期刊文献+

面向图的异常检测研究综述 被引量:16

Overview on Graph Based Anomaly Detection
下载PDF
导出
摘要 近年来,随着Web 2.0的普及,使用图挖掘技术进行异常检测受到人们越来越多的关注.图异常检测在欺诈检测、入侵检测、虚假投票、僵尸粉丝分析等领域发挥着重要作用.在广泛调研国内外大量文献以及最新科研成果的基础上,按照数据表示形式将面向图的异常检测划分成静态图上的异常检测与动态图上的异常检测两大类,进一步按照异常类型将静态图上的异常分为孤立个体异常和群组异常检测两种类别,动态图上的异常分为孤立个体异常、群体异常以及事件异常这3种类型.对每一类异常检测方法当前的研究进展加以介绍,对每种异常检测算法的基本思想、优缺点进行分析、对比,总结面向图的异常检测的关键技术、常用框架、应用领域、常用数据集以及性能评估方法,并对未来可能的发展趋势进行展望. In recent years,with the popularization of Web 2.0,people pay more and more attentions to the graph anomaly detection.The graph anomaly detection plays an increasingly vital role in the field of fraud detection,intrusion detection,false voting,and zombie fan analysis.This paper presents a survey on existing approaches to address this problem and reviews the recent developed techniques to detect graph anomalies.The graph-oriented anomaly detection is divided into two types,the anomaly detection on static graph and the anomaly detection on dynamic graph.Existing work on static graph anomaly detection have identified two types of anomalies:One is individual anomaly that refers to the abnormal behaviors of individual entity,the other is group anomaly that occurs due to unusual patterns of groups.The anomaly on dynamic graph can be divided into three types:Isolated individual anomaly,group anomaly,and event anomaly.This paper introduces the current research progress of each kind of anomaly detection methods,and summarizes the key technologies,common frameworks,application fields,common data sets,and performance evaluation methods of graph-oriented anomaly detection.Finally,future research directions on graph anomaly detection are discussed.
作者 李忠 靳小龙 庄传志 孙智 LI Zhong;JIN Xiao-Long;ZHUANG Chuan-Zhi;SUN Zhi(Key Laboratory of Network Data Science and Technology(Institute of Computing Technology,Chinese Academy of Sciences),Beijing 100190,China;School of Computer and Control Engineering,University of Chinese Academy of Sciences,Beijing 100049,China)
出处 《软件学报》 EI CSCD 北大核心 2021年第1期167-193,共27页 Journal of Software
基金 国家重点研发计划(2016QY02D0404) 国家自然科学基金(U1911401,61772501,U1836206,91646120)。
关键词 图异常检测 图数据挖掘 数据挖掘 graph anomaly detection graph data mining data mining
  • 相关文献

参考文献11

二级参考文献163

  • 1薛安荣,鞠时光,何伟华,陈伟鹤.局部离群点挖掘算法研究[J].计算机学报,2007,30(8):1455-1463. 被引量:96
  • 2王立才,孟祥武,张玉洁.上下文感知推荐系统.软件学报,2012,23(1):1-20.http://www.jos.org.cn/1000—9825/4100.htm.
  • 3Adomavicius G, Tuzhilin A. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowledge and Data Engineering, 2005,17:734-749. [doi: 10.1109/TKDE.2005.99].
  • 4Ruohomaa S, Kutvonen L. Trust management survey. In: Proe. of the 3rd Int'l Conf. on Trust Management. Berlin: Springer- Verlag, 2005.77-92. [doi: 10.1007/11429760_6].
  • 5Singh S, Bawa S. A privacy, trust and policy based authorization framework for services in distributed environments. Int'l Journal of Computer Science, 2007,2(2):85-92.
  • 6Granovetter M. The strength of weak ties. American Journal of Sociology, 1973,78(6):1360-1380. [doi: 10.2307/202051].
  • 7Gilbert E, Karahalios K. Predicting tie strength with social media. In: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems. New York: ACM Press, 2009. 211-220. [doi: 10.1145/1518701.1518736].
  • 8Xiang R, Neville J, Rogati M. Modeling relationship strength in online social networks. In: Proc. of the 19th Int'l Conf. on World Wide Web. New York: ACM Press, 2010. 981-990. [doi: 10.1145/1772690.1772790].
  • 9Zarghami A, Fazeli S, Dokoohaki N, Matskin M. Social trust-aware recommendation system: A t-index approach. In: Proc. of the 2009 IEEE/WIC/ACM Int'l Joint Conf. on Web Intelligence and Intelligent Agent Technology, Vol.3. Washington: IEEE Computer Society, 2009. 85-90. [doi: 10.1109/WI-IAT.2009.237].
  • 10Jamali M, Ester M. TrustWalker: A random walk model for combining trust-based and item-based recommendation. In: Proc. of the 15th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining. New York: ACM Press, 2009. 397-406. [doi: 10.1145/ 1557019.1557067].

共引文献481

同被引文献134

引证文献16

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部