A comprehensive survey on graph anomaly detection with deep learning

X Ma, J Wu, S Xue, J Yang, C Zhou… - … on Knowledge and …, 2021 - ieeexplore.ieee.org
Anomalies are rare observations (eg, data records or events) that deviate significantly from
the others in the sample. Over the past few decades, research on anomaly mining has …

[KNIHA][B] An introduction to outlier analysis

CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …

Robust anomaly detection for multivariate time series through stochastic recurrent neural network

Y Su, Y Zhao, C Niu, R Liu, W Sun, D Pei - Proceedings of the 25th ACM …, 2019 - dl.acm.org
Industry devices (ie, entities) such as server machines, spacecrafts, engines, etc., are
typically monitored with multivariate time series, whose anomaly detection is critical for an …

Holmes: real-time apt detection through correlation of suspicious information flows

SM Milajerdi, R Gjomemo, B Eshete… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
In this paper, we present HOLMES, a system that implements a new approach to the
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …

Kairos: Practical intrusion detection and investigation using whole-system provenance

Z Cheng, Q Lv, J Liang, Y Wang, D Sun… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Provenance graphs are structured audit logs that describe the history of a system's
execution. Recent studies have explored a variety of techniques to analyze provenance …

Generative adversarial active learning for unsupervised outlier detection

Y Liu, Z Li, C Zhou, Y Jiang, J Sun… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Outlier detection is an important topic in machine learning and has been used in a wide
range of applications. In this paper, we approach outlier detection as a binary-classification …

Unicorn: Runtime provenance-based detector for advanced persistent threats

X Han, T Pasquier, A Bates, J Mickens… - arxiv preprint arxiv …, 2020 - arxiv.org
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …

Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks

W Yu, W Cheng, CC Aggarwal, K Zhang… - Proceedings of the 24th …, 2018 - dl.acm.org
Massive and dynamic networks arise in many practical applications such as social media,
security and public health. Given an evolutionary network, it is crucial to detect structural …

Outlier detection using iterative adaptive mini-minimum spanning tree generation with applications on medical data

J Li, J Li, C Wang, FJ Verbeek, T Schultz… - Frontiers in Physiology, 2023 - frontiersin.org
As an important technique for data pre-processing, outlier detection plays a crucial role in
various real applications and has gained substantial attention, especially in medical fields …

Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise

F Liu, Y Wen, D Zhang, X Jiang, X **ng… - Proceedings of the 2019 …, 2019 - dl.acm.org
Conventional attacks of insider employees and emerging APT are both major threats for the
organizational information system. Existing detections mainly concentrate on users' behavior …