EVENT DETECTION IN TIME SERIES OF MOBILE COMMUNICATION GRAPHS

Slides:



Advertisements
Similar presentations
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Advertisements

Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
CMU SCS I2.2 Large Scale Information Network Processing INARC 1 Overview Goal: scalable algorithms to find patterns and anomalies on graphs 1. Mining Large.
School of Computer Science Carnegie Mellon University Duke University DeltaCon: A Principled Massive- Graph Similarity Function Danai Koutra Joshua T.
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet Presented by Eric Arnaud Makita
Node labels as random variables prior belief observed neighbor potentials compatibility potentials Opinion Fraud Detection in Online Reviews using Network.
Anomaly Detection in the WIPER System using A Markov Modulated Poisson Distribution Ping Yan Tim Schoenharl Alec Pawling Greg Madey.
SFU, CMPT 741, Fall 2009, Martin Ester 418 Outlook Outline Trends in KDD research Graph mining and social network analysis Recommender systems Information.
On the Structure, Properties and Utility of Internal Corporate Blogs Pranam Kolari Tim Finin, Yelena Yesha, Yaacov Yesha Kelly Lyons, Stephen Perelgut,
Analysis of Large-Scale Cell Phone Networks Course Project Leman Akoglu Bhavana Dalvi Skyler Speakman April
UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
CMU SCS Mining Billion-node Graphs Christos Faloutsos CMU.
1 BotGraph: Large Scale Spamming Botnet Detection Yao Zhao EECS Department Northwestern University.
Analysis of the Internet Topology Michalis Faloutsos, U.C. Riverside (PI) Christos Faloutsos, CMU (sub- contract, co-PI) DARPA NMS, no
Community Detection in a Large Real-World Social Network Karsten Steinhaeuser Nitesh V. Chawla DIAL Research Group University of Notre.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
DIDS part II The Return of dIDS 2/12 CIS GrIDS Graph based intrusion detection system for large networks. Analyzes network activity on networks.
Algorithm: For all e E t, define X e = {w e if e G t, 1 - w e otherwise}. Measure likelihood of substructure S by. Flag S as anomalous if, where is an.
Structure, Tie Persistence and Event Detection in Large Phone and SMS Networks Leman Akoglu and Bhavana Dalvi {lakoglu, Carnegie Mellon.
Learning Transportation Mode from Raw GPS Data for Geographic Applications on the Web Yu Zheng, Like Liu, Xing Xie Microsoft Research.
Midterm Presentation Undergraduate Researchers: Graduate Student Mentor: Faculty Mentor: Jordan Cowart, Katie Allmeroth Krist Culmer Dr. Wenjun (Kevin)
Catholic Youth of India CCBI Youth Commission APPLICATION TO HELP CONNECTS THE 60 MILLION CATHOLIC YOUTH IN INDIA.
On Anomalous Hot Spot Discovery in Graph Streams
CMU SCS Big (graph) data analytics Christos Faloutsos CMU.
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
 Focused Clustering and Outlier Detection in Large Attributed Graphs Author : Bryan Perozzi, Leman Akoglu, Patricia lglesias Sánchez, Emmanuel Müller.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.
1 Contact Prediction, Routing and Fast Information Spreading in Social Networks Kazem Jahanbakhsh Computer Science Department University of Victoria August.
Anomalous Node Detection in Time Series of Mobile Communication Graphs Leman Akoglu January 28, 2010.
DETECTING SPAMMERS AND CONTENT PROMOTERS IN ONLINE VIDEO SOCIAL NETWORKS Fabrício Benevenuto ∗, Tiago Rodrigues, Virgílio Almeida, Jussara Almeida, and.
ALICE TURCHANINOVA UNIVERSITY OF HOUSTON-DOWNTOWN PROF. IOANNIS PAVLIDIS Analyzing Human Activity Patterns via Mobile App.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.
©2015 Apigee Corp. All Rights Reserved. Preserving signal in customer journeys Joy Thomas, Apigee Jagdish Chand, Visa.
To Blog or Not to Blog: Characterizing and Predicting Retention in Community Blogs Imrul Kayes 1, Xiang Zuo 1, Da Wang 2, Jacob Chakareski 3 1 University.
CMU SCS Big (graph) data analytics Christos Faloutsos CMU.
ValuePick : Towards a Value-Oriented Dual-Goal Recommender System Leman Akoglu Christos Faloutsos OEDM in conjunction with ICDM 2010 Sydney, Australia.
Simfo Marco Adelfio, Dan Bucatanschi, Bo Liu, Nick Violi.
Mining Social Network for Personalized Prioritization Language Techonology Institute School of Computer Science Carnegie Mellon University Shinjae.
CMU SCS Mining Large Graphs: Fraud Detection, and Algorithms Christos Faloutsos CMU.
Page 1 Inferring Relevant Social Networks from Interpersonal Communication Munmun De Choudhury, Winter Mason, Jake Hofman and Duncan Watts WWW ’10 Summarized.
Automated Home Care Messaging System (AHCMS) Supervisor: Prof. Trevor W. Pearce Prof. Ian Marsland Project Member: Wen Chan Chang Jan. 26, 2005 Department.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
Using Social Network Analysis Methods for the Prediction of Faulty Components Gholamreza Safi.
Du, Faloutsos, Wang, Akoglu Large Human Communication Networks Patterns and a Utility-Driven Generator Nan Du 1,2, Christos Faloutsos 2, Bai Wang 1, Leman.
Minas Gjoka, Emily Smith, Carter T. Butts
Contribution and Proposed Solution Sequence-Based Features Collective Classification with Reports Results of Classification Using Reports Collective Spammer.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Intel and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
Supervised Random Walks: Predicting and Recommending Links in Social Networks Lars Backstrom (Facebook) & Jure Leskovec (Stanford) Proc. of WSDM 2011 Present.
TRACE ANALYSIS AND MINING FOR SMART CITIES By G. Pan Zhejiang Univ., Hangzhou, China G. Qi ; W. Zhang ; S. Li ; Z. Wu ; L. T. Yang.
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Distributed voting application for handheld devices
Tutorial 12 Biological networks.
Introduction Secondary Users (SUs) Primary Users (PUs)
Dieudo Mulamba November 2017
Security Monitoring for Network Protocols and Applications
Graph and Tensor Mining for fun and profit
Christos Faloutsos CMU
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Analyzing Two Participation Strategies in an Undergraduate Course Community Francisco Gutierrez Gustavo Zurita
Dynatrace AI Demystified
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Presentation transcript:

