• No results found

A Survey on Online Social Network Anomaly Detection

N/A
N/A
Protected

Academic year: 2020

Share "A Survey on Online Social Network Anomaly Detection"

Copied!
15
0
0

Loading.... (view fulltext now)

Full text

Loading

References

Related documents

Although many existing intrusion detection systems are based on signa- ture recognition techniques, anomaly detection techniques are better to detect novel intrusions or new

The authors first separate normal instances from anomalies in the training data, using frequent item-set mining, and then use the clustering-based technique to detect

An Unsupervised Anomaly Detection Framework for Detecting An Unsupervised Anomaly Detection Framework for Detecting Anomalies in Real Time through Network System’s Log Files

Recent papers adopt behavior technique for malicious detection, COMPA, an approach propose a way to detect compromised accounts behavioral profile and anomaly

Unlike previous unimodal GAN based anomaly detection [Schlegl et al.2017], [Zenati et al.2018], we use an Infinite Gaussian Mixture Model to detect anomalies in the latent space

A probabilistic algorithm called Probabilistic Auto Encoder based Anomaly Detection (PAE-AD) is proposed to detect anomalies and enhance processes involved.. Both

Keywords: clustering, intrusion detection, anomaly based, graph algorithm, DBSCAN

Another relevant category of work uses system metrics data, i.e., CPU utilizations, mem- ory consumption, etc., to detect software anomalies. The use of system metrics achieves