Proceedings of the Web Conference 2021 2021
DOI: 10.1145/3442381.3450023
|View full text |Cite
|
Sign up to set email alerts
|

MStream: Fast Anomaly Detection in Multi-Aspect Streams

Abstract: Given a stream of entries in a multi-aspect data setting i.e., entries having multiple dimensions, how can we detect anomalous activities in an unsupervised manner? For example, in the intrusion detection setting, existing work seeks to detect anomalous events or edges in dynamic graph streams, but this does not allow us to take into account additional attributes of each entry. Our work aims to define a streaming multi-aspect data anomaly detection framework, termed MStream which can detect unusual group anoma… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 64 publications
(39 reference statements)
0
8
0
Order By: Relevance
“…Typical anomaly detection methods [15,25,31,61,81], such as local outlier factor (LOF) [24] and tree-based approaches [34,56], can be used in event tensors by converting multiple attributes to numerical ones. [20,45,62,79,80] use a stream of multi-aspect records as input. MemStream [21] can learn dynamically changing trends to handle time-varying data distribution known as concept drift [27,35,57].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Typical anomaly detection methods [15,25,31,61,81], such as local outlier factor (LOF) [24] and tree-based approaches [34,56], can be used in event tensors by converting multiple attributes to numerical ones. [20,45,62,79,80] use a stream of multi-aspect records as input. MemStream [21] can learn dynamically changing trends to handle time-varying data distribution known as concept drift [27,35,57].…”
Section: Related Workmentioning
confidence: 99%
“…Given a large, online stream of time-stamped events, how can we statistically summarize all the event streams and find important patterns, rules, and anomalies? Time-stamped event data are generated and collected by many real applications [10,17,29,84], including online marketing analytics [52,75], social network/location-based services [28,71], and cybersecurity systems [19,80], with increasingly larger sizes and faster rates of transactions. For example, an online shopping service could generate millions of logging entries every second, with rich information about items and users.…”
Section: Introductionmentioning
confidence: 99%
“…For DARPA dataset, we track 151 nodes 7 which have anomalous edges after initial snapshot. Similarly we track 190,170 anomalous nodes over EU-CORE-S and EU-Core-L. We exclude edge-level method SedanSpot for node-level task because it can not calculate node-level anomaly score.We present the precision and running time in Table 4 and Table 5.…”
Section: Exp1: Node-level Anomaly Localizationmentioning
confidence: 99%
“…For example, the raw graph data used in Fig. 1 Despite the extensive literature [2,7,38] on graph anomaly detection, previous work focuses on different problem definitions of anomaly. On the other hand, works [36] on graph-level anomaly detection cannot identify individual node changes but only uncover the global changes in the overall graph structure.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation