egoDetect: Visual Detection and Exploration of Anomaly in Social Communication Network
Abstract
:1. Introduction
- We provide a novel visualization system for anomaly detection of social communication data, especially the unlabeled data. It combines anomaly detection algorithm with sociological theory, and then uses time sequence together for validation.
- Inspired by the solar system and the social brain hypothesis [5], we design a novel glyph to explore an ego’s topology and the relationship between egos and alters.
- We use a call record data provided by an operator to demonstrate the effectiveness of our system.
2. Related Work
2.1. Anomaly Detection
2.2. Social Network Visualization and Analysis
2.3. Ego Centric Network Visualization and Analysis
3. Problem Description
Problem Description
- P1 Rate Ego’s Anomaly. Traditional anomaly detection only draws a conclusion of whether the point is an anomaly or not. Then here come problems: Are the two anomalous users having the same degree of anomaly? Is there something in common or in a difference of anomalous users. Therefore, we need to quantify a user’s degree of an anomaly and rank the users. Then experts can determine whether the user needs deep analysis.
- P2 Multi-perspectives Analysis. Since we know little about the unlabeled data, it easily leads to different people owning different results. In order to eliminate the influence of subjective factors, we need to design some indicators that can help us dissolve from multiple perspectives, such as the anomaly in the global social network and local topology, the time series of the user and alters anomalies.
- P3 Identify Anomalies. After we quantify the ego’s anomaly from multi-perspectives, the next thing we need to do is to identify the anomalies in the social networks. In our work, we mainly focus on those who have different behaviors from the general public. e.g., the number of contacts exceeds the Dunbar’s number, the topology of the user is strange, or the time series and behavior patterns are different from other people. We need to propose a novel visualization system to reveal the features and patterns of users and validate them, because they are the abstract of all types of social networks and play an important role in depicting the egos’ portraits.
- P4 Generality and Scalability. With the development of social communication, there are many kinds of social ways, such as Email, Twitter, Weibo and so on, which makes the data of them more and more complex and noisy. It is time-consuming and laborious if we design different systems for each type of social communication. Therefore, we want to design a more general model, which can be used in each type of social communication.
- P5 Rich Interaction. The main goal of our system is to help experts find out the anomaly in the social network full of unlabeled data, so it is necessary to have various interactions to help experts exploit the network by a custom way. For example, we need filtering and zooming for finding the ego we are interested in and looking for the detail about the network.
4. Detection in Social Networks
4.1. Data and Model
4.2. Metrics Abstract
4.3. Anomaly Detection
5. System Design and Overview
5.1. System Design
- T1 Revealing Egos’ Features and Patterns. Since the model we use is multidimensional, we need a descending dimension to display the whole egos in the network. We should ensure that the relationship between egos is not lost in dimensionality reduction, which can help us to determine which points of the network are suspected egos.
- T2 Simple and Intuitive. The view should allow researchers to intuitively understand the inside of the network by using the anomaly detection’s results and though it, they can determine the node they want to study in depth is where.
- T3 Showing the Relationship Between Egos and Alters. As discussed above, network topology is very useful for exploring the ego. Therefore, we need to reveal the connection between egos and alters. In this way, experts can make a more in-depth analysis from a sociological perspective.
- T4 Drawing Egos’ Portrait. In addition to showing the relationship between egos and alters, we also need to build a user portrait based on these data to help experts understand the whole network.
- T5 Exploring Time Sequence. Normal egos should have a specific active time, which may vary according to their occupations, but people’s energy is limited, so it should have a hump shape and 0 valued region. Robot accounts and anomalous accounts will show long-term or even full-time behavior, while others may display local and random behaviors.
- T6 Analyzing Alters. The alters are those who egos contact-in or contact-out with. They form the networks of egos. Through the abnormal score of alters, we can judge egos from the other side. Besides, when we find an interesting alter from a mesoscopic perspective and want to dig deeper, or when we want to have a deeper understanding of the ego’s behavior with each alter, it can give us more information.
