scholarly journals Many-Objective Optimization for Anomaly Detection on Multi-Layer Complex Interaction Networks

2021 ◽  
Vol 11 (9) ◽  
pp. 4005
Author(s):  
Asep Maulana ◽  
Martin Atzmueller

Anomaly detection in complex networks is an important and challenging task in many application domains. Examples include analysis and sensemaking in human interactions, e.g., in (social) interaction networks, as well as the analysis of the behavior of complex technical and cyber-physical systems such as suspicious transactions/behavior in financial or routing networks; here, behavior and/or interactions typically also occur on different levels and layers. In this paper, we focus on detecting anomalies in such complex networks. In particular, we focus on multi-layer complex networks, where we consider the problem of finding sets of anomalous nodes for group anomaly detection. Our presented method is based on centrality-based many-objective optimization on multi-layer networks. Starting from the Pareto Front obtained via many-objective optimization, we rank anomaly candidates using the centrality information on all layers. This ranking is formalized via a scoring function, which estimates relative deviations of the node centralities, considering the density of the network and its respective layers. In a human-centered approach, anomalous sets of nodes can then be identified. A key feature of this approach is its interpretability and explainability, since we can directly assess anomalous nodes in the context of the network topology. We evaluate the proposed method using different datasets, including both synthetic as well as real-world network data. Our results demonstrate the efficacy of the presented approach.

2017 ◽  
Vol 1 (3) ◽  
pp. 1-19 ◽  
Author(s):  
Hongwei Wang ◽  
Yunlong Gao ◽  
Shaohan Hu ◽  
Shiguang Wang ◽  
Renato Mancuso ◽  
...  

Author(s):  
Ismail Butun ◽  
Patrik Österberg

Interfacing the smart cities with cyber-physical systems (CPSs) improves cyber infrastructures while introducing security vulnerabilities that may lead to severe problems such as system failure, privacy violation, and/or issues related to data integrity if security and privacy are not addressed properly. In order for the CPSs of smart cities to be designed with proactive intelligence against such vulnerabilities, anomaly detection approaches need to be employed. This chapter will provide a brief overview of the security vulnerabilities in CPSs of smart cities. Following a thorough discussion on the applicability of conventional anomaly detection schemes in CPSs of smart cities, possible adoption of distributed anomaly detection systems by CPSs of smart cities will be discussed along with a comprehensive survey of the state of the art. The chapter will discuss challenges in tailoring appropriate anomaly detection schemes for CPSs of smart cities and provide insights into future directions for the researchers working in this field.


2012 ◽  
Vol 15 (supp01) ◽  
pp. 1250061 ◽  
Author(s):  
MURSEL TASGIN ◽  
HALUK O. BINGOL

In this work, we analyze gossip spreading on weighted networks. We try to define a new metric to classify weighted complex networks using our model. The model proposed here is based on the gossip spreading model introduced by Lind et al. on unweighted networks. The new metric is based on gossip spreading activity in the network, which is correlated with both topology and relative edge weights in the network. The model gives more insight about the weight distribution and correlation of topology with edge weights in a network. It also measures how suitable a weighted network is for gossip spreading. We analyze gossip spreading on real weighted networks of human interactions. Six co-occurrence and seven social pattern networks are investigated. Gossip propagation is found to be a good parameter to distinguish co-occurrence and social pattern networks. As a comparison some miscellaneous networks of comparable sizes and computer generated networks based on ER, BA and WS models are also investigated. They are found to be quite different from the human interaction networks.


Sign in / Sign up

Export Citation Format

Share Document