CN114970736A - Network node depth anomaly detection method based on density estimation - Google Patents

Network node depth anomaly detection method based on density estimation Download PDF

Info

Publication number
CN114970736A
CN114970736A CN202210651604.7A CN202210651604A CN114970736A CN 114970736 A CN114970736 A CN 114970736A CN 202210651604 A CN202210651604 A CN 202210651604A CN 114970736 A CN114970736 A CN 114970736A
Authority
CN
China
Prior art keywords
node
attribute
network
matrix
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210651604.7A
Other languages
Chinese (zh)
Inventor
尹美娟
段顺然
刘粉林
焦隆隆
于岚岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Engineering University of PLA Strategic Support Force
Original Assignee
Information Engineering University of PLA Strategic Support Force
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Engineering University of PLA Strategic Support Force filed Critical Information Engineering University of PLA Strategic Support Force
Priority to CN202210651604.7A priority Critical patent/CN114970736A/en
Publication of CN114970736A publication Critical patent/CN114970736A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2415Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/047Probabilistic or stochastic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to the technical field of communication network detection, and particularly relates to a network node depth anomaly detection method based on density estimation, which comprises the steps of obtaining a node attribute matrix and a structure matrix in an attribute network, inputting the attribute matrix and the structure matrix as a graph convolution neural network, and obtaining a joint embedded vector of node structure information and attribute information in the attribute network by utilizing the graph convolution neural network; reconstructing a node attribute matrix and a structure matrix input by the graph convolution neural network respectively by using the joint embedded vector, and acquiring a node reconstruction error; and detecting node anomalies in the attribute network by utilizing a probability distribution model aiming at the joint embedded vector and the node reconstruction error. The method is based on the thought of detecting the abnormal node by the reconstruction error, reconstructs the structure information and the attribute information of the attribute network respectively, utilizes density estimation to detect the abnormal node based on the reconstruction error of the node and the embedded vector of the node, has better robustness and is convenient for practical scene application.

Description

Network node depth anomaly detection method based on density estimation
Technical Field
The invention belongs to the technical field of communication network detection, and particularly relates to a network node depth anomaly detection method based on density estimation.
Background
Attribute networks are widely present in various fields in the real world, from academic networks to social networks, from protein interaction networks to medical health systems. The simple network can only present the mutual dependency relationship between the nodes, and the attribute network not only describes the dependency relationship between the nodes, but also the nodes often contain rich characteristic information. For example, in an academic network, the attribute network can not only reflect the cooperation relationship among scholars, but also depict the research direction, the number of writings, the quoted condition and other information of each scholars; in the social network, the attribute network can simultaneously depict the friend relationship or communication relationship between users and the characteristic information of the users, such as the interest points, the text sending condition, the praise condition and the like of the users. The information contained by the nodes has an important role in knowledge mining on network data. The anomaly detection on the network data is a hot problem of network science, and has wide application scenarios in real life, such as intrusion detection in network space security, abnormal account detection on a social network, fraud detection in the financial field, and the like. In the actual anomaly detection process, not only the interdependence relation between the network nodes but also the characteristic information of the nodes are considered, and how to effectively process the multi-mode information is the key point of anomaly detection on the attribute network. The attribute network has strong advantages for data modeling containing different modal information, so in recent years, a plurality of methods for detecting the abnormality of the attribute network data emerge, abnormal nodes on the attribute network can be expressed as nodes with node patterns significantly deviating from those of most other nodes, and the abnormality of the node patterns is mainly embodied in two aspects: firstly, the connection structure around the node is abnormal; and secondly, the attribute of the node is abnormal.
According to the difference of information considered when detecting an abnormality, the existing abnormality detection methods can be classified into three categories: the method comprises the steps of anomaly detection based on the characteristics of nodes, anomaly detection based on self-centering network or community division, and anomaly detection based on network embedding. The abnormal detection method based on the characteristics of the nodes needs to select key characteristics capable of accurately finding out abnormal nodes, and then performs abnormal detection by using a statistical method. The anomaly detection method based on the self-centering network or community division is characterized in that for each node, a specific function model is used for depicting the dependency relationship between certain aspect characteristics of the node and other node characteristics of the self-centering network or the same community, and if the dependency relationship function corresponding to the node is obviously deviated from the dependency relationship functions corresponding to most other nodes, the node is regarded as an abnormal node. The method for detecting the abnormality based on network embedding comprises the steps of firstly, embedding network nodes into a low-dimensional vector space by using a specific network embedding method, enabling each node to correspond to one point in the low-dimensional vector space and to be called as an embedded vector of the node, and then carrying out abnormality detection based on the embedded vector of the node.
Although the existing methods achieve better effects under specific conditions, the following challenges are still faced when processing attribute network data: (1) and (4) data sparsity. The sparsity of data is mainly caused by two reasons: firstly, sparsity of data itself, such as the famous display of "dungba number" in social network research, "generally, a human individual can maintain a stable social relationship with 150 others at most," and therefore, as the scale of social networks is enlarged, social networks are inevitably sparse; secondly, the data acquisition is incomplete, and due to privacy protection and the data acquisition cost, it is difficult to ensure that all data of a specific network is acquired. The first two methods have high dependence on data, and sparse network data can bring great challenges to the first two abnormal detection methods. And (2) complex modal interaction. The connection relationship between nodes in the attribute network and the characteristic information of the nodes are usually from different information sources, but the information is not mutually independent, that is, the characteristic information of the nodes and the topological structures around the nodes are mutually influenced to a certain extent, and how to depict the interaction relationship between different information and integrate the interaction relationship into the same characteristic space is a difficult point for processing the attribute network. (3) Structural and attribute anomalies are confounded. In a real situation, the structural abnormality and the attribute abnormality are often not equivalent, the node attribute feature of the structural abnormality is not necessarily abnormal, and vice versa, if the attribute abnormality and the structural abnormality can be detected respectively, the classification of the abnormality can be refined, the interference of the attribute feature on the abnormality judgment can be reduced for the node with the structural abnormality, and the interference of the structural feature on the abnormality judgment can be reduced for the node with the structural abnormality.
Disclosure of Invention
Therefore, the invention provides a network node depth anomaly detection method based on density estimation, which reconstructs the structure information and the attribute information of an attribute network respectively based on the idea of reconstructing error detection anomaly nodes, utilizes density estimation to realize anomaly node detection based on reconstruction errors of nodes and self embedded vectors, has better robustness and is convenient for practical scene application.
According to the design scheme provided by the invention, a network node depth anomaly detection method based on density estimation is provided, which comprises the following contents:
acquiring a node attribute matrix and a structure matrix in an attribute network, inputting the attribute matrix and the structure matrix as a graph convolution neural network, and acquiring joint embedded vectors of node structure information and attribute information in the attribute network by using the graph convolution neural network;
reconstructing a node attribute matrix and a structure matrix input by the graph convolution neural network respectively by using the joint embedded vector, and acquiring a node reconstruction error;
and detecting node anomalies in the attribute network by utilizing a probability distribution model aiming at the joint embedded vector and the node reconstruction error.
The method for detecting the network node depth anomaly based on the density estimation further comprises the step of representing the attribute network as G ═ V, E and X >, wherein V represents a node set of the attribute network G, E represents an attribute network connecting edge set, X represents an attribute network node attribute matrix, and A represents an attribute network structure matrix.
As the network node depth anomaly detection method based on density estimation, further, when acquiring the joint embedding vector, acquiring the node embedding vector containing the neighbor information by using a graph convolution neural network formed by stacking k neural network layers and through iterative computation.
As the method for detecting the depth anomaly of the network node based on the density estimation, further, a graph convolution neural network with three neural network layers stacked is adopted, and the iterative computation process is expressed as follows:
Figure BDA0003687908770000031
Figure BDA0003687908770000032
wherein the content of the first and second substances,
Figure BDA0003687908770000033
h 0 is an attribute matrix X characteristic dimension, h 1 Is a hidden layer feature dimension;
Figure BDA0003687908770000034
h (i) is a node feature matrix calculated by the ith layer, i belongs to {1,2,3}, Z is a finally obtained node embedding vector, h 3 Embed vector dimensions for nodes, and H (3) The feature vector in (1) contains the third-order neighbor information of the node.
As a network node depth anomaly detection method based on density estimation, an activation function tanh (-) or sigmoid (-) is further selected as a prediction function of a structural matrix in the node reconstruction error acquisition, and attribute matrix prediction is carried out by means of a graph convolution neural network formed by stacking three neural network layers; and acquiring reconstruction errors of the structure information and the attribute information according to the structure matrix and the attribute matrix and the prediction results of the structure matrix and the attribute matrix.
As the network node depth anomaly detection method based on density estimation, the invention further adopts the similarity between node vectors to measure the reconstruction errors between the node structure matrix and the attribute matrix and the corresponding prediction results of the node structure matrix and the attribute matrix.
As the network node depth anomaly detection method based on density estimation, a Gaussian mixture model is further adopted as a probability distribution model for detecting node anomaly in the attribute network, and the density estimation of attribute information and structural information in the attribute network is completed by solving the Gaussian mixture model; and acquiring abnormal nodes according to the probability distribution in the density estimation result.
As the method for detecting the depth anomaly of the network node based on the density estimation, disclosed by the invention, further, in the process of solving the Gaussian mixture model, the node joint embedded vector is taken as input, the probability that the node belongs to each sub-distribution of the Gaussian mixture model is taken as output, and a multilayer perceptron is utilized to carry out model solution.
As the method for detecting the depth anomaly of the network node based on the density estimation, further, the density estimation process of the node attribute information is represented as follows:
Figure BDA0003687908770000035
the density estimation process of the node structure information is expressed as follows:
Figure BDA0003687908770000036
wherein z is x 、 z a Representing attribute information and structure information of the attribute network node, respectively, representing vectors, z xr 、z ar Respectively representing reconstruction errors of the attribute information and the structural information, and MLP () representing a multi-layer perceptron solution.
The method for detecting the depth anomaly of the network node based on density estimation comprises the steps of constructing a depth anomaly detection model frame, acquiring a joint embedded vector and a node reconstruction error by using the depth anomaly detection model frame, and detecting the anomaly of the network node; wherein, the depth anomaly detection model framework comprises: graph convolution neural network for obtaining joint embedding vector, probability distribution model for detecting node abnormityAnd an information reconstruction network for obtaining a node reconstruction error; the objective loss function of the model framework is expressed as:
Figure BDA0003687908770000041
where N represents the number of samples, θ edm Network parameters of the graph convolutional neural network, the probability distribution model and the information reconstruction network are respectively represented; r is A/X Indicating structural information reconstruction error R A Or attribute information reconstruction error R X And it takes on the value of R X Or R A ;λ 12 To preset the hyper-parameter, E (z) i ) Representing sample value z i The energy of (a) is,
Figure BDA0003687908770000042
wherein K represents the number of Gaussian components in the Gaussian mixture model, d represents the dimension of the node representation vector,
Figure BDA0003687908770000043
The jth element on the main diagonal in the covariance matrix representing the kth gaussian component.
The invention has the beneficial effects that:
the invention respectively carries out structure abnormal node detection and attribute abnormal node detection aiming at an attribute network, utilizes GCN to realize the joint embedding of attribute network structure information and attribute information, further realizes the reconstruction of network structure information by means of a hyperbolic tangent function, realizes the reconstruction of network attribute information by means of GCN, splices the self-embedded vector of the node reconstruction error as the final vector representation of the node, carries out density estimation by GMM based on the final vector representation of the node, further discovers abnormal nodes, can consider the relation between the structure information and the attribute information in the attribute network, and can well distinguish the type of the abnormal node, namely, the attribute abnormality or the structure abnormality; and further, experimental verification is carried out on a common data set, so that the method has better robustness and practicability.
Description of the drawings:
FIG. 1 is a schematic diagram of a network node deep anomaly detection process based on density estimation in an embodiment;
FIG. 2 is a schematic diagram of a depth anomaly detection model framework in an embodiment;
FIG. 3 is a graph showing sigmoid (. smallcircle.) function and tanh (. smallcircle.) function in the embodiment;
FIG. 4 is a graph showing the variation of AIC with GMM parameter K under different data in the examples.
The specific implementation mode is as follows:
in order to make the objects, technical solutions and advantages of the present invention clearer and more obvious, the present invention is further described in detail below with reference to the accompanying drawings and technical solutions.
The research aiming at the problem of abnormal node detection in the attribute network has wide application fields in life, such as: social networks, cyberspace security, financial fields, etc. Most of the existing attribute network abnormal node detection methods ignore the relation between the structure information and the attribute information in the attribute network; although some methods consider the relationship between the two, the types of the abnormal nodes, namely the attribute abnormality or the structural abnormality, cannot be distinguished well. An embodiment of the present invention, as shown in fig. 1, provides a method for detecting a deep anomaly of a network node based on density estimation, which includes the following steps:
s101, acquiring a node attribute matrix and a structure matrix in an attribute network, inputting the attribute matrix and the structure matrix as a graph convolution neural network, and acquiring joint embedded vectors of node structure information and attribute information in the attribute network by using the graph convolution neural network;
s102, reconstructing a node attribute matrix and a structure matrix input by the graph convolution neural network by using the joint embedded vector, and acquiring a node reconstruction error;
and S103, detecting node abnormality in the attribute network by utilizing a probability distribution model aiming at the joint embedded vector and the node reconstruction error.
The method comprises the steps of respectively carrying out structure abnormal node detection and attribute abnormal node detection aiming at an attribute network, realizing the joint embedding of attribute network structure information and attribute information by using GCN, respectively carrying out reconstruction aiming at the structure information and the attribute information of the attribute network based on the idea of detecting abnormal nodes by reconstruction errors, and realizing the abnormal node detection by using density estimation based on the reconstruction errors of the nodes and self-embedded vectors, so that the method has better robustness and is convenient for practical scene application.
For convenience of description, the attribute network G is recorded as<V,E,X>Wherein V ═ { V ═ V 1 ,v 2 ,v 3 ,…,v n Denotes a set of nodes of the network G, v i Denotes the ith node, n ═ V | denotes the total number of nodes in the network G,
Figure BDA0003687908770000052
represents a set of network edges, if v i And v j If there is a continuous edge, the edge is marked as e i,j Property of node
Figure BDA0003687908770000051
The adjacency matrix of the network G is denoted A, A i,j 1 represents v i And v j There is a connecting edge, otherwise A i,j =0。
By constructing a depth anomaly detection DADDE model frame, as shown in FIG. 2, obtaining a joint embedding vector and a node reconstruction error by using the depth anomaly detection model frame and performing network node anomaly detection; wherein, the depth anomaly detection model framework comprises: the system comprises a graph convolution neural network for obtaining a joint embedded vector, a probability distribution model for detecting node abnormity and an information reconstruction network for obtaining node reconstruction errors. In the model framework, a node embedding vector containing neighbor information can be obtained by using a graph convolution neural network formed by stacking k neural network layers and through iterative computation. The method comprises the steps that a structure matrix A and an attribute matrix X of an attribute network are used as input, joint embedding of attribute network structure information and attribute information is achieved by using GCN, the attribute information of a node is used as initial feature representation of the node, in the process of carrying out each round of GCN calculation by means of the structure matrix A, new node features comprise information of first-order neighbors of the node, and therefore the node features after n rounds of GCN calculation comprise information of n-order neighbors of the node. After the embedded vectors of the nodes are obtained, the input structure matrix A and the attribute matrix X are respectively reconstructed based on the embedded vectors, the numerical values in the structure matrix A are continuous in consideration of the difference of the data characteristics of the structure matrix A and the attribute matrix X, the attribute information is reconstructed by selecting a GCN network, the numerical values in the attribute matrix X can only be 0 or 1, and the structure information is reconstructed by selecting a sigmoid function. In view of the fact that information included in the expression vector of the node itself has an auxiliary effect on the determination of the abnormal node, in the embodiment of the present invention, the error splicing node expression vector can be reconstructed by using the node as the final expression vector of the node. Based on the final expression vector of the node, abnormal nodes can be detected by using a density estimation method, firstly, a data point is supposed to meet a specific probability distribution model, the best fitting parameter of the probability model is obtained by means of maximization of a likelihood function, and then the node obviously deviating from the probability model, namely the abnormal node, is found.
The attribute network simultaneously contains information of both network structure and node attribute, in most cases, the information of the two aspects is not mutually isolated, and the structure information of the network and the attribute information of the node are mutually influenced, for example, in a social network, attribute information of user's hobbies, sex, age and the like can influence the online friend-making behavior of the user, thereby influencing the evolution of the network structure, and vice versa, the social network friends of the user also influence the attribute information of user's hobbies and the like to a certain extent. Therefore, when network embedding is carried out, the relation between the two can not be split, information embedding is carried out respectively, so that the embedded vector can only keep unilateral information, an overfitting phenomenon is easy to occur, information on the other side is ignored, and the actual situation of the attribute network is not met. Therefore, in the embodiment of the scheme, GCN is selected to realize the joint embedding of the attribute network structure information and the attribute information.
From a mathematical point of view, the GCN extends the convolution operation over the spectral domain of the network data and computes a potential representation vector of the hierarchy of the network by means of a spectral convolution function. From the perspective of a neural network, the GCN is formed by stacking k neural network layers, where k determines the order of neighbor information included in a final embedding vector when the GCN performs network embedding, and the propagation manner between layers in the GCN can be represented by the following formula:
Figure BDA0003687908770000061
wherein H (l) Is the input matrix of the first convolutional layer, H (0) X, wherein H (0) An input matrix representing an input layer, X representing a node attribute matrix of an attribute network;
Figure BDA0003687908770000062
a is an adjacent matrix corresponding to the network, and I is an identity matrix; matrix array
Figure BDA0003687908770000063
Is a matrix
Figure BDA0003687908770000064
Degree matrix of, i.e.
Figure BDA0003687908770000065
W (l) The parameter matrix is learned by the ith convolution layer, and the influence degree of neighbor node information on the node information is determined; σ (·) is a nonlinear activation function, and a usable activation function is a ReLU function, ReLU (x) max (0, x). The calculation process of one GCN layer can be divided into two stages: information aggregation and information activation. In formula (1), the information aggregation stage is operated by
Figure BDA0003687908770000066
At this stage, the attribute information of the node and the attribute information of the direct neighbor of the node are aggregated together, and a parameter matrix W is utilized (l) The compression (or expansion) of characteristic dimensions is realized, and the operation of the information aggregation stage is linear because the operation of the information aggregation stage is realized by matrix multiplication; the operation of the information activation phase is to apply a nonlinear activation function σ (-) to the result of information aggregation, and thus the introduced nonlinear transformation is the key that the GCN can learn the nonlinear dependence between data. For formula (1), theTwo points to note are: one is that for a given attribute network, the structure matrix A and attribute matrix X are determined, and thus in the formula
Figure BDA0003687908770000067
The method can be directly calculated before model training, so that the calculation time in the model training process can be reduced; second, the attribute matrix A in GCN is shared by all layers, and the parameter matrix W (l) When the neighbor information is aggregated in the l-th layer, the neighbor information is shared by all nodes. In the embodiment of the present disclosure, the used neural network layer may be formed by stacking three neural networks, that is, the final node expression vector considers information of neighbors within 3 th order of the node, and the calculation process may be expressed as:
Figure BDA0003687908770000071
Figure BDA0003687908770000072
Figure BDA0003687908770000073
wherein the content of the first and second substances,
Figure BDA0003687908770000074
h 0 is the characteristic dimension, h, corresponding to the attribute matrix X 1 Is the characteristic dimension corresponding to the first hidden layer; in a similar manner, the first and second substrates are,
Figure BDA0003687908770000075
H (i) i ∈ {1,2,3} is the node feature matrix after the ith layer computation, H (3) I.e. the final embedding vector Z, h 3 Is the dimension of the final embedded vector, H (3) The feature vector in (2) contains information of the third-order neighbors of the node.
When the GCN carries out network embedding, the influence of high-order neighbors of the nodes is considered, so that even if attribute information of part of the nodes is lost, the attribute information of the neighbors can be used for making conjecture, and the challenge brought by data sparsity is relieved to a certain extent. On the other hand, the GCN uses the nonlinear activation function ReLU function when aggregating the information of the neighbor nodes, so that the nonlinear dependency relationship between the data can be learned, and the step of aggregating the attribute information based on the structure matrix a takes into account the dependency relationship between the attribute network structure information and the attribute information. Therefore, joint embedding of attribute network structure information and attribute information can be achieved using GCN.
Further, in the embodiment of the present disclosure, in obtaining the node reconstruction error, an activation function tanh (-) or sigmoid (-) is selected as a prediction function of the structural matrix, and the attribute matrix is predicted by means of a graph convolution neural network formed by stacking three neural network layers; and acquiring reconstruction errors of the structure information and the attribute information according to the structure matrix and the attribute matrix and the prediction results of the structure matrix and the attribute matrix. And measuring the reconstruction errors between the node structure matrix and the attribute matrix and the corresponding prediction results by adopting the similarity between the node vectors.
The difference between the original data and the estimated data, also called "reconstruction error", is an important indicator for measuring the degree of abnormality of the data points. For the convenience of description, the predicted structural information is recorded as
Figure BDA0003687908770000076
The predicted attribute information is
Figure BDA0003687908770000077
Error in reconstruction of structural information is
Figure BDA0003687908770000078
Attribute information reconstruction error of
Figure BDA0003687908770000079
The problem of predicting network structure information can be summarized as: given node v i And v j Corresponding embedding vector z i And z j Judging node v i And v j Whether or not there is a connecting edge therebetween, i.e.