5.2. Solar Ego Network Model
5.3. System Overview
6. Visualization
6.1. User Interface
6.2. Group View
6.3. Ego View
6.4. Detail View
6.5. User Interactions
7. Case Study
8. Discussion
9. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Eskin, E.; Arnold, A.; Prerau, M.; Portnoy, L.; Stolfo, S. A Geometric Framework for Unsupervised Anomaly Detection; Springer: Boston, MA, USA, 2002. [Google Scholar]
- Steinwart, I.; Hush, D.; Scovel, C. A Classification Framework for Anomaly Detection. J. Mach. Learn. Research. 2005, 6, 211–232. [Google Scholar]
- Chandola, V.; Banerjee, A.; Kumar, V. Anomaly detection: A survey. ACM Comput. Surv. 2009, 41, 1–58. [Google Scholar] [CrossRef]
- Yanhong, W.; Naveen, P.; Jian, Z.; Sixiao, Y.; Guowei, H.; Huamin, Q. egoSlider: Visual Analysis of Egocentric Network Evolution. IEEE Trans. Visual Comput. Graph. 2015, 22, 260–269. [Google Scholar]
- Dunbar, R.I.M. The Social Brain Hypothesis. Evol. Anthropol. Issues News Rev. 1998, 6, 178–190. [Google Scholar] [CrossRef]
- Hill, R.A.; Dunbar, R.I.M. Social network size in humans. Hum. Nat. 2003, 14, 53–72. [Google Scholar] [CrossRef] [PubMed]
- Zhou, W.X.; Sornette, D.; Hill, R.A.; Dunbar, R.I. Discrete hierarchical organization of social group sizes. Proc. Biol. Sci. 2005, 272, 439–444. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Nan, C.; Conglei, S.; Sabrina, L.; Jie, L.; Yu-Ru, L.; Ching-Yung, L. TargetVue: Visual Analysis of Anomalous User Behaviors in Online Communication Systems. IEEE Trans. Vis. Comput. Graph. 2015, 22, 1. [Google Scholar]
- Miao, X.; Liu, K.; He, Y.; Liu, Y.; Papadias, D. Agnostic Diagnosis: Discovering Silent Failures in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2013, 12, 6067–6075. [Google Scholar] [CrossRef] [Green Version]
- Thom, D.; Bosch, H.; Koch, S.; W’Orner, M.; Ertl, T. Spatiotemporal Anomaly Detection through Visual Analysis of Geolocated Twitter Messages. In Proceedings of the 2012 IEEE Pacific Visualization Symposium, Songdo, Korea, 28 February–2 March 2012. [Google Scholar]
- Tao, J.; Lei, S.; Zhou, Z.; Huang, C.; Yu, R.; Su, P.; Wang, C.; Yang, C. Visual Analysis of Collective Anomalies Through High-Order Correlation Graph. In Proceedings of the 2018 IEEE Pacific Visualization Symposium (PacificVis), Kobe, Japan, 10–13 April 2018. [Google Scholar]
- Abbasi, A.; Chung, K.S.K.; Hossain, L. Egocentric analysis of co-authorship network structure, position and performance. Inf. Process. Manag. 2012, 48, 671–679. [Google Scholar] [CrossRef]
- Halgin, D.S.; Borgatti, S.P. An introduction to personal network analysis and tie churn statistics using E-NET. Connections 2012, 32, 37–48. [Google Scholar]
- Jarvenpaa, S.L.; Majchrzak, A. Knowledge Collaboration Among Professionals Protecting National Security: Role of Transactive Memories in Ego-Centered Knowledge Networks. Organ. Sci. 2014, 19, 260–276. [Google Scholar] [CrossRef]
- Jie, Z.; Li, Y.; Liu, R. Social Network Group Identification based on Local Attribute Community Detection. In Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 March 2019; pp. 443–447. [Google Scholar]
- Weixin, L.; Vijay, M.; Nuno, V. Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 36, 18–32. [Google Scholar] [CrossRef] [Green Version]
- Smith, M.A. NodeXL: Simple Network Analysis for Social Media. In Proceedings of the International Conference on Collaboration Technologies and System, San Diego, CA, USA, 20–24 May 2013. [Google Scholar]
- Ghani, N.A.; Hamid, S.; Hashem, I.A.T.; Ahmed, E. Social media big data analytics: A survey. Comput. Hum. Behav. 2019, 101, 417–428. [Google Scholar] [CrossRef]
