IEEE Transactions on Knowledge and Data Engineering 29, 4 (2017), 921--935.
[44]
V. Martínez, F. Berzal, and J. C. Cubero. 2016. A survey of link prediction in complex networks. ACM Computing Surveys 49, 4 (2016), 69.
[45]
S. A. Marvel, S. H. Strogatz, and J. M. Kleinberg. 2009. Energy landscape of social balance. Physical Review Letters 103 (2009), 19.
[46]
P. Mazumdar, B. K. Patra, K. S. Babu, and R. Lock. 2017. Hidden location prediction using check-in patterns in location-based social networks. Knowledge and Information Systems 57, 3 (2017), 571--601.
[47]
S. L. Mei, and S. W. Zhang. 2007. Coupling technique of variational iteration and homotopy perturbation methods for nonlinear matrix differential equations. Computers and Mathematics with Applications 54, 7 (2007), 1092--1100.
[48]
V. H. Moghaddam, and J. Hamidzadeh. 2016. New hermite orthogonal polynomial kernel and combined kernels in support vector machine classifier. Pattern Recognition 60 (2016), 921--935.
[49]
M. Mongiovi, P. Bogdanov, R. Ranca, A. K. Singh, E. E. Papalexakis, and C. Faloutsos. 2013. Netspot: spotting significant anomalous regions on dynamic networks. In SDM'13.
[50]
M. C. V. Nascimento. 2014. Community detection in networks via a spectral heuristic based on the clustering coefficient. Discrete Applied Mathematics 176, 3 (2014), 89--99.
[51]
C. C. Noble and D. J. Cook. 2003. Graph-based anomaly detection. In SIGKDD '03.
[52]
J. P. Onnela, J. Saramaki, J. Kertész, and K. Kaski. 2005. Intensity and coherence of motifs in weighted complex networks. Physical Review E Statistical Nonlinear and Soft Matter Physics 71, 6 (2005), 531--536.
[53]
L. Pan, T. Zhou, L. Linyuan, and C. K. Hu. 2016. Predicting missing links and identifying spurious links via likelihood analysis. Scientific Reports 6 (2016), 22955.
[54]
E. E. Papalexakis, C. Faloutsos, and N. D. Sidiropoulos. 2012. ParCube: Sparse parallelizable tensor decompositions. In ECML-PKDD'12.
[55]
A. Paranjape, A. R. Benson, and Leskovec. 2017. Motifs in Temporal Networks. In WSDM'17.
[56]
A. Pecli, M. C. Cavalcanti, and R. Goldschmidt. 2018. Automatic feature selection for supervised learning in link prediction applications: a comparative study. Knowledge and Information Systems 56, 1 (2018), 85--121.
[57]
Panzarasa Pietro, Opsahl Tore, and M. Carley Kathleen. 2009. Patterns and dynamics of users' behavior and interaction: network analysis of an online community. Journal of the American Society for Information Science and Technology 60, 5 (2009), 911--932.
[58]
E. Ravasz, A. L. Somera, D. A. Mongru, Z. N. Oltvai, and A. L. Barabási. 2002. Hierarchical organization of modularity in metabolic networks. Science 297, 5586 (2002), 1551.
[59]
R. Rossi, B. Gallagher, J. Neville, and K. Henderson. 2012. Role-dynamics: fast mining of large dynamic networks. In WWW'12.
[60]
R. A. Rossi, B. Gallagher, J. Neville, and K. Henderson. 2013. Modeling dynamic behavior in large evolving graphs. In WSDM'13.
[61]
K. Saito, M. Kimura, K. Ohara, and H. Motoda. 2016. Super mediator -- a new centrality measure of node importance for information diffusion over social network. Information Sciences 329 (2016), 985--1000.
[62]
A. Shapiro. 2010. Perturbation analysis of optimization problems in banach spaces. 2010. Numerical Functional Analysis and Optimization 13, 1 (2010), 97--116.
[63]
P. Shoubridge, M. Kraetzl, W. D. Wallis, and H. Bunke. 2002. Detection of abnormal change in a time series of graphs. Journal of Interconnection Networks 3, 1 (2002), 85--101.
[64]
Y. Sun, J. Han, J. Gao, and Y. Yu. 2009. iTopic model: information network-integrated topic modeling. In ICDM'09.
[65]
W. Q. Wang, Q. M. Zhang, and T. Zhou. 2011. Evaluating network models: a likelihood analysis. EPL 98, 2 (2011), 28004--28009.
[66]
H. Wang, W. Hu, Z. Qiu, and B. Du. 2017. Nodes' evolution diversity and link prediction in social networks. IEEE Transactions on Knowledge and Data Engineering 29, 10 (2017), 2263--2274.
[67]
W. Wei and K. M. Carley. 2015. Measuring temporal patterns in dynamic social networks. ACM Transactions on Knowledge Discovery from Data 10, 1 (2015), 1--27.
[68]
R. C. Wilson, E. R. Hancock, and B. Luo. 2005. Pattern vectors from algebraic graph theory. IEEE Transactions on Pattern Analysis and Machine Intelligence 27, 7 (2005), 1112--1124.
[69]
Xiaowei Xue, Min Yao, and Zhaohui Wu. 2017. A novel ensemble-based wrapper method for feature selection using extreme learning machine and genetic algorithm. Knowledge and Information Systems 57, 2 (2017), 389--412.
[70]
T. Zhou, L. Lü, and Y. C. Zhang. 2009. Predicting missing links via local information. The European Physical Journal B-Condensed Matter and Complex Systems 71, 4 (2009), 623--630.

