Abstract
An anomaly in online social networks is an unusual occurrence that deviates greatly from the standard. Financial fraud, social spam, and network intrusion can all be prevented with anomaly detection, which is designed to find this infrequent observational data. Anomaly detection on social media is crucial for preventing hostile actions like bullying, the spread of fraud information, etc. New forms of aberrant behavior have come to the forefront due to the increasing popularity of social media, creating alarm among a variety of groups. While classic anomaly detection problems have received a lot of attention, we have noticed a rise in research attention in the emerging area of social media anomaly detection. We classify anomalies as static versus dynamic, attributed versus unattributed, and investigate methods for identifying various forms of anomalies. We also analyze the benefits and disadvantages of various methodologies in each category, as well as the problems that this study area presents. Finally, we present challenges for detecting graph anomalies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rasool, M., Khan, W.: Big data: study in structured and unstructured data
Yokotani, K., Takano, M.: Predicting cyber offenders and victims and their offense and damage time from routine chat times and online social network activities. Comput. Human Behav. 128, 107099 (2022)
Wanda, P.: Modern privacy-preserving and security schemes in social networks: a review. Int. J. Inf. Comput. 3(2), 23–40 (2022)
Wu, H., Zhou, J., Tian, J., Liu, J., Qiao, Y.: Robust image forgery detection against transmission over online social networks. IEEE Trans. Inf. Forensics Secur. (2022)
Khan, A.N., Fan, M.Y., Nazeer, M.I., Memon, R.A., Malik, A., Husain, M.A.: An efficient separable reversible data hiding using paillier cryptosystem for preserving privacy in cloud domain. Electronics 8(6), 682 (2019)
Khan, A.N., Fan, M.Y., Malik, A., Memon, R.A.: Learning from privacy preserved encrypted data on cloud through supervised and unsupervised machine learning. In: 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), pp. 1–5 (2019)
Khan, A.N., Nazarian, H., Golilarz, N.A., Addeh, A., Li, J.P., Khan, G.A.: Brain tumor classification using efficient deep features of MRI scans and support vector machine. In: 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 314–318 (2020)
Khan, A.N., Fan, M.Y., Malik, A., Husain, M.A.: Advancements in reversible data hiding in encrypted images using public key cryptography. In: 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT), pp. 224–229 (2019)
Kundra, H., Khan, W., Malik, M., Rane, K.P., Neware, R., Jain, V.: Quantum-inspired firefly algorithm integrated with cuckoo search for optimal path planning. Int. J. Mod. Phys. C 33(02), 2250018 (2022)
Brandes, U., Robins, G., Anif, A.M., Wasserman, S.: What is network science? Netw. Sci. 1(1), 1–15 (2013). https://doi.org/10.1017/nws.2013.2
Sensarma, D., Sen Sarma, S.: A survey on different graph based anomaly detection techniques. Indian J. Sci. Technol. 8(31) (2015). https://doi.org/10.17485/ijst/2015/v8i31/75197
Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Philip, S.Y.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Networks Learn. Syst. 32(1), 4–24 (2020)
Hamilton, W.L., Ying, R., Leskovec, J.: Representation learning on graphs: methods and applications. arXiv Prepr. arXiv1709.05584 (2017)
Karataş, A., Şahin, S.: A review on social bot detection techniques and research directions. In: Proceedings International Security and Cryptology Conference Turkey, pp. 156–161 (2017)
Rossetti, G., Cazabet, R.: Community discovery in dynamic networks: a survey. ACM Comput. Surv. 51(2), 1–37 (2018)
Xu, T. et al.: Deep entity classification: abusive account detection for online social networks (2021)
Rida, A.A., Amhaz, R., Parrend, P.: Anomaly detection on static and dynamic graphs using graph convolutional neural networks. In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 227–248. Springer (2022)
Saranya, S., Rajalakshmi, M.: Certain strategic study on machine learning-based graph anomaly detection. In: Mobile Computing and Sustainable Informatics, pp. 65–94. Springer (2022)
Khan, W., Haroon, M.: An exhaustive review on state-of-the-art techniques for anomaly detection on attributed networks (2021). [Online]. Available: https://turcomat.org/index.php/turkbilmat/article/view/5537/4640
Akoglu, L., McGlohon, M., Faloutsos, C.: Oddball: spotting anomalies in weighted graphs. In: Pacific–Asia Conference on Knowledge Discovery and Data Mining, pp. 410–421 (2010)
Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Networks 51(12), 3448–3470 (2007)
Hassanzadeh, R., Nayak, R., Stebila, D.: Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. In: Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence Lecture Notes in Bioinformatics), vol. 7651 LNCS, pp. 624–630 (2012). https://doi.org/10.1007/978-3-642-35063-4_45
Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701–710 (2014)
Jie, F., Wang, C., Chen, F., Li, L., Wu, X.: Block-structured optimization for anomalous pattern detection in interdependent networks. In: 2019 IEEE International Conference on Data Mining (ICDM), pp. 1138–1143 (2019)
Liao, L., He, X., Zhang, H., Chua, T.-S.: Attributed social network embedding. IEEE Trans. Knowl. Data Eng. 30(12), 2257–2270 (2018)
Ghoshal, A.K., Das, N., Das, S.: A fast community-based approach for discovering anomalies in evolutionary networks. In: 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 455–463 (2022)
Gao, J., Liang, F., Fan, W., Wang, C., Sun, Y., Han, J.: On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 813–822 (2010)
An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2(1), 1–18 (2015)
Liu, N., Huang, X., Hu, X.: Accelerated local anomaly detection via resolving attributed networks. IJCAI 2337–2343 (2017)
Wang, S., Yu, P.S.: Graph neural networks in anomaly detection. In: Graph Neural Networks: Foundations, Frontiers, and Applications, pp. 557–578. Springer (2022)
Ding, K., Li, J., Bhanushali, R., Liu, H.: Deep anomaly detection on attributed networks. In: Proceedings of the 2019 SIAM International Conference on Data Mining, pp. 594–602 (2019)
Li, Y., Huang, X., Li, J., Du, M., Zou, N.: SpeCAE: spectral autoencoder for anomaly detection in attributed networks. In: International Conference on Information and Knowledge Management—Proceedings, pp. 2233–2236 (2019). https://doi.org/10.1145/3357384.3358074
Zhang, S., Yin, H., Chen, T., Hung, Q.V.N., Huang, Z., Cui, L.: GCN-based user representation learning for unifying robust recommendation and fraudster detection. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 689–698 (2020)
Deng, L., Lian, D., Huang, Z., Chen, E.: Graph convolutional adversarial networks for spatiotemporal anomaly detection. IEEE Trans. Neural Networks Learn. Syst. (2022)
Ji, T., Yang, D., Gao, J.: Incremental local evolutionary outlier detection for dynamic social networks. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 1–15 (2013)
Chen, Z., et al.: Discovery of extreme events-related communities in contrasting groups of physical system networks. Data Min. Knowl. Discov. 27(2), 225–258 (2013)
Yu, W., Cheng, W., Aggarwal, C.C., Zhang, K., Chen, H., Wang, W.: Netwalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2672–2681 (2018)
Hou, C., Zhang, H., Tang, K., He, S.: DynWalks: global topology and recent changes awareness dynamic network embedding. arXiv Prepr. arXiv1907.11968 (2019)
Seo, Y., Defferrard, M., Vandergheynst, P., Bresson, X.: Structured sequence modeling with graph convolutional recurrent networks. In: International Conference on Neural Information Processing, pp. 362–373 (2018)
Zheng, P., Yuan, S., Wu, X., Li, J., Lu, A.: One-class adversarial nets for fraud detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33(01), pp. 1286–1293 (2019)
Jabbar, A., Li, X., Omar, B.: A survey on generative adversarial networks: variants, applications, and training. ACM Comput. Surv. 54(8), 1–49 (2021)
Sharma, V., Kumar, R., Cheng, W.-H., Atiquzzaman, M., Srinivasan, K., Zomaya, A.Y.: NHAD: neuro-fuzzy based horizontal anomaly detection in online social networks. IEEE Trans. Knowl. Data Eng. 30(11), 2171–2184 (2018)
Tan, L., Pham, T., Ho, H.K.E.I., Kok, T.A.N.S.: Event prediction in online social networks. J. Data Intell. 2(1), 64–94 (2021)
Längkvist, M., Karlsson, L., Loutfi, A.: A review of unsupervised feature learning and deep learning for time-series modeling. Pattern Recognit. Lett. 42, 11–24 (2014)
Acknowledgements
This work is acknowledged under Integral University manuscript No. IU/R&D/2022-MCN0001490
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khan, W., Haroon, M. (2023). A Pilot Study and Survey on Methods for Anomaly Detection in Online Social Networks. In: Bhattacharyya, S., Banerjee, J.S., Köppen, M. (eds) Human-Centric Smart Computing. Smart Innovation, Systems and Technologies, vol 316. Springer, Singapore. https://doi.org/10.1007/978-981-19-5403-0_10
Download citation
DOI: https://doi.org/10.1007/978-981-19-5403-0_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-5402-3
Online ISBN: 978-981-19-5403-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)