Abstract
Anomaly analytics is a popular and vital task in various research contexts that has been studied for several decades. At the same time, deep learning has shown its capacity in solving many graph-based tasks, like node classification, link prediction, and graph classification. Recently, many studies are extending graph learning models for solving anomaly analytics problems, resulting in beneficial advances in graph-based anomaly analytics techniques. In this survey, we provide a comprehensive overview of graph learning methods for anomaly analytics tasks. We classify them into four categories based on their model architectures, namely graph convolutional network, graph attention network, graph autoencoder, and other graph learning models. The differences between these methods are also compared in a systematic manner. Furthermore, we outline several graph-based anomaly analytics applications across various domains in the real world. Finally, we discuss five potential future research directions in this rapidly growing field.
Topics

No keywords indexed for this article. Browse by subject →

References
141
[1]
Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, and Aditya P. Mathur. 2017. WADI: A water distribution testbed for research in the design of secure cyber physical systems. In Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks. 25–28. 10.1145/3055366.3055375
[2]
Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion fraud detection in online reviews by network effects. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 7. 2–11.
[3]
Graph based anomaly detection and description: a survey

Leman Akoglu, Hanghang Tong, Danai Koutra

Data Mining and Knowledge Discovery 10.1007/s10618-014-0365-y
[4]
Jinwon An and Sungzoon Cho. 2015. Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2, 1 (2015), 1–18.
[8]
Cemal Cagatay Bilgin and Bülent Yener. 2008. Dynamic network evolution: Models clustering anomaly detection. Technical Report 2008 Rensselaer Polytechnic Institute Troy NY. https://www.cs.rpi.edu/research/pdf/08-08.pdf.
[9]
Aleksandar Bojchevski and Stephan Günnemann. 2018. Deep gaussian embedding of graphs: Unsupervised inductive learning via ranking. In International Conference on Learning Representations. 1–13.
[11]
Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. arXiv:1901.03407. Retrieved from https://arxiv.org/abs/1901.03407.
[12]
Anomaly detection

Varun Chandola, Arindam Banerjee, Vipin Kumar

ACM Computing Surveys 10.1145/1541880.1541882
[14]
Zhengdao Chen, Lisha Li, and Joan Bruna. 2019. Supervised community detection with line graph neural networks. In International Conference on Learning Representations.
[16]
Lu Cheng, Jundong Li, Yasin N. Silva, Deborah L. Hall, and Huan Liu. 2019. XBully: Cyberbullying detection within a multi-modal context. In Proceedings of the 12th ACM International Conference on Web Search and Data Mining. 339–347.
[18]
Munmun De Choudhury, Hari Sundaram, Ajita John, and Dorée Duncan Seligmann. 2009. Social synchrony: Predicting mimicry of user actions in online social media. In Proceedings of the International Conference on Computational Science and Engineering, Vol. 4. IEEE, 151–158.
[20]
Cristiano Di Crescenzo, Giulia Gavazzi, Giacomo Legnaro, Elena Troccoli, Ilaria Bordino, and Francesco Gullo. 2017. HERMEVENT: A news collection for emerging-event detection. In Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics. 1–10.
[21]
Kaize Ding, Jundong Li, Nitin Agarwal, and Huan Liu. 2020. Inductive anomaly detection on attributed networks. In Proceedings of the 29th International Joint Conference on Artificial Intelligence (IJCAI’20). International Joint Conferences on Artificial Intelligence, 1288–1294.
[24]
Qi Ding, Natallia Katenka, Paul Barford, Eric Kolaczyk, and Mark Crovella. 2012. Intrusion as (anti) social communication: Characterization and detection. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 886–894. 10.1145/2339530.2339670
[28]
Techniques for interpretable machine learning

