社交网络中异常子图检测的研究

Anagha Ajoykumar, V. M
{"title":"社交网络中异常子图检测的研究","authors":"Anagha Ajoykumar, V. M","doi":"10.47392/irjash.2023.s039","DOIUrl":null,"url":null,"abstract":"The reliance on the internet has made it possible for a number of internet networks to arise, each with a distinct user base. Intentionally or not, we are all members of a wide range of social networks. Online interpersonal and professional interactions are significantly influenced by social networking. It has a tremendous effect on a global scale and an individual one, affecting a wide range of industries including education, healthcare, entertainment, bank-ing, and telecommunications. As their dependency on social media increases, users are publishing a lot of information about themselves online, leaving their data and themselves vulnerable to the outside world and making them ideal targets for criminals which not only jeopardizes the security of the social network’s data but also make way to a slew of other potentially harmful situations, ranging from identity theft to major cybercrime such as hacking, cyber-bullying cyber threats, and even national security threats such as terrorism. This neces-sitated the development of methods and strategies to detect fraudulent users or abnormalities on social media. A graph framework is the most prominent form of mathematical modeling of a social network, hence deducing methods to identify abnormalities from a graph is critical. This paper gives a thorough review of graph-based anomaly detection methods, with a focus on identifying anomalous subgraphs.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Study of Anomalous Subgraph Detection in Social Networks\",\"authors\":\"Anagha Ajoykumar, V. M\",\"doi\":\"10.47392/irjash.2023.s039\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The reliance on the internet has made it possible for a number of internet networks to arise, each with a distinct user base. Intentionally or not, we are all members of a wide range of social networks. Online interpersonal and professional interactions are significantly influenced by social networking. It has a tremendous effect on a global scale and an individual one, affecting a wide range of industries including education, healthcare, entertainment, bank-ing, and telecommunications. As their dependency on social media increases, users are publishing a lot of information about themselves online, leaving their data and themselves vulnerable to the outside world and making them ideal targets for criminals which not only jeopardizes the security of the social network’s data but also make way to a slew of other potentially harmful situations, ranging from identity theft to major cybercrime such as hacking, cyber-bullying cyber threats, and even national security threats such as terrorism. This neces-sitated the development of methods and strategies to detect fraudulent users or abnormalities on social media. A graph framework is the most prominent form of mathematical modeling of a social network, hence deducing methods to identify abnormalities from a graph is critical. This paper gives a thorough review of graph-based anomaly detection methods, with a focus on identifying anomalous subgraphs.\",\"PeriodicalId\":244861,\"journal\":{\"name\":\"International Research Journal on Advanced Science Hub\",\"volume\":\"98 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Research Journal on Advanced Science Hub\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47392/irjash.2023.s039\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Research Journal on Advanced Science Hub","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47392/irjash.2023.s039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

对互联网的依赖使得许多互联网网络的出现成为可能,每个网络都有不同的用户基础。不管是有意还是无意,我们都是各种社交网络的成员。网络人际互动和职业互动受到社交网络的显著影响。它对全球和个人都有巨大的影响,影响到包括教育、医疗保健、娱乐、银行和电信在内的广泛行业。随着他们对社交媒体的依赖程度的增加,用户在网上发布了大量关于他们自己的信息,使他们的数据和他们自己容易受到外界的攻击,使他们成为犯罪分子的理想目标,这不仅危及社交网络数据的安全,而且还为一系列其他潜在的有害情况开辟了道路,从身份盗窃到黑客攻击等重大网络犯罪,网络欺凌网络威胁。甚至是国家安全威胁,比如恐怖主义。这就需要开发方法和策略来检测社交媒体上的欺诈用户或异常情况。图框架是社会网络数学建模最突出的形式,因此从图中推断出识别异常的方法是至关重要的。本文全面回顾了基于图的异常检测方法,重点介绍了异常子图的识别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Study of Anomalous Subgraph Detection in Social Networks
The reliance on the internet has made it possible for a number of internet networks to arise, each with a distinct user base. Intentionally or not, we are all members of a wide range of social networks. Online interpersonal and professional interactions are significantly influenced by social networking. It has a tremendous effect on a global scale and an individual one, affecting a wide range of industries including education, healthcare, entertainment, bank-ing, and telecommunications. As their dependency on social media increases, users are publishing a lot of information about themselves online, leaving their data and themselves vulnerable to the outside world and making them ideal targets for criminals which not only jeopardizes the security of the social network’s data but also make way to a slew of other potentially harmful situations, ranging from identity theft to major cybercrime such as hacking, cyber-bullying cyber threats, and even national security threats such as terrorism. This neces-sitated the development of methods and strategies to detect fraudulent users or abnormalities on social media. A graph framework is the most prominent form of mathematical modeling of a social network, hence deducing methods to identify abnormalities from a graph is critical. This paper gives a thorough review of graph-based anomaly detection methods, with a focus on identifying anomalous subgraphs.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信