- Backstrom, L.; Kleinberg, J. Romantic Partnerships and the Dispersion of Social Ties: A Network Analysis of Relationship Status on Facebook. In Proceedings of the 17th ACM Conference on Computer supported Cooperative Work Social Computing; Association for Computing Machinery: New York, NY, USA, 2014. [Google Scholar]
- Phua, C.; Alahakoon, D.; Lee, V. Minority Report in Fraud Detection: Classification of Skewed Data. ACM Sigkdd Explor. Newsl. 2004, 6, 50–59. [Google Scholar] [CrossRef]
- Zhang, K.; Shi, S.; Hong, G.; Li, J. Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
- Qin, Z.; You, Z.; Jin, H.; Gan, X.; Wang, J. Homophily-Driven Evolution Increases the Diffusion Accuracy in Social Networks. IEEE Trans. Netw. Sci. Eng. 2020, 1. [Google Scholar] [CrossRef]
- Portnoy, L.; Eskin, E.; Stolfo, S. Intrusion Detection With Unlabeled Data Using Clustering. In Proceedings of the ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), Philadelphia, PA, USA, 5–8 November 2001. [Google Scholar]
- Fawcett, T.; Provost, F. Activity Monitoring: Noticing interesting changes in behavior. In Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, 15–18 August 1999. [Google Scholar]
- Eskin, E. Modeling system calls for intrusion detection with dynamic window sizes. In Proceedings of the Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX’01, Anaheim, CA, USA, 1–14 June 2001. [Google Scholar]
- Lorrain, F.; White, H.C. Structural Equivalence of Individuals in Social Networks †. Social Netw. 1977, 1, 67–98. [Google Scholar]
- Yan, Q.; Wu, L.; Zheng, L. Social network based microblog user behavior analysis. Phys. Stat. Mech. Appl. 2013, 392, 1712–1723. [Google Scholar] [CrossRef]
- Wei, J.; Bing, B.; Liang, L. Estimating the diffusion models of crisis information in micro blog. J. Inf. 2012, 6, 600–610. [Google Scholar] [CrossRef]
- Gao, J.; Schoenebeck, G.; Yu, F.Y. The Volatility of Weak Ties: Co-Evolution of Selection and Influence in Social Networks. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, Montreal, QC, Canada, 13–17 May 2019. [Google Scholar]
- Papadopoulos, S.; Kompatsiaris, Y.; Vakali, A.; Spyridonos, P. Community detection in Social Media. Data Min. Knowl. Discov. 2012, 24, 515–554. [Google Scholar] [CrossRef]
- Bakshy, E.; Eckles, D.; Yan, R.; Rosenn, I. Social Influence in Social Advertising: Evidence from Field Experiments. In Proceedings of the 13th ACM Conference on Electronic Commerce, Valencia, Spain, 4–8 June 2012. [Google Scholar]
- Jie, T.; Sun, J.; Chi, W.; Zi, Y. Social influence analysis in large-scale networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, Paris, France, 28 June–1 July 2009. [Google Scholar]
- Blondel, V.D.; Decuyper, A.; Krings, G. A survey of results on mobile phone datasets analysis. Epj Data Sci. 2015, 4, 1–55. [Google Scholar] [CrossRef] [Green Version]
- Pizzuti, C. Evolutionary Computation for Community Detection in Networks: A Review. IEEE Trans. Tran. Comput. 2018, 22, 464–483. [Google Scholar] [CrossRef]
- Heer, J.; Boyd, D. Vizster: Visualizing Online Social Networks. In Proceedings of the IEEE Symposium on Information Visualization, Minneapolis, MN, USA, 23–25 October 2005. [Google Scholar]
- Nardi, B.A.; Whittaker, S.; Isaacs, E.; Creech, M.; Johnson, J.; Hainsworth, J. Integrating communication and information through ContactMap. Commun. ACM 2002, 45, 89–95. [Google Scholar] [CrossRef]
- Mutton, P. Inferring and visualizing social networks on Internet chat. In Proceedings of the Eighth International Conference on Information Visualisation, London, UK, 14–16 July 2004. [Google Scholar]
