Visible to the public Context-aware graph-based analysis for detecting anomalous activities

TitleContext-aware graph-based analysis for detecting anomalous activities
Publication TypeConference Paper
Year of Publication2017
AuthorsBhattacharjee, S. Das, Yuan, J., Jiaqi, Z., Tan, Y. P.
Conference Name2017 IEEE International Conference on Multimedia and Expo (ICME)
Date Publishedjul
ISBN Number978-1-5090-6067-2
Keywordsactivity recognition, anomalous activity detection, anomalous user activity identification, anomaly detection, anomaly localization, anomaly occurrence, Collaboration, Complexity theory, context-aware graph-based analysis, context-dependent anomaly type, Data analysis, Electronic mail, exhaustive identification, gesture recognition, graph analysis, graph theory, Human Behavior, human factors, insider threat, insider threats, maximum flow algorithm, Metrics, multimodal resources, optimisation, Optimization, Organizations, policy-based governance, pubcrawl, query-adaptive graph-based optimization approach, reliability, Resiliency, Support vector machines, time-dependent data, ubiquitous computing, user model mutual similarity, user profile analysis
Abstract

This paper proposes a context-aware, graph-based approach for identifying anomalous user activities via user profile analysis, which obtains a group of users maximally similar among themselves as well as to the query during test time. The main challenges for the anomaly detection task are: (1) rare occurrences of anomalies making it difficult for exhaustive identification with reasonable false-alarm rate, and (2) continuously evolving new context-dependent anomaly types making it difficult to synthesize the activities apriori. Our proposed query-adaptive graph-based optimization approach, solvable using maximum flow algorithm, is designed to fully utilize both mutual similarities among the user models and their respective similarities with the query to shortlist the user profiles for a more reliable aggregated detection. Each user activity is represented using inputs from several multi-modal resources, which helps to localize anomalies from time-dependent data efficiently. Experiments on public datasets of insider threats and gesture recognition show impressive results.

URLhttps://ieeexplore.ieee.org/document/8019421/
DOI10.1109/ICME.2017.8019421
Citation Keybhattacharjee_context-aware_2017