Figure BDA00036879087700000710
Whether it is equal to 1. By Ding et al [7]Inspiring of the work, the activation function f (-) is used herein as a prediction function of the structural information a, namely:
Figure BDA0003687908770000081
unlike the sigmoid () activation function, in the embodiment of the present invention, a hyperbolic tangent activation function tanh () may be used, and the final form of the structure information prediction function is shown in formula (6):
Figure BDA0003687908770000082
referring to FIG. 3, the selection of the activation function tanh (-) or sigmoid (-) as the prediction function of the structure information A is determined by the special property of the matrix A, the element A of the matrix A i,j Is {0,1}, and | tanh (·) | is [0,1), sigmoid (·) is [0,1), the absolute value of the function always lies in [0,1 ]]Within the interval, the prediction problem for the values of the elements in matrix A can therefore be reduced to finding the appropriate threshold p th So that
Figure BDA0003687908770000083
When the temperature of the water is higher than the set temperature,
Figure BDA0003687908770000084
if not, then,
Figure BDA0003687908770000085
the most important difference between sigmoid (-) and tanh (-) functions is that the tanh (-) function is symmetric about the origin of coordinates. In the range of real number domain, the probability that the dot product result of two vectors is positive or negative is equal, i.e. the dot product result of two vectors is symmetric about the value 0, so the absolute value of the tan h (-) function symmetric about the origin is used as the connecting edge between two nodesThe probability of (2) is more consistent with the actual situation.
The process of network embedding by using the GCN can be regarded as a process of performing dimension reduction on attribute information of each node by using the adjacency matrix a, and therefore, the process of predicting node attribute information by using a final node embedding vector can be regarded as a process of performing dimension expansion on each node embedding vector. Based on the above-mentioned introduction, in the embodiment of the present application, the node attribute information is predicted by using the GCN, and similar to the attribute network embedding process, the attribute information prediction network is still realized by using a three-layer GCN network, but an input layer in the attribute network embedding process is used as an output layer of the prediction network, and an output layer in the attribute network embedding process is used as an input layer of the prediction network. The calculation process of the attribute information prediction network comprises the following steps:
Figure BDA0003687908770000086
Figure BDA0003687908770000087
Figure BDA0003687908770000088
prediction matrix based on attribute information
Figure BDA0003687908770000089
And a prediction matrix of structural information
Figure BDA00036879087700000810
The structure information reconstruction error can be expressed as
Figure BDA00036879087700000811
Attribute information reconstruction error of
Figure BDA00036879087700000812
Wherein | · | purple sweet F Frobenius norm representing matrixThe number of the first and second groups is,
Figure BDA00036879087700000813
it is noted that R A And R X The reconstruction error of the network level is measured by respectively referring to the sum of the reconstruction errors of the structure information and the attribute information of all nodes of the whole network, and can be used as a part of a loss function for training a GCN (generalized negative network) network, so that a more accurate embedded vector Z can be obtained. In the process of generating the final expression vector of the node by splicing the reconstruction error of the embedded vector Z, the reconstruction error refers to the reconstruction error at the node level, and the similarity between the vectors is used for measurement, such as Euclidean distance, Manhattan distance, cosine similarity, Jacard similarity, and the like. In the present embodiment, z can be used xr ,z ar Respectively representing reconstruction errors of attribute information and structure information at a node level, z when a plurality of different vector similarity measurement modes are adopted xr ,z ar Is multi-dimensional.
Further, in the embodiment of the scheme, a Gaussian mixture model is adopted as a probability distribution model for detecting node abnormality in the attribute network, and the density estimation of attribute information and structural information in the attribute network is completed by solving the Gaussian mixture model; and acquiring abnormal nodes according to the probability distribution in the density estimation result.
At present, a lot of related work is carried out to find abnormal nodes by researching reconstruction errors, and good effects are obtained. However, when the representation learning model used is high in complexity or the data itself has noisy data with a complex structure, a large number of abnormal samples may appear to exhibit a normal level of error, and the challenges presented thereby can be successfully addressed by considering the embedded vectors and reconstruction errors of the nodes themselves. Based on the above teaching, in the embodiment of the present disclosure, a node reconstruction error splicing node itself embedded vector is adopted as a final node expression vector. The density estimation method is a common method for discovering abnormal nodes based on low-dimensional embedded vectors. The density estimation means: given a finite number of sample points x 1 ,x 2 ,x 3 ,…,x n Modeling the probability distribution p (x) of the variable x, where outliers refer to samplesSample points in the set that have a lower probability of occurring.
In the embodiment of the present invention, the probability distribution Model for modeling the node embedding vector may be a Gaussian Mixture Model (GMM), which is a common Model for simulating joint distribution of multiple random variables. GMM is a combination of K gaussian distributions with a probability distribution of the form p (x | Θ) ═ Σ k α k N(x;μ kk ) Wherein
Figure BDA0003687908770000091
Is the probability coefficient of the kth sub-distribution, N (x; mu) kk ) Is expected to be mu k Standard deviation of σ k With a gaussian distribution of (a) (-), (a) 12 ,…,α K ;μ 12 ,…,μ K ;σ 12 ,…,σ K ) The process of density estimation is the process of solving the GMM parameters Θ, and the process of solving Θ is usually solved alternately by an Expectation-Maximization (EM) algorithm. However, the idea of alternative solution splits the embedding step of the attribute network and the density estimation process based on the node embedding vector, joint optimization is difficult to achieve in the training process, and in order to meet the challenge, a GMM (Gaussian mixture model) can be solved by using a single neural network, and a better effect is achieved. Therefore, in the embodiment of the present disclosure, a Multi-Layer Perceptron (MLP) is used to solve the GMM model, and the MLP takes the embedded vector of the node as an input and outputs the probability that the node belongs to each sub-distribution of the GMM. The density estimation process for network attribute information can be expressed as:
Figure BDA0003687908770000092
the density estimation process for the network structure information can be expressed as:
Figure BDA0003687908770000093
wherein z is x ,z a Final representation vectors, z, representing network attribute information and structure information, respectively xr ,z ar Respectively representing reconstruction errors of the attribute information and the structure information. Given N samples and the probability that they belong to a sub-distribution K, K is greater than or equal to 1 and less than or equal to K
Figure BDA0003687908770000101
The parameters of the GMM model can be estimated by:
Figure BDA0003687908770000102
wherein the content of the first and second substances,
Figure BDA0003687908770000103
is node v i Is finally embedded vector z i The corresponding probabilities belonging to the respective sub-distributions,
Figure BDA0003687908770000104
the probability coefficient, expectation and covariance corresponding to the kth sub-distribution of the GMM model are respectively, and the sub-distribution is regarded as a multivariate gaussian distribution. Based on the predicted GMM parameter value, the sample energy may be calculated by:
Figure BDA0003687908770000105
where | · | represents the determinant of the square matrix. The sample energy reflects the probability of the occurrence of the sample, the greater the sample energy, the lower the probability of the occurrence of the sample.
Given N samples x 1 ,x 2 ,x 3 ,…,x n The finding of anomalies from the perspective of attribute information and the finding of anomalies from the perspective of structural information are done separately, but the form of the penalty function is consistent, and therefore, the penalty function can be expressed as:
Figure BDA0003687908770000106
wherein, theta e Refers to the parameter of the GCN network in the attribute network embedding step, theta m Refers to the parameter, θ, of the MLP network used to solve the GMM parameter d The parameters of the information reconstruction network in the reconstruction error calculation step are as follows: when reconstructing the attribute information, θ d Refers to a GCN network for attribute information reconstruction; when the structural information is reconstructed, θ d Refers to a decision threshold p in the tanh (-) function for structure information reconstruction th . Equation (14) consists of three parts: in the first part, R A/X Indicating structural information reconstruction error R A Or attribute information reconstruction error R X . When an anomaly is found for attribute information, R A/X Is taken as R X (ii) a When an anomaly is found for structural information, R A/X Is taken as R A . Intuitively understand that the smaller the reconstruction error, the more the node embedded vector can contain the key information in the node, and the more accurate the embedded vector can depict the node. In the second part, E (z) i ) Representing the energy of the sample values, the probability of observation of the sample values can be maximized by minimizing the sample energy, which can make the estimation of the GMM parameters by the MLP network more accurate. Introduction of the third part
Figure BDA0003687908770000107
The method aims to solve the singular point problem existing in the GMM: when the diagonal terms of the covariance matrix approach 0, a trivial solution may result, such that the parameters of the GMM model are no longer updated. Here, can be provided with
Figure BDA0003687908770000111
The problem caused by the fact that the number of the diagonal terms of the covariance matrix is too small is avoided. Parameter λ in formula (14) 12 Can be specified as hyper-parameter by human, and in the experiment, can set lambda 1 =0.1,λ 2 =0.001。
To verify the validity of the scheme, the following explanation is made with reference to the common data set:
three data sets widely used in the existing research in this field are selected, and as shown in table 1, since abnormal data does not exist in the data sets, abnormal data can be injected into the data sets for experimental verification. The commonly used abnormal injection method is selected: method for changing network part topological node
TABLE 1 data set information statistics Table
BlogCatalog Flickr ACM
Number of nodes 5196 7575 16484
Number of edges 171743 239738 71980
Total number of abnormal nodes 270 390 810
Abnormal node occupation ratio 5.2% 5.1% 4.9%
The experiment adopts the precision P, the recall ratio R and the F1 values commonly used in the field of data classification as evaluation indexes, and the precision P, the recall ratio R and the F1 values can be respectively calculated by taking the abnormal category in the data as a positive example according to a confusion matrix of classification results:
in the experiment, the learning rate of the DADDE model is set to be 0.0001, the GCN used in the attribute network embedding step is set to be a three-layer structure, and the number of neurons in each layer is respectively
Figure BDA0003687908770000112
The GCN network used for predicting the node attribute information in reconstruction error calculation is also set into a three-layer structure, and the number of neurons in each layer of the network is
Figure BDA0003687908770000113
And satisfy
Figure BDA0003687908770000114
Node reconstruction errors are measured by using Manhattan distance and cosine similarity: given a sample x and a predicted value x' thereof, the calculation formula of the Manhattan distance is sigma i |x i -x′ i The formula for calculating the cosine similarity is
Figure BDA0003687908770000115
In the density estimation step, the number of GMM sub-distributions is recorded as K, MLP is set as a three-layer network structure, and the number of neurons in each layer is recorded as
Figure BDA0003687908770000116
Setting dropout to be 0.2, performing model optimization by adopting an Adam algorithm in a training process, marking nodes 3% of the abnormal degree as abnormal nodes, and marking nodes 6% of the abnormal degree as abnormal nodes in a DOMINAT model, wherein the DOMINAT model can simultaneously detect the abnormal nodes of attributes and the abnormal nodes of structures, the quantity of the two abnormal nodes in the data set is equal, and therefore, the threshold value of the DOMINAT model is equal to that of the abnormal nodes in the data setShould be twice the threshold of the DADDE model. The number of network layer neurons of the DADDE and the value of K are shown in Table 2:
TABLE 2 network layer neuron number table of DADDE
Figure BDA0003687908770000117
Figure BDA0003687908770000121
In the experiment, the K value can be selected according to the red blood pool information quantity criterion, the red blood pool information quantity criterion (AIC) is a standard for measuring the complexity of a statistical model and the fitting superiority and inferiority of the model, and the smaller the AIC value is, the better the model performance is. Fig. 4 is a graph showing the variation of the AIC value with the GMM model parameter K under the structural information data and the attribute information data of BlogCatalog, Flickr, and ACM, and it can be seen from fig. 4 that the structural information data of BlogCatalog obtains the best fit effect when K is 3, and the rest data obtain the best fit effect when K is 2.
