Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3625007.3627502acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

AD-TIN: Edge Anomaly Detection for Temporal Interaction Networks using Multi-representation Attention

Published: 15 March 2024 Publication History

Abstract

Anomaly detection in temporal interaction networks (TINs) has become critical in network security, digital finance, and social networks. While recent studies based on Graph Neural Networks (GNNs) have yielded promising results, the existing methods are still limited by insufficient labels and noisy data, often ignoring the information filtering for unrelated user interactions. Therefore, this paper proposes a dynamic edge anomaly detection framework, AD-TIN, to address these challenges based on a multi-representation attention mechanism. It encodes graph structural information using a network information propagation module with neighbor sampling and graph diffusion. Furthermore, the network update module combines past node states with current structural features to capture the temporal information in potential user relationships, effectively mitigating the impact of noisy data. Extensive experiments on three real-world datasets demonstrate the robustness and efficacy of AD-TIN in addressing noise and unrelated interactions for edge anomaly detection.

References

[1]
S. Wang and P. S. Yu, "Graph neural networks in anomaly detection," Graph Neural Networks: Foundations, Frontiers, and Applications, pp. 557--578, 2022.
[2]
L. Gutiérrez-Gómez, A. Bovet, and J.-C. Delvenne, "Multi-scale anomaly detection on attributed networks," in Proceedings of the AAAI conference on artificial intelligence, vol. 34, pp. 678--685, 2020.
[3]
I. Souiden, M. N. Omri, and Z. Brahmi, "A survey of outlier detection in high dimensional data streams," Computer Science Review, vol. 44, p. 100463, 2022.
[4]
S. Ranshous, M. Chaudhary, and N. F. Samatova, "Efficient outlier detection in hyperedge streams using minhash and locality-sensitive hashing," in Complex Networks & Their Applications VI: Proceedings of Complex Networks 2017 (The Sixth International Conference on Complex Networks and Their Applications), pp. 105--116, Springer, 2018.
[5]
L. Zheng, Z. Li, J. Li, Z. Li, and J. Gao, "Addgraph: Anomaly detection in dynamic graph using attention-based temporal gcn.," in IJCAI, vol. 3, p. 7, 2019.
[6]
D. Zhu, Y. Ma, and Y. Liu, "A flexible attentive temporal graph networks for anomaly detection in dynamic networks," in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 870--875, IEEE, 2020.
[7]
J. Liu, G. P. Ong, and X. Chen, "Graphsage-based traffic speed forecasting for segment network with sparse data," IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 3, pp. 1755--1766, 2020.
[8]
X. Guo, B. Zhou, and S. Skiena, "Subset node anomaly tracking over large dynamic graphs," in Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 475--485, 2022.
[9]
M. Shao, J. Li, F. Chen, and X. Chen, "An efficient framework for detecting evolving anomalous subgraphs in dynamic networks," in IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 2258--2266, IEEE, 2018.
[10]
Q. Sun, J. Li, H. Peng, J. Wu, Y. Ning, P. S. Yu, and L. He, "Sugar: Subgraph neural network with reinforcement pooling and self-supervised mutual information mechanism," in Proceedings of the Web Conference 2021, pp. 2081--2091, 2021.
[11]
W. Yu, W. Cheng, C. C. Aggarwal, K. Zhang, H. Chen, and W. Wang, "Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks," in Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp. 2672--2681, 2018.
[12]
G. Xue, M. Zhong, J. Li, J. Chen, C. Zhai, and R. Kong, "Dynamic network embedding survey," Neurocomputing, vol. 472, pp. 212--223, 2022.
[13]
L. Ouyang, Y. Zhang, and Y. Wang, "Unified graph embedding-based anomalous edge detection," in 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1--8, IEEE, 2020.
[14]
Y.-Y. Chang, P. Li, R. Sosic, M. Afifi, M. Schweighauser, and J. Leskovec, "F-fade: Frequency factorization for anomaly detection in edge streams," in Proceedings of the 14th ACM International Conference on Web Search and Data Mining, pp. 589--597, 2021.
[15]
C. Liu, L. Sun, X. Ao, J. Feng, Q. He, and H. Yang, "Intention-aware heterogeneous graph attention networks for fraud transactions detection," in Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 3280--3288, 2021.
[16]
Y. Zhang, X. Wang, C. Shi, X. Jiang, and Y. Ye, "Hyperbolic graph attention network," IEEE Transactions on Big Data, vol. 8, no. 6, pp. 1690--1701, 2021.
[17]
Y. Liu, Z. Li, S. Pan, C. Gong, C. Zhou, and G. Karypis, "Anomaly detection on attributed networks via contrastive self-supervised learning," IEEE transactions on neural networks and learning systems, vol. 33, no. 6, pp. 2378--2392, 2021.
[18]
A. Grover and J. Leskovec, "node2vec: Scalable feature learning for networks," in Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 855--864, 2016.
[19]
S. Ji, S. Pan, E. Cambria, P. Marttinen, and S. Y. Philip, "A survey on knowledge graphs: Representation, acquisition, and applications," IEEE transactions on neural networks and learning systems, vol. 33, no. 2, pp. 494--514, 2021.
[20]
T. Opsahl and P. Panzarasa, "Clustering in weighted networks," Social networks, vol. 31, no. 2, pp. 155--163, 2009.
[21]
M. De Choudhury, H. Sundaram, A. John, and D. D. Seligmann, "Social synchrony: Predicting mimicry of user actions in online social media," in 2009 International conference on computational science and engineering, vol. 4, pp. 151--158, IEEE, 2009.
[22]
R. A. Rossi and N. K. Ahmed, "The network data repository with interactive graph analytics and visualization," in AAAI, 2015.
[23]
S. Ranshous, S. Harenberg, K. Sharma, and N. F. Samatova, "A scalable approach for outlier detection in edge streams using sketch-based approximations," in Proceedings of the 2016 SIAM international conference on data mining, pp. 189--197, SIAM, 2016.
[24]
L. Cai, Z. Chen, C. Luo, J. Gui, J. Ni, D. Li, and H. Chen, "Structural temporal graph neural networks for anomaly detection in dynamic graphs," in Proceedings of the 30th ACM international conference on Information & Knowledge Management, pp. 3747--3756, 2021.

Index Terms

  1. AD-TIN: Edge Anomaly Detection for Temporal Interaction Networks using Multi-representation Attention
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASONAM '23: Proceedings of the 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
      November 2023
      835 pages
      ISBN:9798400704093
      DOI:10.1145/3625007
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 March 2024

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. anomaly detection
      2. temporal interaction network
      3. attention mechanism
      4. graph diffusion

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ASONAM '23
      Sponsor:

      Acceptance Rates

      ASONAM '23 Paper Acceptance Rate 53 of 145 submissions, 37%;
      Overall Acceptance Rate 116 of 549 submissions, 21%

      Upcoming Conference

      KDD '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 76
        Total Downloads
      • Downloads (Last 12 months)76
      • Downloads (Last 6 weeks)15
      Reflects downloads up to 25 Feb 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media