Skip to main content

A Pilot Study and Survey on Methods for Anomaly Detection in Online Social Networks

  • Conference paper
  • First Online:
Human-Centric Smart Computing

Abstract

An anomaly in online social networks is an unusual occurrence that deviates greatly from the standard. Financial fraud, social spam, and network intrusion can all be prevented with anomaly detection, which is designed to find this infrequent observational data. Anomaly detection on social media is crucial for preventing hostile actions like bullying, the spread of fraud information, etc. New forms of aberrant behavior have come to the forefront due to the increasing popularity of social media, creating alarm among a variety of groups. While classic anomaly detection problems have received a lot of attention, we have noticed a rise in research attention in the emerging area of social media anomaly detection. We classify anomalies as static versus dynamic, attributed versus unattributed, and investigate methods for identifying various forms of anomalies. We also analyze the benefits and disadvantages of various methodologies in each category, as well as the problems that this study area presents. Finally, we present challenges for detecting graph anomalies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Rasool, M., Khan, W.: Big data: study in structured and unstructured data

    Google Scholar 

  2. Yokotani, K., Takano, M.: Predicting cyber offenders and victims and their offense and damage time from routine chat times and online social network activities. Comput. Human Behav. 128, 107099 (2022)

    Article  Google Scholar 

  3. Wanda, P.: Modern privacy-preserving and security schemes in social networks: a review. Int. J. Inf. Comput. 3(2), 23–40 (2022)

    Google Scholar 

  4. Wu, H., Zhou, J., Tian, J., Liu, J., Qiao, Y.: Robust image forgery detection against transmission over online social networks. IEEE Trans. Inf. Forensics Secur. (2022)

    Google Scholar 

  5. Khan, A.N., Fan, M.Y., Nazeer, M.I., Memon, R.A., Malik, A., Husain, M.A.: An efficient separable reversible data hiding using paillier cryptosystem for preserving privacy in cloud domain. Electronics 8(6), 682 (2019)

    Article  Google Scholar 

  6. Khan, A.N., Fan, M.Y., Malik, A., Memon, R.A.: Learning from privacy preserved encrypted data on cloud through supervised and unsupervised machine learning. In: 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), pp. 1–5 (2019)

    Google Scholar 

  7. Khan, A.N., Nazarian, H., Golilarz, N.A., Addeh, A., Li, J.P., Khan, G.A.: Brain tumor classification using efficient deep features of MRI scans and support vector machine. In: 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 314–318 (2020)

    Google Scholar 

  8. Khan, A.N., Fan, M.Y., Malik, A., Husain, M.A.: Advancements in reversible data hiding in encrypted images using public key cryptography. In: 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT), pp. 224–229 (2019)

    Google Scholar 

  9. Kundra, H., Khan, W., Malik, M., Rane, K.P., Neware, R., Jain, V.: Quantum-inspired firefly algorithm integrated with cuckoo search for optimal path planning. Int. J. Mod. Phys. C 33(02), 2250018 (2022)

    Article  MathSciNet  Google Scholar 

  10. Brandes, U., Robins, G., Anif, A.M., Wasserman, S.: What is network science? Netw. Sci. 1(1), 1–15 (2013). https://doi.org/10.1017/nws.2013.2

    Article  Google Scholar 

  11. Sensarma, D., Sen Sarma, S.: A survey on different graph based anomaly detection techniques. Indian J. Sci. Technol. 8(31) (2015). https://doi.org/10.17485/ijst/2015/v8i31/75197

  12. Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Philip, S.Y.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Networks Learn. Syst. 32(1), 4–24 (2020)

    Article  MathSciNet  Google Scholar 

  13. Hamilton, W.L., Ying, R., Leskovec, J.: Representation learning on graphs: methods and applications. arXiv Prepr. arXiv1709.05584 (2017)

    Google Scholar 

  14. Karataş, A., Şahin, S.: A review on social bot detection techniques and research directions. In: Proceedings International Security and Cryptology Conference Turkey, pp. 156–161 (2017)

    Google Scholar 

  15. Rossetti, G., Cazabet, R.: Community discovery in dynamic networks: a survey. ACM Comput. Surv. 51(2), 1–37 (2018)

    Article  Google Scholar 

  16. Xu, T. et al.: Deep entity classification: abusive account detection for online social networks (2021)

    Google Scholar 

  17. Rida, A.A., Amhaz, R., Parrend, P.: Anomaly detection on static and dynamic graphs using graph convolutional neural networks. In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 227–248. Springer (2022)

    Google Scholar 

  18. Saranya, S., Rajalakshmi, M.: Certain strategic study on machine learning-based graph anomaly detection. In: Mobile Computing and Sustainable Informatics, pp. 65–94. Springer (2022)

    Google Scholar 

  19. Khan, W., Haroon, M.: An exhaustive review on state-of-the-art techniques for anomaly detection on attributed networks (2021). [Online]. Available: https://turcomat.org/index.php/turkbilmat/article/view/5537/4640

  20. Akoglu, L., McGlohon, M., Faloutsos, C.: Oddball: spotting anomalies in weighted graphs. In: Pacific–Asia Conference on Knowledge Discovery and Data Mining, pp. 410–421 (2010)

    Google Scholar 

  21. Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Networks 51(12), 3448–3470 (2007)

