JOURNAL ARTICLE

Interactive Anomaly Detection on Attributed Networks

Abstract

Performing anomaly detection on attributed networks concerns with finding nodes whose patterns or behaviors deviate significantly from the majority of reference nodes. Its success can be easily found in many real-world applications such as network intrusion detection, opinion spam detection and system fault diagnosis, to name a few. Despite their empirical success, a vast majority of existing efforts are overwhelmingly performed in an unsupervised scenario due to the expensive labeling costs of ground truth anomalies. In fact, in many scenarios, a small amount of prior human knowledge of the data is often effortless to obtain, and getting it involved in the learning process has shown to be effective in advancing many important learning tasks. Additionally, since new types of anomalies may constantly arise over time especially in an adversarial environment, the interests of human expert could also change accordingly regarding to the detected anomaly types. It brings further challenges to conventional anomaly detection algorithms as they are often applied in a batch setting and are incapable to interact with the environment. To tackle the above issues, in this paper, we investigate the problem of anomaly detection on attributed networks in an interactive setting by allowing the system to proactively communicate with the human expert in making a limited number of queries about ground truth anomalies. Our objective is to maximize the true anomalies presented to the human expert after a given budget is used up. Along with this line, we formulate the problem through the principled multi-armed bandit framework and develop a novel collaborative contextual bandit algorithm, named GraphUCB. In particular, our developed algorithm: (1) explicitly models the nodal attributes and node dependencies seamlessly in a joint framework; and (2) handles the exploration-exploitation dilemma when querying anomalies of different types. Extensive experiments on real-world datasets show the improvement of the proposed algorithm over the state-of-the-art algorithms.

Keywords:
Anomaly detection Computer science Intrusion detection system Process (computing) Adversarial system Anomaly (physics) Artificial intelligence Machine learning Data science

Metrics

149
Cited By
11.21
FWCI (Field Weighted Citation Impact)
61
Refs
0.98
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Data Stream Mining Techniques
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Bandit Algorithms Research
Social Sciences →  Decision Sciences →  Management Science and Operations Research
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

Deep Anomaly Detection on Attributed Networks

Kaize DingJundong LiRohit BhanushaliHuan Liu

Society for Industrial and Applied Mathematics eBooks Year: 2019 Pages: 594-602
JOURNAL ARTICLE

Anomaly detection in dynamic attributed networks

Ruizhi ZhouQin ZhangPeng ZhangLingfeng NiuX. Sheldon Lin

Journal:   Neural Computing and Applications Year: 2020 Vol: 33 (6)Pages: 2125-2136
BOOK-CHAPTER

Context-Aware Anomaly Detection in Attributed Networks

Ming LiuJianxin LiaoJingyu WangQi QiHaifeng Sun

Lecture notes in computer science Year: 2021 Pages: 14-26
BOOK-CHAPTER

Anomaly Detection in Time-Evolving Attributed Networks

Luguo XueMinnan LuoZhen PengJundong LiYan ChenJun Liu

Lecture notes in computer science Year: 2019 Pages: 235-239
© 2026 ScienceGate Book Chapters — All rights reserved.