2007
DOI: 10.3233/ida-2007-11606
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection in data represented as graphs

Abstract: An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a graph. In this paper we present graph-based approaches to uncovering anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resemble non-anomalous behavior. We have developed three algorithms for the purpose of detecting anomalies in all three types of possible graph changes: label … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 87 publications
(41 citation statements)
references
References 12 publications
(11 reference statements)
0
41
0
Order By: Relevance
“…Eberle and Holder [5,8] were the first to search for a fraudulent pattern that is "similar" (without matching exactly) to frequent, or "good", patterns. Authors note that anyone who is attempting to commit fraud would want their activities to look as real as possible.…”
Section: Related Workmentioning
confidence: 99%
“…Eberle and Holder [5,8] were the first to search for a fraudulent pattern that is "similar" (without matching exactly) to frequent, or "good", patterns. Authors note that anyone who is attempting to commit fraud would want their activities to look as real as possible.…”
Section: Related Workmentioning
confidence: 99%
“…It is considered as a small deviation from the normal pattern [20]. For example, anyone attempting to peep into someone's social network account would not want to get caught; therefore, he will try to behave in the same manner as a normal user.…”
Section: In-disguise Anomalymentioning
confidence: 99%
“…The following is a brief summary of each of the algorithms, along with some simple business process examples to help explain their usage. The reader should refer to [4] for a more detailed description of the actual algorithms.…”
Section: Algorithmsmentioning
confidence: 99%