- Xing, H.; Liu, Y.; Gao, J.; Chen, S. Episogram: Visual Summarization of Egocentric Social Interactions. IEEE Comput. Graph. Appl. 2016, 36, 72–81. [Google Scholar]
- Xiong, R.; Donath, J. PeopleGarden: Creating Data Portraits for Users. In Proceedings of the Acm Symposium on User Interface Software & Technology, San Antonio, TX, USA, 28 February–2 March 1999. [Google Scholar]
- Lei, S.; Tong, H.; Jie, T.; Lin, C. Flow-Based Influence Graph Visual Summarization. In Proceedings of the IEEE International Conference on Data Mining, Shenzhen, China, 14–17 December 2014. [Google Scholar]
- Roberts, S.G.B.; Dunbar, R.I.M.; Pollet, T.V.; Kuppens, T. Exploring variation in active network size: Constraints and ego characteristics. Soc. Netw. 2009, 31, 138–146. [Google Scholar] [CrossRef]
- Lubbers, M.J.; Molina, J.L.; Lerner, J.; Brandes, U.; Ávila, J.; Mccarty, C. Longitudinal analysis of personal networks. The case of Argentinean migrants in Spain. Soc. Netw. 2010, 32, 91–104. [Google Scholar] [CrossRef] [Green Version]
- Chen, S.; Chen, S.; Wang, Z.; Liang, J.; Yuan, X.; Cao, N.; Wu, Y. D-Map: Visual analysis of ego-centric information diffusion patterns in social media. In Proceedings of the IEEE Conference on Visual Analytics Science and Technology, Baltimore, MD, USA, 23–28 October 2016. [Google Scholar]
- Lei, S.; Chen, W.; Zhen, W.; Huamin, Q.; Chuang, L.; Qi, L. 1.5D Egocentric Dynamic Network Visualization. IEEE Trans. Vis. Comput. Graph. 2015, 21, 624–637. [Google Scholar]
- Liu, D.; Guo, F.; Deng, B.; Qu, H.; Wu, Y. egoComp: A node-link-based technique for visual comparison of ego-networks. Inf. Vis. 2016, 16, 179–189. [Google Scholar] [CrossRef]
- Liu, Q.; Hu, Y.; Lei, S.; Mu, X.; Jie, T. EgoNetCloud: Event-based egocentric dynamic network visualization. In Proceedings of the IEEE Conference on Visual Analytics Science and Technology, Chicago, IL, USA, 25–30 October 2015. [Google Scholar]
- Wang, Q.; Pu, J.; Guo, Y.; Hu, Z.; Tian, H. egoPortray: Visual Exploration of Mobile Communication Signature from Egocentric Network Perspective. In Proceedings of the International Conference on Multimedia Modeling, Reykjavik, Iceland, 4–6 January 2017. [Google Scholar]
- Breunig, M.M. LOF: Identifying density-based local outliers. In Proceedings of the Acm Sigmod International Conference on Management of Data, Dallas, TX, USA, 16–18 May 2000. [Google Scholar]
- Jenks, G. The Data Model Concept in Statistical Mapping. Int. Yearb. Cartogr. 1967, 7, 186–190. [Google Scholar]
- Jiang, B. Head/Tail Breaks: A New Classification Scheme for Data with a Heavy-Tailed Distribution. Prof. Geogr. 2013, 65, 482–494. [Google Scholar] [CrossRef]
Time | (Total Users) | (Local Users) | (Total Links) |
---|---|---|---|
Jan. | 6520121 | 751643 | 32521180 |
Feb. | 6234877 | 742504 | 27600221 |
Mar. | 6481767 | 783751 | 32720452 |
Apr. | 6526250 | 777486 | 32383231 |
May | 6561107 | 787614 | 34119390 |
Jun. | 6531076 | 787156 | 33461297 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pu, J.; Zhang, J.; Shao, H.; Zhang, T.; Rao, Y. egoDetect: Visual Detection and Exploration of Anomaly in Social Communication Network. Sensors 2020, 20, 5895. https://doi.org/10.3390/s20205895
Pu J, Zhang J, Shao H, Zhang T, Rao Y. egoDetect: Visual Detection and Exploration of Anomaly in Social Communication Network. Sensors. 2020; 20(20):5895. https://doi.org/10.3390/s20205895
Chicago/Turabian StylePu, Jiansu, Jingwen Zhang, Hui Shao, Tingting Zhang, and Yunbo Rao. 2020. "egoDetect: Visual Detection and Exploration of Anomaly in Social Communication Network" Sensors 20, no. 20: 5895. https://doi.org/10.3390/s20205895