Affiliation:
1. Tsinghua University, Beijing, China
2. Carnegie Mellon University, Pittsburgh, PA
Abstract
Given a directed graph of millions of nodes, how can we automatically spot anomalous, suspicious nodes judging only from their connectivity patterns? Suspicious graph patterns show up in many applications, from Twitter users who buy fake followers, manipulating the social network, to botnet members performing distributed denial of service attacks, disturbing the network traffic graph. We propose a fast and effective method, C
atch
S
ync
, which exploits two of the tell-tale signs left in graphs by fraudsters: (a)
synchronized
behavior: suspicious nodes have extremely similar behavior patterns because they are often required to perform some task together (such as follow the same user); and (b)
rare
behavior: their connectivity patterns are very different from the majority. We introduce novel measures to quantify both concepts (“synchronicity” and “normality”) and we propose a parameter-free algorithm that works on the resulting synchronicity-normality plots. Thanks to careful design, C
atch
S
ync
has the following desirable properties: (a) it is
scalable
to large datasets, being linear in the graph size; (b) it is
parameter free
; and (c) it is
side-information-oblivious
: it can operate using only the topology, without needing labeled data, nor timing information, and the like., while still capable of using side information if available. We applied C
atch
S
ync
on three large, real datasets,
1-billion-edge
Twitter social graph,
3-billion-edge,
and
12-billion-edge
Tencent Weibo social graphs, and several synthetic ones; C
atch
S
ync
consistently outperforms existing competitors, both in detection accuracy by 36% on Twitter and 20% on Tencent Weibo, as well as in speed.
Funder
National Natural Science Foundation of China
MDA, Singapore
Army Research Laboratory under Cooperative
U.S. Army Research Office (ARO) and Defense Advanced Research Projects Agency
Facebook Fellowship; and the National Science Foundation Graduate Research Fellowship
International Science and Technology Cooperation Program of China
National Program on Key Basic Research Project
National Science Foundation
Publisher
Association for Computing Machinery (ACM)
Reference41 articles.
1. An Introduction to Social Network Data Analytics
2. oddball: Spotting Anomalies in Weighted Graphs
3. CopyCatch
4. Graph structure in the Web
5. Qiang Cao Michael Sirivianos Xiaowei Yang and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In NSDI. USENIX 197--210. Qiang Cao Michael Sirivianos Xiaowei Yang and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In NSDI. USENIX 197--210.
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Anomaly Detection in Dynamic Graphs: A Comprehensive Survey;ACM Transactions on Knowledge Discovery from Data;2024-07-26
2. Data Interaction Security Monitoring Technology Based on Behavior Graph Representation;Proceedings of the 2024 3rd International Conference on Cryptography, Network Security and Communication Technology;2024-01-19
3. MEGA: Machine Learning-Enhanced Graph Analytics for Infodemic Risk Management;IEEE Journal of Biomedical and Health Informatics;2023-12
4. Sketch-Based Anomaly Detection in Streaming Graphs;Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining;2023-08-04
5. Social Robot Detection Based on User Behavioral Representation;2023