skip to main content
10.1145/3297730.3297735acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdetConference Proceedingsconference-collections
research-article

Detection of Abnormal Database Queries in Weighted Bipartite Graph

Authors Info & Claims
Published:25 August 2018Publication History

ABSTRACT

In the era of big data, massive data has been accumulated in integrated application platform of traffic management of public security. Prevention of information leakage becomes an essential task for data security and privacy protection. This work formulates the detection of suspicious accounts involving in abnormal query behaviors as an anomaly detection problem in weighted bipartite graph. Outlier scores of two different anomaly detection approaches are computed, and the suspicion of each user account is combined by bagging with breadth-first search scheme. Experimental result on real dataset is given, demonstrating the effectiveness of our proposed anomaly detection approaches and enhancement of bagging.

References

  1. Jin, Y., Qiu, C., Sun, L., Peng, X., and Zhou, J. Sept 2017. Anomaly detection in time series via robust PCA," in 2017 2nd IEEE International Conference on Intelligent Transportation Engineering (ICITE), pp. 352--355.Google ScholarGoogle Scholar
  2. Leman Akoglu, Mary McGlohon, and Christos Faloutsos, "Oddball: Spotting anomalies in weighted graphs," in Advances in Knowledge Discovery and Data Mining, Berlin, Heidelberg, 2010, pp. 410--421, Springer Berlin Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Markus Breunig, Hans-Peter Kriegel, Raymond T. Ng, and Jrg Sander, "LOF: Identifying density-based local outliers," in PROCEEDINGS OF THE 2000 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA. 2000, pp. 93--104, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Aleksandar Lazarevic and Vipin Kumar, "Feature bagging for outlier detection," in Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, 2005, KDD '05, pp. 157--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Kullback, S. 1987. Letter to the Editor: The Kullback-Leibler distance. The American Statistician. 41 (4): 340--341. JSTOR 2684769.Google ScholarGoogle Scholar
  6. Endres, D. M. and Schindelin, J. E. 2003. A new metric for probability distributions. IEEE Trans. Inf. Theory. 49 (7): 1858--1860. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Elizaveta Levina and Peter Bickel. 2001. The EarthMover's Distance is the Mallows Distance: Some Insights from Statistics. Proceedings of ICCV 2001. Vancouver, Canada: 251--256.Google ScholarGoogle Scholar
  8. Matei Zaharia, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica, Spark: Cluster computing with working sets. in Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Detection of Abnormal Database Queries in Weighted Bipartite Graph

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      BDET 2018: Proceedings of the 2018 International Conference on Big Data Engineering and Technology
      August 2018
      106 pages
      ISBN:9781450365826
      DOI:10.1145/3297730

      Copyright © 2018 ACM

      © 2018 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 August 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader