{"title":"社交网络中异常子图检测的研究","authors":"Anagha Ajoykumar, V. M","doi":"10.47392/irjash.2023.s039","DOIUrl":null,"url":null,"abstract":"The reliance on the internet has made it possible for a number of internet networks to arise, each with a distinct user base. Intentionally or not, we are all members of a wide range of social networks. Online interpersonal and professional interactions are significantly influenced by social networking. It has a tremendous effect on a global scale and an individual one, affecting a wide range of industries including education, healthcare, entertainment, bank-ing, and telecommunications. As their dependency on social media increases, users are publishing a lot of information about themselves online, leaving their data and themselves vulnerable to the outside world and making them ideal targets for criminals which not only jeopardizes the security of the social network’s data but also make way to a slew of other potentially harmful situations, ranging from identity theft to major cybercrime such as hacking, cyber-bullying cyber threats, and even national security threats such as terrorism. This neces-sitated the development of methods and strategies to detect fraudulent users or abnormalities on social media. A graph framework is the most prominent form of mathematical modeling of a social network, hence deducing methods to identify abnormalities from a graph is critical. This paper gives a thorough review of graph-based anomaly detection methods, with a focus on identifying anomalous subgraphs.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Study of Anomalous Subgraph Detection in Social Networks\",\"authors\":\"Anagha Ajoykumar, V. M\",\"doi\":\"10.47392/irjash.2023.s039\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The reliance on the internet has made it possible for a number of internet networks to arise, each with a distinct user base. Intentionally or not, we are all members of a wide range of social networks. Online interpersonal and professional interactions are significantly influenced by social networking. It has a tremendous effect on a global scale and an individual one, affecting a wide range of industries including education, healthcare, entertainment, bank-ing, and telecommunications. As their dependency on social media increases, users are publishing a lot of information about themselves online, leaving their data and themselves vulnerable to the outside world and making them ideal targets for criminals which not only jeopardizes the security of the social network’s data but also make way to a slew of other potentially harmful situations, ranging from identity theft to major cybercrime such as hacking, cyber-bullying cyber threats, and even national security threats such as terrorism. This neces-sitated the development of methods and strategies to detect fraudulent users or abnormalities on social media. A graph framework is the most prominent form of mathematical modeling of a social network, hence deducing methods to identify abnormalities from a graph is critical. This paper gives a thorough review of graph-based anomaly detection methods, with a focus on identifying anomalous subgraphs.\",\"PeriodicalId\":244861,\"journal\":{\"name\":\"International Research Journal on Advanced Science Hub\",\"volume\":\"98 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Research Journal on Advanced Science Hub\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47392/irjash.2023.s039\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Research Journal on Advanced Science Hub","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47392/irjash.2023.s039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study of Anomalous Subgraph Detection in Social Networks
The reliance on the internet has made it possible for a number of internet networks to arise, each with a distinct user base. Intentionally or not, we are all members of a wide range of social networks. Online interpersonal and professional interactions are significantly influenced by social networking. It has a tremendous effect on a global scale and an individual one, affecting a wide range of industries including education, healthcare, entertainment, bank-ing, and telecommunications. As their dependency on social media increases, users are publishing a lot of information about themselves online, leaving their data and themselves vulnerable to the outside world and making them ideal targets for criminals which not only jeopardizes the security of the social network’s data but also make way to a slew of other potentially harmful situations, ranging from identity theft to major cybercrime such as hacking, cyber-bullying cyber threats, and even national security threats such as terrorism. This neces-sitated the development of methods and strategies to detect fraudulent users or abnormalities on social media. A graph framework is the most prominent form of mathematical modeling of a social network, hence deducing methods to identify abnormalities from a graph is critical. This paper gives a thorough review of graph-based anomaly detection methods, with a focus on identifying anomalous subgraphs.