Anomaly Detection using Graph Neural Networks
Title | Anomaly Detection using Graph Neural Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Chaudhary, Anshika, Mittal, Himangi, Arora, Anuja |
Conference Name | 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon) |
Date Published | Feb. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-0211-5 |
Keywords | anomaly detection, Artificial neural networks, classification, clustering, Clustering algorithms, Collaboration, cyber physical systems, Deep Learning, deep neural networks, email network, Enron dataset, Graph Neural Network, graph neural networks, graph structure, graph theory, learning (artificial intelligence), Metrics, neural nets, Neural Network Security, Neural networks, pattern classification, pattern clustering, Peer-to-peer computing, policy-based governance, pubcrawl, Resiliency, security, security of data, social connection graphs, social network, social network statistical measures, social networking (online), statistical analysis, Twitter, Twitter dataset, Twitter network |
Abstract | Conventional methods for anomaly detection include techniques based on clustering, proximity or classification. With the rapidly growing social networks, outliers or anomalies find ingenious ways to obscure themselves in the network and making the conventional techniques inefficient. In this paper, we utilize the ability of Deep Learning over topological characteristics of a social network to detect anomalies in email network and twitter network. We present a model, Graph Neural Network, which is applied on social connection graphs to detect anomalies. The combinations of various social network statistical measures are taken into account to study the graph structure and functioning of the anomalous nodes by employing deep neural networks on it. The hidden layer of the neural network plays an important role in finding the impact of statistical measure combination in anomaly detection. |
URL | https://ieeexplore.ieee.org/document/8862186/ |
DOI | 10.1109/COMITCon.2019.8862186 |
Citation Key | chaudhary_anomaly_2019 |
- security of data
- Neural networks
- pattern classification
- pattern clustering
- Peer-to-peer computing
- policy-based governance
- pubcrawl
- Resiliency
- security
- Neural Network Security
- social connection graphs
- social network
- social network statistical measures
- social networking (online)
- statistical analysis
- Twitter dataset
- Twitter network
- email network
- Artificial Neural Networks
- classification
- clustering
- Clustering algorithms
- collaboration
- cyber physical systems
- deep learning
- deep neural networks
- Anomaly Detection
- Enron dataset
- Graph Neural Network
- graph neural networks
- graph structure
- graph theory
- learning (artificial intelligence)
- Metrics
- neural nets