Research Article | Open Access | Download PDF
Volume 47 | Number 1 | Year 2017 | Article Id. IJCTT-V47P116 | DOI : https://doi.org/10.14445/22312803/IJCTT-V47P116
Review of different types of Anomalies and Anomaly detection techniques in Social Networks based on Graphs
Sarbjeet kaur, Prabhjot Kaur
Citation :
Sarbjeet kaur, Prabhjot Kaur, "Review of different types of Anomalies and Anomaly detection techniques in Social Networks based on Graphs," International Journal of Computer Trends and Technology (IJCTT), vol. 47, no. 1, pp. 116-121, 2017. Crossref, https://doi.org/10.14445/22312803/IJCTT-V47P116
Abstract
As today is a trend of social networking to communicate with each other, there is a possibility of anomalous users in online networks to steal other’s personal information etc. It is necessary to understand the behavior of different users to find fake and genuine users from networks. To find anomalies in network we should understand social network analysis, different type of anomalies and different social network metrics. In this paper we have reviewed different type of social network metrics, types of anomalies and anomaly detection techniques based on graphs. This paper will help to understand social networking, social network metrics, anomaly types and anomaly detection techniques to find anomalous users from online social networks.
Keywords
Anomaly, Anomaly detection, Metrics.
References
1. G. E. Hinton and S. T. Roweis,” Stochastic neighbor embedding”, 2002, NIPS
2. J. Huang, H. Sun, J. Han, H. Deng, Y. Sun, and Y. Liu,” SHRINK: a structural clustering algorithm for detecting hierarchical communities in networks”, 2010, CIKM
3. G. Karypis and V. Kumar,” A fast and high quality multilevel scheme for partitioning irregular graphs”, 1998, SIAM J. Sci. Comput., 20(1):359–392.
4. A. Lancichinetti, S. Fortunato, and F. Radicchi,” Benchmark graphs for testing community detection algorithms”, 2008, Phys. Rev. E, 78(4):046110
5. T. Lou and J. Tang,” Mining structural hole spanners through information diffusion in social networks”, 2013, WWW
6. A. Agovic, A. Banerjee, A. R. Ganguly, and V. Protopopescu,” Anomaly detection using manifold embedding and its applications in transportation corridors”, 2009, Intelligent Data Anal., 13(3):435–455,
7. L. Akoglu, H. Tong, and D. Koutra,” Graph based anomaly detection and description: a survey”, 2015, Data Min. Knowl. Discov., 29(3):626–688
8. L. Armijo,” Minimization of functions having lipschitz continuous first partial derivatives”, 1966, Pacific J. Math, 16(1):1–3,
9. P. Bogdanov, C. Faloutsos, M. Mongiovi, E. E. Papalexakis, R. Ranca, and A. K. Singh,” Netspot: Spotting significant anomalous regions on dynamic networks”, 2013, SDM
10. Hodge, Victoria J., and Jim Austin. "A survey of outlier detection methodologies." Artificial Intelligence Review 22.2 (2004): 85-126.
11. Ravneet kaur, Sarbjeet singh,” A survey of data mining”, Egyptian Informatics Journal(2016)17,199-216.