Stochastic Complexity in Statistical Inquiry Theory
Stochastic Complexity in Statistical Inquiry Theory
IEEE Intelligent Systems
Benchmarking Anomaly-Based Detection Systems
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Information-Theoretic Measures for Anomaly Detection
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Eigenspace-based anomaly detection in computer systems
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Unsupervised anomaly detection in network intrusion detection using clusters
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Relevance search and anomaly detection in bipartite graphs
ACM SIGKDD Explorations Newsletter
Discovering important nodes through graph entropy the case of Enron email database
Proceedings of the 3rd international workshop on Link discovery
GraphScope: parameter-free mining of large time-evolving graphs
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Anomaly detection in data represented as graphs
Intelligent Data Analysis
ACM Computing Surveys (CSUR)
TANGENT: a novel, 'Surprise me', recommendation algorithm
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Graph-based approaches to insider threat detection
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
Finding the k-Most Abnormal Subgraphs from a Single Graph
DS '09 Proceedings of the 12th International Conference on Discovery Science
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Fraud detection in process aware systems
Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web
Adaptive system anomaly prediction for large-scale hosting infrastructures
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Metric forensics: a multi-level approach for mining volatile graphs
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
On community outliers and their efficient detection in information networks
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
An expert system for detecting automobile insurance fraud using social network analysis
Expert Systems with Applications: An International Journal
Personalized privacy protection in social networks
Proceedings of the VLDB Endowment
It's who you know: graph mining using recursive structural features
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Diversified ranking on large graphs: an optimization viewpoint
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Detecting anomalies in graphs with numeric labels
Proceedings of the 20th ACM international conference on Information and knowledge management
Traffic dispersion graph based anomaly detection
Proceedings of the Second Symposium on Information and Communication Technology
OddBall: spotting anomalies in weighted graphs
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
Role-dynamics: fast mining of large dynamic networks
Proceedings of the 21st international conference companion on World Wide Web
SigSpot: mining significant anomalous regions from time-evolving networks (abstract only)
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Non-negative residual matrix factorization: problem definition, fast solutions, and applications
Statistical Analysis and Data Mining
Identifying influential users by their postings in social networks
Proceedings of the 3rd international workshop on Modeling social media
Gateway finder in large graphs: problem definitions and fast solutions
Information Retrieval
Intrusion as (anti)social communication: characterization and detection
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
MultiAspectForensics: mining large heterogeneous networks using tensor
International Journal of Web Engineering and Technology
Anomaly, event, and fraud detection in large network datasets
Proceedings of the sixth ACM international conference on Web search and data mining
Autonomously reviewing and validating the knowledge base of a never-ending learning system
Proceedings of the 22nd international conference on World Wide Web companion
On detecting association-based clique outliers in heterogeneous information networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
A spectral approach to detecting subtle anomalies in graphs
Journal of Intelligent Information Systems
Review: A review of novelty detection
Signal Processing
Visual analysis of large-scale network anomalies
IBM Journal of Research and Development
Hi-index | 0.00 |
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A good deal of research has been performed in this area, often using strings or attribute-value data as the medium from which anomalies are to be extracted. Little work, however, has focused on anomaly detection in graph-based data. In this paper, we introduce two techniques for graph-based anomaly detection. In addition, we introduce a new method for calculating the regularity of a graph, with applications to anomaly detection. We hypothesize that these methods will prove useful both for finding anomalies, and for determining the likelihood of successful anomaly detection within graph-based data. We provide experimental results using both real-world network intrusion data and artificially-created data.