Mengnan Du, Ninghao Liu, Xia Hu

Communications of the ACM 10.1145/3359786
[29]
Dongsheng Duan, Lingling Tong, Yangxi Li, Jie Lu, Lei Shi, and Cheng Zhang. 2020. AANE: Anomaly aware network embedding for anomalous link detection. In Proceedings of the IEEE International Conference on Data Mining (ICDM’20). IEEE, 1002–1007.
[30]
Heba El-Fiqi, Min Wang, Kathryn Kasmarik, Anastasios Bezerianos, Kay Chen Tan, and Hussein A. Abbass. 2021. Weighted gate layer autoencoders. IEEE Trans. Cybernet. 52, 8 (2021), 7242–7253. 10.1109/tcyb.2021.3049583
[32]
Yujie Fan, Yanfang Ye, Qian Peng, Jianfei Zhang, Yiming Zhang, Xusheng Xiao, Chuan Shi, Qi Xiong, Fudong Shao, and Liang Zhao. 2020. Metagraph aggregated heterogeneous graph neural network for illicit traded product identification in underground market. In Proceedings of the IEEE International Conference on Data Mining (ICDM’20). IEEE, 132–141.
[37]
Jack Hessel and Lillian Lee. 2019. Something’s brewing! Early prediction of controversy-causing posts from discussion features. In Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 1648–1659.
[38]
Bryan Hooi, Dhivya Eswaran, Hyun Ah Song, Amritanshu Pandey, Marko Jereminov, Larry Pileggi, and Christos Faloutsos. 2018. GRIDWATCH: Sensor placement and anomaly detection in the electrical grid. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 71–86.
[39]
Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Analyzing labeled cyberbullying incidents on the instagram social network. In International Conference on Social Informatics. Springer, 49–66. 10.1007/978-3-319-27433-1_4
[41]
Binbin Hu, Zhiqiang Zhang, Chuan Shi, Jun Zhou, Xiaolong Li, and Yuan Qi. 2019. Cash-out user detection based on attributed heterogeneous information network with a hierarchical attention mechanism. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33. 946–953.
[42]
Densely Connected Convolutional Networks

Gao Huang, Zhuang Liu, Laurens Van Der Maaten et al.

2017 IEEE Conference on Computer Vision and Patter... 10.1109/cvpr.2017.243
[43]
Hong Huang, Ruize Shi, Wei Zhou, Xiao Wang, Hai Jin, and Xiaoming Fu. 2021. Temporal heterogeneous information network embedding. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI’21). 1470–1476.
[45]
Ming Jin, Yixin Liu, Yu Zheng, Lianhua Chi, Yuan-Fang Li, and Shirui Pan. 2021. ANEMONE: Graph anomaly detection with multi-scale contrastive learning. In Proceedings of the 30th ACM International Conference on Information and Knowledge Management. 3122–3126.
[47]
Parisa Kaghazgaran, James Caverlee, and Anna Squicciarini. 2018. Combating crowdsourced review manipulators: A neighborhood-based approach. In Proceedings of the 11th ACM International Conference on Web Search and Data Mining. 306–314.

Showing 50 of 141 references

Cited By
42
ACM Transactions on Intelligent Sys...
Metrics
42
Citations
141
References
Details
Published
Feb 16, 2023
Vol/Issue
14(2)
Pages
1-29
License
View
Cite This Article
Jing Ren, Feng Xia, Ivan Lee, et al. (2023). Graph Learning for Anomaly Analytics: Algorithms, Applications, and Challenges. ACM Transactions on Intelligent Systems and Technology, 14(2), 1-29. https://doi.org/10.1145/3570906
Related

You May Also Like

LIBSVM

Chih-Chung Chang, Chih-Jen Lin · 2011

41,159 citations

A Survey on Evaluation of Large Language Models

Yupeng Chang, Xu Wang · 2024

2,144 citations

Trajectory Data Mining

Yu Zheng · 2015

1,330 citations

Urban Computing

Yu Zheng, Licia Capra · 2014

977 citations

A Survey of Unsupervised Deep Domain Adaptation

Garrett Wilson, Diane J. Cook · 2020

726 citations