ABSTRACT
In the era of big data, massive data has been accumulated in integrated application platform of traffic management of public security. Prevention of information leakage becomes an essential task for data security and privacy protection. This work formulates the detection of suspicious accounts involving in abnormal query behaviors as an anomaly detection problem in weighted bipartite graph. Outlier scores of two different anomaly detection approaches are computed, and the suspicion of each user account is combined by bagging with breadth-first search scheme. Experimental result on real dataset is given, demonstrating the effectiveness of our proposed anomaly detection approaches and enhancement of bagging.
- Jin, Y., Qiu, C., Sun, L., Peng, X., and Zhou, J. Sept 2017. Anomaly detection in time series via robust PCA," in 2017 2nd IEEE International Conference on Intelligent Transportation Engineering (ICITE), pp. 352--355.Google Scholar
- Leman Akoglu, Mary McGlohon, and Christos Faloutsos, "Oddball: Spotting anomalies in weighted graphs," in Advances in Knowledge Discovery and Data Mining, Berlin, Heidelberg, 2010, pp. 410--421, Springer Berlin Heidelberg. Google ScholarDigital Library
- Markus Breunig, Hans-Peter Kriegel, Raymond T. Ng, and Jrg Sander, "LOF: Identifying density-based local outliers," in PROCEEDINGS OF THE 2000 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA. 2000, pp. 93--104, ACM. Google ScholarDigital Library
- Aleksandar Lazarevic and Vipin Kumar, "Feature bagging for outlier detection," in Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, 2005, KDD '05, pp. 157--166. Google ScholarDigital Library
- Kullback, S. 1987. Letter to the Editor: The Kullback-Leibler distance. The American Statistician. 41 (4): 340--341. JSTOR 2684769.Google Scholar
- Endres, D. M. and Schindelin, J. E. 2003. A new metric for probability distributions. IEEE Trans. Inf. Theory. 49 (7): 1858--1860. Google ScholarDigital Library
- Elizaveta Levina and Peter Bickel. 2001. The EarthMover's Distance is the Mallows Distance: Some Insights from Statistics. Proceedings of ICCV 2001. Vancouver, Canada: 251--256.Google Scholar
- Matei Zaharia, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica, Spark: Cluster computing with working sets. in Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, 2010. Google ScholarDigital Library
Index Terms
- Detection of Abnormal Database Queries in Weighted Bipartite Graph
Recommendations
Inductive conformal anomaly detection for sequential detection of anomalous sub-trajectories
Detection of anomalous trajectories is an important problem for which many algorithms based on learning of normal trajectory patterns have been proposed. Yet, these algorithms are typically designed for offline anomaly detection in databases and are ...
Workload-aware anomaly detection for Web applications
We online train and recognize workload patterns with incremental clustering.We detect anomalies in a recognized workload pattern to improve detection accuracy.We employ LOF to detect anomalies and t-test to locate anomalous metrics.We validate our ...
A procedure for anomaly detection and analysis
AbstractAnomaly detection is often used to identify and remove outliers in datasets. However, detecting and analyzing the pattern of outliers can contribute to future business decisions or increase the accuracy of a learning algorithm. ...
Comments