EVENT DETECTION IN TIME SERIES OF MOBILE COMMUNICATION GRAPHS Leman Akoglu Christos Faloutsos

MOTIVATION Anomaly and event (change-point) detection, is the building block for many applications: Cyber warfare Network intrusion Epidemic outbreaks Fault detection in engineering systems The US Geological survey (USGS), as per this BBC report, is trawling the tweets for keywords like quake and earthquake to detect earthquakes to an extent , but mostly to gauge its impact and to know the severity in  different geographic areas.  As you can see, people break up less during the summer, and more during the Winter and Spring. * A big peak right before Spring Break * Most breakups are announced on Mondays * People like to start the summer being single * A big peak right before Christmas * The lowest day throughout the whole year is Christmas Day

DATA DESCRIPTION Texting interactions of mobile phone users from a phone service company in a large city in India who-texts-whom network edge-weighted: #SMS >2 million customers 50 million SMS interactions Dec. 1, 2007 to May 31, 2008

PROBLEM STATEMENT Given a graph that changes over time, can we identify: 1) “change detection”: time points at which many of the N nodes change their behavior significantly? 2) “attribution”: top k nodes which contribute to the change in behavior the most?

PROBLEM STATEMENT Two main considerations: N is very large (on the order of 106)  monitoring each node independently is not practical. “Anomaly” is defined in a collective setting  a time-point/node is anomalous if different than “others”

OVERVIEW OF OUR METHOD Extract features for nodes Derive the typical behavior (“eigen-behavior”) of nodes Compare “eigenbehavior”s over time

FEATURE EXTRACTION Extract features from egonets for all nodes Indegree/outdegree Inweight/outweight Number of neighbors Number of edges Reciprocal degree …

DATA IN 3-D Nodes (>2 million) Features (12) Time (183 days)

OVERVIEW OF OUR METHOD Extract features for nodes Derive the typical behavior (“eigen-behavior”) of nodes Compare “eigenbehavior”s over time

DERIVING “EIGEN-BEHAVIOR” T N N T F W T N N F:inweight principal eigenvector “typical behavior” “eigen-behavior” active node  high score e.g. nodes 1, 2, 6

OVERVIEW OF OUR METHOD Extract features for nodes Derive the typical behavior (“eigen-behavior”) of nodes Compare “eigenbehavior”s over time

TRACKING “BEHAVIOR” OVER TIME F W W T N N F:inweight past pattern change metric: angle θ eigen-behavior at t eigen-behaviors

DETECTED CHANGE POINTS EXPERIMENTS F:inweight Christian New Year Hindi New Year “back to work”

DETECTED CHANGE POINTS EXPERIMENTS F: out-degree F: reciprocal degree Similar behavior for other features

PROBLEM STATEMENT Given a graph that changes over time, can we identify: 1) “change detection”: time points at which many of the N nodes change their behavior significantly? 2) “attribution”: top k nodes which contribute to the change in behavior the most?

ATTRIBUTING CHANGE TO NODES EXPERIMENTS F:inweight DEC 26 r(t-1) no change zone u(t)

ATTRIBUTING CHANGE TO NODES EXPERIMENTS 26 DEC 26 DEC #SMS received Not time (days) Time series of top 5 nodes marked

ATTRIBUTING CHANGE TO NODES EXPERIMENTS JAN 2 “back to work” reciprocal degree time (days)

CONCLUSION An algorithm based on tracking “eigenbehavior” patterns over time “change detection”: spot time-points at which “behavior” changes significantly “attribution”: spot nodes that cause the most change Experiments: on real, SMS messages, 2M users, over 6 months

THANK YOU www.cs.cmu.edu/~lakoglu Email: lakoglu@cs.cmu.edu Christian New Year “back to work” Hindi New Year 26 DEC change detection attribution