Skip to main content

Anomaly Detection in Q & A Based Social Networks

  • Conference paper
  • First Online:
  • 1631 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 880))

Abstract

Detection of anomalies in question/answer based social networks is important in terms of finding the best answers and removing unrelated posts. These networks are usually based on users’ posts and comments, and the best answer is selected based on the ratings by the users. The problem with the scoring systems is that users might collude in rating unrelated posts or boost their reputation. Also, some malicious users might spam the discussion. In this paper, we propose a network analysis method based on network structure and node property for exploring and detecting these anomalies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Savage, D., Zhang, X., Yu, X., Chou, P., Wang, Q.: Anomaly detection in online social networks. Soc. Netw. 39, 62–70 (2014)

    Article  Google Scholar 

  2. Liu, Y., Chawla, S.: Social media anomaly detection: challenges and solutions. In: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, pp. 817–818. ACM, Cambridge (2017)

    Google Scholar 

  3. Akoglu, L., McGlohon, M.: Anomaly detection in large graphs. CMU-CS-09-173 Technical Report (2009)

    Google Scholar 

  4. Akoglu, L., McGlohon, M., Faloutsos, C.: Oddball: spotting anomalies in weighted graphs. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) Advances in Knowledge Discovery and Data Mining. PAKDD 2010. LNCS, vol. 6119. Springer, Berlin (2010)

    Google Scholar 

  5. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection for discrete sequences: a survey. IEEE Trans. Knowl. Data Eng. 24(5), 823–839 (2012)

    Article  Google Scholar 

  6. Sun, J., Qu, H., Chakrabarti, D., Faloutsos, C.: Neighborhood formation and anomaly detection in bipartite graphs. In: Fifth IEEE International Conference on Data Mining, pp. 418–425. IEEE Computer Society, Washington, DC (2005)

    Google Scholar 

  7. Cheng, H., Tan, P.N., Potter, C., Klooster, S.: Detection and characterization of anomalies in multivariate time series. In: Proceedings

    Google Scholar 

  8. Tong, H., Lin, C.-Y.: Non-negative residual matrix factorization with application to graph anomaly detection. In: Proceedings of the 2011 SIAM International Conference on Data Mining, pp. 143–153. Society for Industrial and Applied Mathematics (2011)

    Google Scholar 

  9. Qiu, H., Liu, Y., Subrahmanya, N.A., Li, W.: Granger causality for time-series anomaly detection. In: IEEE 12th International Conference on Data Mining (ICDM), pp. 1074–1079. IEEE (2012)

    Google Scholar 

  10. Sun, P., Chawla, S., Arunasalam, B.: Mining for outliers in sequential databases. In: Proceedings of the 2006 SIAM International Conference on Data Mining, pp. 94–105. Society for Industrial and Applied Mathematics (2006)

    Google Scholar 

  11. Ge, Y., Xiong, H., Liu, C., Zhou, Z.H.: A taxi driving fraud detection system. In: 2011 IEEE 11th International Conference on Data Mining (ICDM), pp. 181–190. IEEE (2011)

    Google Scholar 

  12. Wong, W.K., Moore, A.W., Cooper, G.F., Wagner, M.M.: Bayesian network anomaly pattern detection for disease outbreaks. In: Proceedings of the 20th International Conference on Machine Learning (ICML-03), pp. 808–815. IEEE (2003)

    Google Scholar 

  13. Friedland, L., Jensen, D.: Finding tribes: identifying close-knit individuals from employment patterns. In: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 290–299. ACM, Vancouver, August 2007

    Google Scholar 

  14. Yu, R., He, X., Liu, Y.: Glad: group anomaly detection in social media analysis. ACM Trans. Knowl. Discov. Data (TKDD) 10(2), 18 (2015)

    Google Scholar 

  15. Bindu, P.V., Thilagam, P.S., Ahuja, D.: Discovering suspicious behavior in multilayer social networks. Comput. Hum. Behav. 73, 568–582 (2017)

    Article  Google Scholar 

  16. Chino, D.Y., Costa, A.F., Traina, A.J., Faloutsos, C.: VolTime: unsupervised anomaly detection on users’ online activity volume. In: Proceedings of the 2017 SIAM International Conference on Data Mining, pp. 108–116. Society for Industrial and Applied Mathematics (2017)

    Google Scholar 

  17. Laleh, N., Carminati, B., Ferrari, E.: Risk assessment in social networks based on user anomalous behaviour. IEEE Trans. Dependable Secure Comput. (2016)

    Google Scholar 

  18. Stack Exchange Data Dump. https://archive.org/details/stackexchange. Accessed 9 Nov 2017

  19. Pandit, S., Chau, D.H., Wang, S., Faloutsos, C.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: Proceedings of the 16th International Conference on World Wide Web, pp. 201–210. ACM (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neda Soltani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Soltani, N., Hormizi, E., Golpayegani, S.A.H. (2019). Anomaly Detection in Q & A Based Social Networks. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 880. Springer, Cham. https://doi.org/10.1007/978-3-030-02686-8_27

Download citation

Publish with us

Policies and ethics