Cited By

View all
  • (2024)Bayesian Graph Local Extrema Convolution with Long-tail Strategy for Misinformation DetectionACM Transactions on Knowledge Discovery from Data10.1145/363940818:4(1-21)Online publication date: 12-Feb-2024
  • (2024)Link prediction method for social networks based on a hierarchical and progressive user interaction matrixKnowledge-Based Systems10.1016/j.knosys.2024.111929297(111929)Online publication date: Aug-2024
  • (2023)Resisting the Edge-Type Disturbance for Link Prediction in Heterogeneous NetworksACM Transactions on Knowledge Discovery from Data10.1145/361409918:2(1-24)Online publication date: 7-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Knowledge Discovery from Data
ACM Transactions on Knowledge Discovery from Data  Volume 13, Issue 1
February 2019
340 pages
ISSN:1556-4681
EISSN:1556-472X
DOI:10.1145/3301280
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 January 2019
Accepted: 01 November 2018
Revised: 01 September 2018
Received: 01 March 2018
Published in TKDD Volume 13, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Anomalous evolutionary behaviors of nodes
  2. assessment
  3. detection
  4. perturbation analysis
  5. social network

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Collaborative Research Project (CRP) between Macquarie University and Data61 on dynamic graph mining
  • National Key Research and Development Program of China
  • Program for Changjiang Scholars and Innovative Research Team in University (PCSIRT) of the Ministry of Education, China
  • National Natural Science Foundation of China
  • MQNS
  • MQ EPS

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)39
  • Downloads (Last 6 weeks)3
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Bayesian Graph Local Extrema Convolution with Long-tail Strategy for Misinformation DetectionACM Transactions on Knowledge Discovery from Data10.1145/363940818:4(1-21)Online publication date: 12-Feb-2024
  • (2024)Link prediction method for social networks based on a hierarchical and progressive user interaction matrixKnowledge-Based Systems10.1016/j.knosys.2024.111929297(111929)Online publication date: Aug-2024
  • (2023)Resisting the Edge-Type Disturbance for Link Prediction in Heterogeneous NetworksACM Transactions on Knowledge Discovery from Data10.1145/361409918:2(1-24)Online publication date: 7-Aug-2023
  • (2023)Evaluating Edge Credibility in Evolving Noisy Social NetworksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.322340335:11(11342-11353)Online publication date: 1-Nov-2023
  • (2023)A Comprehensive Survey on Graph Anomaly Detection With Deep LearningIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.311881535:12(12012-12038)Online publication date: 1-Dec-2023
  • (2023)Motif-Level Anomaly Detection in Dynamic GraphsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327273118(2870-2882)Online publication date: 1-Jan-2023
  • (2022)Hybrid Group Anomaly Detection for Sequence Data: Application to Trajectory Data AnalyticsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2021.311406423:7(9346-9357)Online publication date: 1-Jul-2022
  • (2022)ANOM-DGCN: Detection of Anomalies in Dynamic Networks using Deviated Graph Convolution Network2022 International Wireless Communications and Mobile Computing (IWCMC)10.1109/IWCMC55113.2022.9824978(1273-1278)Online publication date: 30-May-2022
  • (2022)Abnormal Behavior Analysis Based on Truth Discovery and Machine Learning2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)10.1109/GCRAIT55928.2022.00026(83-88)Online publication date: Jul-2022
  • (2022)LMTrackerNeurocomputing10.1016/j.neucom.2021.12.026474:C(37-47)Online publication date: 6-May-2022
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media