Anomaly Detection in Directed Dynamic Graphs via RDGCN and LSTAN

被引:2
|
作者
Li, Mark Junjie [1 ]
Gao, Zukang [1 ]
Li, Jun [2 ]
Bao, Xianyu [2 ]
Li, Meiting [1 ]
Zhao, Gen [1 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
[2] Shenzhen Acad Inspect & Quarantine, Shenzhen, Peoples R China
基金
国家重点研发计划;
关键词
Anomaly detection; Directed Dynamic graphs; Attention network;
D O I
10.1007/978-3-031-44213-1_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly detection in dynamic graphs has gained significant attention in practical applications such as cybersecurity and e-commerce. However, existing deep learning-based methods often overlook the asymmetric structural characteristics of directed dynamic graphs, limiting their applicability to such graph types. Furthermore, these methods inadequately consider the long-term and short-term temporal features of dynamic graphs, which hampers their ability to capture the evolving patterns within the graphs. This paper proposes DyGRL, an anomaly detection algorithm designed specifically for directed dynamic graphs. DyGRL utilizes a Roled-based Directed Graph Convolutional Network (RDGCN) to extract structural features from directed dynamic graphs. The RDGCN defines and aggregates node neighbor information based on their roles, effectively addressing the asymmetric nature of the graph structure. Additionally, DyGRL incorporates a Long Short-term Temporal Attention Network (LSTAN) to capture the evolution patterns of dynamic graphs. The LSTAN leverages a recurrent attention mechanism to efficiently extract and fuse both long-term and short-term temporal features, enabling a comprehensive understanding of graph evolution. We demonstrate the effectiveness and superiority of DyGRL over existing methods in detecting anomalies in directed dynamic graphs through extensive experiments on real-world datasets.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [21] Unsupervised Anomaly Detection in Knowledge Graphs
    Senaratne, Asara
    Omran, Pouya Ghiasnezhad
    Williams, Graham
    Christen, Peter
    PROCEEDINGS OF THE 10TH INTERNATIONAL JOINT CONFERENCE ON KNOWLEDGE GRAPHS (IJCKG 2021), 2021, : 161 - 165
  • [22] Quantum encoding of dynamic directed graphs
    Della Giustina, D.
    Londero, C.
    Piazza, C.
    Riccardi, B.
    Romanello, R.
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2024, 136
  • [23] On Dynamic DFS Tree in Directed Graphs
    Baswana, Surender
    Choudhary, Keerti
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2015, PT II, 2015, 9235 : 102 - 114
  • [24] Directed dynamic attribute graph anomaly detection based on evolved graph attention for blockchain
    Liu, Chenlei
    Xu, Yuhua
    Sun, Zhixin
    KNOWLEDGE AND INFORMATION SYSTEMS, 2024, 66 (02) : 989 - 1010
  • [25] Directed dynamic attribute graph anomaly detection based on evolved graph attention for blockchain
    Chenlei Liu
    Yuhua Xu
    Zhixin Sun
    Knowledge and Information Systems, 2024, 66 : 989 - 1010
  • [26] A New Type of Anomaly Detection Problem in Dynamic Graphs: An Ant Colony Optimization Approach
    Tasnadi, Zoltan
    Gasko, Noemi
    BIOINSPIRED OPTIMIZATION METHODS AND THEIR APPLICATIONS, 2022, 13627 : 46 - 53
  • [27] DIMENSIONAL ANALYSIS VIA DIRECTED GRAPHS
    HAPP, WW
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 1971, 292 (06): : 527 - &
  • [28] An overview of dynamic anomaly detection in social networks via control charts
    Noorossana, Rassoul
    Hosseini, Seyed Soheil
    Heydarzade, Ayoub
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2018, 34 (04) : 641 - 648
  • [29] Anomaly Detection in Nuclear Power Plants via Symbolic Dynamic Filtering
    Jin, Xin
    Guo, Yin
    Sarkar, Soumik
    Ray, Asok
    Edwards, Robert M.
    IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2011, 58 (01) : 277 - 288
  • [30] Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
    Cretu-Ciocarlie, Gabriela F.
    Stavrou, Angelos
    Locasto, Michael E.
    Stolfo, Salvatore J.
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 41 - +