The experiment was performed with statistics on structural and attribute anomalies in the dataset, respectively, with the results shown in table 3:
TABLE 3 precision P, recall R and F1 values corresponding to different anomaly detection methods
Figure BDA0003687908770000122
The horizontal line "-" in the table indicates that the corresponding anomaly detection method cannot be applied to the corresponding data type, for example, the SCAN method finds an anomaly with respect to the network structure information and cannot be applied to the network attribute data. As can be seen from table 3, the DADDE model has the optimal effect on the class 4(4/6) data, the DOMINANT model and the OC-SVM each have the optimal effect on the class 1(1/6) data set, the accuracy P, the recall R, and the F1 values of the SCAN and the LOF are not good enough, and the optimal effect on any data set is not obtained, and the OC-SVM based on the kernel technique is superior to the conventional density-based anomaly detection method LOF in performance, but due to the challenge caused by data sparsity, the OC-SVM is difficult to accurately depict the key features of the network node attribute information, and the anomaly detection performance of the method is limited. The DADDE model and the DOMINAT model essentially sort the network nodes from high to low according to the abnormal degree, and judge the abnormal nodes through the artificially specified threshold value, so that the recall rate of the model can be improved by reducing the judgment threshold value in the application scene needing higher recall rate, and on the contrary, the accuracy rate of the model can be improved by improving the judgment threshold value.
Unless specifically stated otherwise, the relative steps, numerical expressions, and values of the components and steps set forth in these embodiments do not limit the scope of the present invention.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A network node depth anomaly detection method based on density estimation is characterized by comprising the following contents:
acquiring a node attribute matrix and a structure matrix in an attribute network, inputting the attribute matrix and the structure matrix as a graph convolution neural network, and acquiring joint embedded vectors of node structure information and attribute information in the attribute network by using the graph convolution neural network;
reconstructing a node attribute matrix and a structure matrix input by the graph convolution neural network respectively by using the joint embedded vector, and acquiring a node reconstruction error;
and detecting node anomalies in the attribute network by utilizing a probability distribution model aiming at the joint embedded vector and the node reconstruction error.
2. The method of claim 1, wherein the attribute network is represented as G ═ V, E, X >, where V represents a set of nodes in the attribute network G, E represents a set of edges in the attribute network, X represents an attribute network node attribute matrix, and A represents an attribute network structure matrix.
3. The method according to claim 1 or 2, wherein when obtaining the joint embedding vector, a node embedding vector containing neighbor information is obtained by iterative computation using a convolutional neural network formed by stacking k neural network layers.
4. The method for detecting the depth anomaly of the network node based on the density estimation according to the claim 3, characterized in that a graph convolution neural network with three neural network layers stacked is adopted, and the iterative computation process is expressed as follows:
Figure FDA0003687908760000011
Figure FDA0003687908760000012
wherein the content of the first and second substances,
Figure FDA0003687908760000013
h 0 is an attribute matrix X characteristic dimension, h 1 Is a hidden layer feature dimension;
Figure FDA0003687908760000014
H (i) is a node feature matrix calculated by the ith layer, i belongs to {1,2,3}, Z is a finally obtained node embedding vector, h 3 Embed vector dimensions for nodes, and H (3) The feature vector in (1) contains the third-order neighbor information of the node.
5. The method for detecting the depth anomaly of the network node based on the density estimation according to claim 1, wherein in the acquisition of the reconstruction error of the node, an activation function tanh (-) or sigmoid (-) is selected as a prediction function of a structural matrix, and the prediction of the attribute matrix is performed by means of a graph convolution neural network with three neural network layers stacked; and acquiring reconstruction errors of the structure information and the attribute information according to the structure matrix and the attribute matrix and the prediction results of the structure matrix and the attribute matrix.
6. The method for detecting the depth anomaly of the network node based on the density estimation according to the claim 1 or 5, characterized in that the similarity between the node vectors is adopted to measure the reconstruction error between the node structure matrix and the attribute matrix and the corresponding prediction results.
7. The method for detecting the depth anomaly of the network node based on the density estimation according to the claim 1, characterized in that a Gaussian mixture model is adopted as a probability distribution model for detecting the anomaly of the node in the attribute network, and the density estimation of the attribute information and the structure information in the attribute network is completed by solving the Gaussian mixture model; and acquiring abnormal nodes according to the probability distribution in the density estimation result.