    Article  Google Scholar 

  22. Hassanzadeh, R., Nayak, R., Stebila, D.: Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. In: Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence Lecture Notes in Bioinformatics), vol. 7651 LNCS, pp. 624–630 (2012). https://doi.org/10.1007/978-3-642-35063-4_45

  23. Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701–710 (2014)

    Google Scholar 

  24. Jie, F., Wang, C., Chen, F., Li, L., Wu, X.: Block-structured optimization for anomalous pattern detection in interdependent networks. In: 2019 IEEE International Conference on Data Mining (ICDM), pp. 1138–1143 (2019)

    Google Scholar 

  25. Liao, L., He, X., Zhang, H., Chua, T.-S.: Attributed social network embedding. IEEE Trans. Knowl. Data Eng. 30(12), 2257–2270 (2018)

    Article  Google Scholar 

  26. Ghoshal, A.K., Das, N., Das, S.: A fast community-based approach for discovering anomalies in evolutionary networks. In: 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 455–463 (2022)

    Google Scholar 

  27. Gao, J., Liang, F., Fan, W., Wang, C., Sun, Y., Han, J.: On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 813–822 (2010)

    Google Scholar 

  28. An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2(1), 1–18 (2015)

    Google Scholar 

  29. Liu, N., Huang, X., Hu, X.: Accelerated local anomaly detection via resolving attributed networks. IJCAI 2337–2343 (2017)

    Google Scholar 

  30. Wang, S., Yu, P.S.: Graph neural networks in anomaly detection. In: Graph Neural Networks: Foundations, Frontiers, and Applications, pp. 557–578. Springer (2022)

    Google Scholar 

  31. Ding, K., Li, J., Bhanushali, R., Liu, H.: Deep anomaly detection on attributed networks. In: Proceedings of the 2019 SIAM International Conference on Data Mining, pp. 594–602 (2019)

    Google Scholar 

  32. Li, Y., Huang, X., Li, J., Du, M., Zou, N.: SpeCAE: spectral autoencoder for anomaly detection in attributed networks. In: International Conference on Information and Knowledge Management—Proceedings, pp. 2233–2236 (2019). https://doi.org/10.1145/3357384.3358074

  33. Zhang, S., Yin, H., Chen, T., Hung, Q.V.N., Huang, Z., Cui, L.: GCN-based user representation learning for unifying robust recommendation and fraudster detection. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 689–698 (2020)

    Google Scholar 

  34. Deng, L., Lian, D., Huang, Z., Chen, E.: Graph convolutional adversarial networks for spatiotemporal anomaly detection. IEEE Trans. Neural Networks Learn. Syst. (2022)

    Google Scholar 

  35. Ji, T., Yang, D., Gao, J.: Incremental local evolutionary outlier detection for dynamic social networks. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 1–15 (2013)

    Google Scholar 

  36. Chen, Z., et al.: Discovery of extreme events-related communities in contrasting groups of physical system networks. Data Min. Knowl. Discov. 27(2), 225–258 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  37. Yu, W., Cheng, W., Aggarwal, C.C., Zhang, K., Chen, H., Wang, W.: Netwalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2672–2681 (2018)

    Google Scholar 

  38. Hou, C., Zhang, H., Tang, K., He, S.: DynWalks: global topology and recent changes awareness dynamic network embedding. arXiv Prepr. arXiv1907.11968 (2019)

    Google Scholar 

  39. Seo, Y., Defferrard, M., Vandergheynst, P., Bresson, X.: Structured sequence modeling with graph convolutional recurrent networks. In: International Conference on Neural Information Processing, pp. 362–373 (2018)

    Google Scholar 

  40. Zheng, P., Yuan, S., Wu, X., Li, J., Lu, A.: One-class adversarial nets for fraud detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33(01), pp. 1286–1293 (2019)

    Google Scholar 

  41. Jabbar, A., Li, X., Omar, B.: A survey on generative adversarial networks: variants, applications, and training. ACM Comput. Surv. 54(8), 1–49 (2021)

    Article  Google Scholar 

  42. Sharma, V., Kumar, R., Cheng, W.-H., Atiquzzaman, M., Srinivasan, K., Zomaya, A.Y.: NHAD: neuro-fuzzy based horizontal anomaly detection in online social networks. IEEE Trans. Knowl. Data Eng. 30(11), 2171–2184 (2018)

    Google Scholar 

  43. Tan, L., Pham, T., Ho, H.K.E.I., Kok, T.A.N.S.: Event prediction in online social networks. J. Data Intell. 2(1), 64–94 (2021)

    Article  Google Scholar 

  44. Längkvist, M., Karlsson, L., Loutfi, A.: A review of unsupervised feature learning and deep learning for time-series modeling. Pattern Recognit. Lett. 42, 11–24 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This work is acknowledged under Integral University manuscript No. IU/R&D/2022-MCN0001490

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wasim Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khan, W., Haroon, M. (2023). A Pilot Study and Survey on Methods for Anomaly Detection in Online Social Networks. In: Bhattacharyya, S., Banerjee, J.S., Köppen, M. (eds) Human-Centric Smart Computing. Smart Innovation, Systems and Technologies, vol 316. Springer, Singapore. https://doi.org/10.1007/978-981-19-5403-0_10

Download citation

Publish with us

Policies and ethics