Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Catching synchronized behaviors in large networks: a graph mining approach
Jiang M., Cui P., Beutel A., Faloutsos C., Yang S.  ACM Transactions on Knowledge Discovery from Data 10 (4): 1-27, 2016. Type: Article
Date Reviewed: Nov 10 2016

The automatic detection and accurate interpretation of suspicious graph patterns is one of the key issues in spotting malicious activities inside real-world systems, such as fake followers in Twitter, social network manipulation, and distributed denial-of-service (DoS) attacks. Most analysis techniques focus on synchronized and/or rare behaviors in large-scale systems. While in the former class synchronization is considered as a potential anomaly, in the latter class unusual patterns are recognized. Synchronized nodes may be detected because of their very similar behavior patterns, which are required by the tasks they are performing together. On the contrary, rare behaviors propose patterns significantly different from the majority.

CatchSync, the solution proposed in the paper, tries to detect both kinds of potential malicious behaviors, synchronized and rare, by adopting a parameter-free approach, which is also privacy-friendly as it works on the topology and does not need to know about sensitive details. The complexity of the adopted algorithm is linear in the graph size and, therefore, can work at a large scale. Indeed, CatchSync is evaluated on several real (for example, from Twitter) and synthetic big datasets, consisting of millions of nodes and billions of edges. The proposed method is shown to outperform, in terms of both accuracy and execution time, other solutions such as methods for graph-based anomaly detection, social spammer detection, and subgraph mining.

Assuming there are always new types of attacks, CatchSync works according to a realistic and effective approach to computer security. I definitely enjoyed reading this paper. Indeed, it deals with a very interesting topic and is, in general, well written and structured. The paper is suitable for a relatively wide audience.

Reviewer:  Salvatore Pileggi Review #: CR144913 (1702-0158)
Bookmark and Share
  Editor Recommended
Featured Reviewer
Online Information Services (H.3.5 )
Social And Behavioral Sciences (J.4 )
Would you recommend this review?
Other reviews under "Online Information Services": Date
Unveiling correlations via mining human-thing interactions in the Web of Things
Yao L., Sheng Q., Ngu A., Li X., Benattalah B.  ACM Transactions on Intelligent Systems and Technology 8(5): 1-25, 2017. Type: Article
Sep 11 2017
A taxonomy and survey of cloud resource orchestration techniques
Weerasiri D., Barukh M., Benatallah B., Sheng Q., Ranjan R.  ACM Computing Surveys 50(2): 1-41, 2017. Type: Article
Aug 9 2017
Value and misinformation in collaborative investing platforms
Wang T., Wang G., Wang B., Sambasivan D., Zhang Z., Li X., Zheng H., Zhao B.  ACM Transactions on the Web 11(2): 1-32, 2017. Type: Article
Jul 5 2017

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy