2014
DOI: 10.1016/j.socnet.2014.05.002
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection in online social networks

Abstract: Anomalies in online social networks can signify irregular, and often illegal behaviour. Detection of such anomalies has been used to identify malicious individuals, including spammers, sexual predators, and online fraudsters. In this paper we survey existing computational techniques for detecting anomalies in online social networks. We characterise anomalies as being either static or dynamic, and as being labelled or unlabelled, and survey methods for detecting these different types of anomalies. We suggest th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

4
129
0
3

Year Published

2016
2016
2020
2020

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 230 publications
(136 citation statements)
references
References 67 publications
4
129
0
3
Order By: Relevance
“…David Savage, et.al (2014) proposed that in this paper [13] the existing computational techniques are surveyed for detecting anomalies in online social networks. The paper characterizes anomalies as being either static or dynamic, and as being labeled or unlabeled, and survey methods for detecting these diverse types of anomalies.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…David Savage, et.al (2014) proposed that in this paper [13] the existing computational techniques are surveyed for detecting anomalies in online social networks. The paper characterizes anomalies as being either static or dynamic, and as being labeled or unlabeled, and survey methods for detecting these diverse types of anomalies.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Star-networks are also associated with financial fraud (Šubelj, Furlan, Bajec, 2011), academic fraud (Callaway, 2011), and terrorist activities (Reid et al, 2005;Krebs, 2002). In a recent paper, Savage et al (2014) categorize star-networks and near-star-networks in an effort to make their online detection more effective. Mutual and common knowledge, especially about problematic behavior by the hub of a community, is greatly enhanced by the gossip that occurs in Euclidean connections in that community.…”
Section: Figure 4 Symmetric But Non-euclidean Trustmentioning
confidence: 99%
“…Detection of such anomalies has been used to identify malicious individuals, including spammers, sexual predators, and online fraudsters. The detection of anomalies in online social networks is composed of two sub-processes; the selection and calculation of network features, and the classification of observations from this feature space [16].…”
Section: Detection Of Terrorist Groups:-mentioning
confidence: 99%