Affiliation:
1. National University of Singapore, Singapore
2. Carnegie Mellon University, Pittsburgh, PA, United States
3. KAIST, Yuseong-gu, Daejeon, Republic of Korea
Abstract
Given a stream of graph edges from a dynamic graph, how can we assign anomaly scores to edges in an online manner, for the purpose of detecting unusual behavior, using constant time and memory? Existing approaches aim to detect
individually surprising
edges.
In this work, we propose
Midas
, which focuses on detecting
microcluster anomalies
, or suddenly arriving groups of suspiciously similar edges, such as lockstep behavior, including denial of service attacks in network traffic data. We further propose
Midas
-F, to solve the problem by which anomalies are incorporated into the algorithm’s internal states, creating a “poisoning” effect that can allow future anomalies to slip through undetected.
Midas
-F introduces two modifications: (1) we modify the anomaly scoring function, aiming to reduce the “poisoning” effect of newly arriving edges; (2) we introduce a conditional merge step, which updates the algorithm’s data structures after each time tick, but only if the anomaly score is below a threshold value, also to reduce the “poisoning” effect. Experiments show that
Midas
-F has significantly higher accuracy than
Midas
.
In general, the algorithms proposed in this work have the following properties: (a) they detects microcluster anomalies while providing theoretical guarantees about the false positive probability; (b) they are online, thus processing each edge in constant time and constant memory, and also processes the data orders-of-magnitude faster than state-of-the-art approaches; and (c) they provides up to 62% higher area under the receiver operating characteristic curve than state-of-the-art approaches.
Publisher
Association for Computing Machinery (ACM)
Reference49 articles.
1. Charu C. Aggarwal, Yuchen Zhao, and Philip S. Yu. 2010. On clustering graph streams. In SDM.
2. Charu C. Aggarwal, Yuchen Zhao, and Philip S. Yu. 2011. Outlier detection in graph streams. In ICDE.
3. Leman Akoglu, Mary McGlohon, and Christos Faloutsos. 2010. Oddball: Spotting anomalies in weighted graphs. In PAKDD.
4. Graph based anomaly detection and description: a survey
5. An Effective Minimal Probing Approach With Micro-Cluster for Distance-Based Outlier Detection in Data Streams
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献