8. The method as claimed in claim 7, wherein in the solving of the Gaussian mixture model, the joint embedded vectors of the nodes are used as input, the probability that the nodes belong to each sub-distribution of the Gaussian mixture model is used as output, and the model solving is performed by using a multilayer perceptron.
9. According to claim 8The network node depth anomaly detection method based on density estimation is characterized in that the density estimation process of the node attribute information is expressed as follows:
Figure FDA0003687908760000021
the density estimation process of the node structure information is expressed as:
Figure FDA0003687908760000022
wherein z is x 、z a Representing attribute information and structure information of the attribute network node, respectively, representing vectors, z xr 、z ar Respectively representing reconstruction errors of the attribute information and the structure information, and MLP () representing a multi-layer perceptron solution.
10. The method for detecting the depth anomaly of the network node based on the density estimation as claimed in claim I, wherein a depth anomaly detection model frame is constructed, and the depth anomaly detection model frame is utilized to obtain a joint embedding vector and a node reconstruction error and carry out network node anomaly detection; wherein, the depth anomaly detection model framework comprises: the system comprises a graph convolution neural network for acquiring a joint embedded vector, a probability distribution model for detecting node abnormity and an information reconstruction network for acquiring node reconstruction errors; the objective loss function of the model framework is expressed as:
Figure FDA0003687908760000023
where N represents the number of samples, θ e ,θ d ,θ m Network parameters of the graph convolutional neural network, the probability distribution model and the information reconstruction network are respectively represented; r A/x Indicating structural information reconstruction error R A Or attribute information reconstruction error R x And it takes on the value of R X Or R A ;λ 1 ,λ 2 To preset the hyperparameter, E (z) i ) Representing sample value z i The energy of (a) is,
Figure FDA0003687908760000024
wherein K represents the number of Gaussian components in the Gaussian mixture model, d represents the dimension of the node representation vector,
Figure FDA0003687908760000025
The jth element on the main diagonal in the covariance matrix representing the kth gaussian component.
CN202210651604.7A 2022-06-10 2022-06-10 Network node depth anomaly detection method based on density estimation Pending CN114970736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210651604.7A CN114970736A (en) 2022-06-10 2022-06-10 Network node depth anomaly detection method based on density estimation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210651604.7A CN114970736A (en) 2022-06-10 2022-06-10 Network node depth anomaly detection method based on density estimation

Publications (1)

Publication Number Publication Date
CN114970736A true CN114970736A (en) 2022-08-30

Family

ID=82961229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210651604.7A Pending CN114970736A (en) 2022-06-10 2022-06-10 Network node depth anomaly detection method based on density estimation

Country Status (1)

Country Link
CN (1) CN114970736A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117407697A (en) * 2023-12-14 2024-01-16 南昌科晨电力试验研究有限公司 Graph anomaly detection method and system based on automatic encoder and attention mechanism
CN117495571A (en) * 2023-12-28 2024-02-02 北京芯盾时代科技有限公司 Data processing method and device, electronic equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117407697A (en) * 2023-12-14 2024-01-16 南昌科晨电力试验研究有限公司 Graph anomaly detection method and system based on automatic encoder and attention mechanism
CN117407697B (en) * 2023-12-14 2024-04-02 南昌科晨电力试验研究有限公司 Graph anomaly detection method and system based on automatic encoder and attention mechanism
CN117495571A (en) * 2023-12-28 2024-02-02 北京芯盾时代科技有限公司 Data processing method and device, electronic equipment and storage medium
CN117495571B (en) * 2023-12-28 2024-04-05 北京芯盾时代科技有限公司 Data processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110532436B (en) Cross-social network user identity recognition method based on community structure
Langone et al. Incremental kernel spectral clustering for online learning of non-stationary data
CN114970736A (en) Network node depth anomaly detection method based on density estimation
Wang et al. Consistent multiple graph embedding for multi-view clustering
Olteanu et al. On-line relational and multiple relational SOM
CN113918833B (en) Product recommendation method realized through graph convolution collaborative filtering of social network relationship
CN113050931A (en) Symbolic network link prediction method based on graph attention machine mechanism
CN113918834B (en) Graph convolution collaborative filtering recommendation method fusing social relations
Zhu et al. Community detection in graph: an embedding method
Hooshyar et al. Clustering algorithms in an educational context: An automatic comparative approach
Ma et al. SNEGAN: Signed network embedding by using generative adversarial nets
Zhao et al. Statistical inference for community detection in signed networks
Gond et al. A survey of machine learning-based approaches for missing value imputation
Zhu et al. Anomaly detection with deep graph autoencoders on attributed networks
Hua et al. Clustering ensemble model based on self‐organizing map network
Wu et al. Learning from biased crowdsourced labeling with deep clustering
Wang et al. Dual structural consistency preserving community detection on social networks
Wang et al. Joint latent space model for social networks with multivariate attributes
Pan et al. A simultaneous variable selection methodology for linear mixed models
Tang et al. Cold-start link prediction integrating community information via multi-nonnegative matrix factorization
Piraveenan et al. On congruity of nodes and assortative information content in complex networks
Cortés et al. A deep neural network architecture to estimate node assignment costs for the graph edit distance
Tsai et al. Improving measurement invariance assessments in survey research with missing data by novel artificial neural networks
Arya et al. Structural reconstruction of signed social networks
Nagy Data-driven analysis of fractality and other characteristics of complex networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination