Anomalous User Detection in Social Network using Graph Neural Networks (GNN)
Introduction
Graph neural networks apply the predictive power of deep learning to rich data structures that depict objects and their relationships as points connected by lines in a graph. In GNNs, data points are called nodes, which are linked by lines — called edges — with elements expressed mathematically so machine learning algorithms can make useful predictions at the level of nodes, edges or entire graphs. An expanding list of companies is applying GNNs to improve drug discovery, fraud detection and recommendation systems. These applications and many more rely on finding patterns in relationships among data points.
Social media has become one of the largest epidemics in the World. Some of the social networks like Facebook, Instagram, Twitter etc… have become more popular means of communication. Social media is expanding & growing like something trending in the world. It allows the users to create their own profiles, communicate with the user and share their information, status, photos and videos. Social media application has become daily activities for the user and also helps in the business world, advertisement, and journalism and these are all indirectly depending upon the user’s opinions. This popularity of social media became a black market that spoils the trust between users . These social media applications become illegal services for malicious users or fake users through daily conversations, comments, life tagging and sharing URLs as depicted in figure.
Traditional Approaches
Traditional approaches to anomalous user detection mainly concentrate on the explicit account information (nickname, head portrait etc.) collected from users’ activities, and only treat users as isolated individuals. Furthermore, as a result of evolving techniques about generative adversarial networks(GANs), anomalous users are able to imitate human-like behaviour and disguise themselves. Hence the above static detection approaches are no longer adapted to the current situations, and the discrimination of anomalous users has become more ineffective. Recently, due to the perfect performance of graph neural networks(GNNs) in capturing the hidden connectivity in a graph structure, many GNN-based anomaly detectors have been applied to various fraud or anomaly detection scenarios. In contrast to the traditional detection methods, GNN-based approaches consider the neighbourhood information to learn the node representations with neural modules. They can be trained in an end-to-end diagram, and their semi-supervised learning fashion dramatically decreases the labelling cost as well.
Relevance-aware Anomalous User Detection
To further detect the well-disguised users in social networks, in this article, we have explained a GNN-based Relevanceaware Anomalous Users Detection (RAU-GNN) model to achieve fine-grained anomalous user detection results. We first extract the multiple relations from all users in the social networks. The relations between users could be roughly defined as an interaction, including retweets, comments or forwarding etc.
As for anomalous users, they prefer to forward similar blogs and take action at the same time. All these features can be constructed into a unified multiple-relation graph. Secondly, we leverage the relevance-aware GNN-based framework to learn the hidden representation in the constructed relation graph from users. Concretely, we adopt the GCN module to initially aggregate the structural information across different relationships, and embedded the processed fusional features to the centre nodes. Then we use the multi-head GAT module to learn the high-level embeddings and we feed the final node embeddings to the following GNN layer and aggregate all the users’ information from their neighbours, in order to consolidate the previous embeddings.
The main contributions of RAU-GNN are summarized as follows:
- Extracted different relations from users and accordingly establish a multiple relation users graph network as the basis of RAU-GNN and explore the importance of different users and relations.
- It’s named RAU-GNN based on a relevance-aware GNN framework, which consists of a GCN-based relation fusion layer, a GAT-based embedding layer and a final GNN aggregator respectively. The integration of these GNN layers can better learn the high-level representations and see through the well-designed disguise.
- Extensive experiments with real-world datasets are conducted to validate the effectiveness of RAU-GNN on anomalous user detection. The results demonstrate that the approach can achieve high accuracy and outperforms other classic comparable baseline models.
Framework
The overall framework of RAU-GNN proposed in this paper is shown in Figure. Concretely, our RAU-GNN contains three processes, including the construction of multiple relation graphs for users, an integrating GNN-based framework to learn the high-level representations, and a discrimination layer to detect the anomalous users. The proposed GNN-based framework integrates three layers, including a GCN-based relation fusion layer, a GAT-based embedding layer and a final GNN aggregator. The following sections will introduce more details of RAU-GNN at length.
To begin with, we extract the features of users from user objects by Twitter API. The rich extracted features serve as the initial node features in the social network. During the preprocessing, we aim to unify all the users and their relations and break them down into a set of relation-based homogeneous graphs. First, we extract the user-oriented elements, such as tweets, comments etc. and organize them in a unified manner to represent the different relations. For example, we extract a tweet that reveals User1 comments on tweets of other users. We denote User1 as v1 and add an edge between v1 and the extracted tweet comments. We repeat the same process for all the users in social networks and obtain a complex heterogeneous graph.
Algorithm
To verify the effectiveness of RAU-GNN, we compare our proposed model against baselines, including general GNN models and new GNN-based methods. Details of the selected baseline algorithm are demonstrated as follows: GCN and GAT are semi-supervised homogeneous graph models that use convolution or attention mechanisms to aggregate neighbourhood information of graph nodes. HGT characterize the heterogeneous attention over different types of nodes, and it performs cross-layer messages from different types of neighbours for higher-order aggregation. GraphSAGE is an inductive framework that leverages node attribute information to efficiently generate representations on previously unseen data. FDStar is a graph convolutional network approach for fraudster detection in review systems.
GAS is a GCN-based Anti-Spam model, that captures the local and global context of a comment to detect spammers. SemiGNN is a semisupervised attentive graph neural network that utilizes multi-view labelled and unlabeled data for fraud detection. Furthermore, to inspect the validation of a relevance-aware GNN-based framework, we decompose the RAU-GNN into a plain relation RAU-GNN(PR-RAU-GNN), which directly sums up the initial embedding across relations without a GCN module, and a plain aggregation RAU-GNN(PA-RAUGNN), which removes the last enhanced GNN aggregator.
Conclusion
In this blog, a new GNN-based relevanceaware anomalous user detection model based on the paper, named RAU-GNN, to effectively discriminate the well-disguised anomalous users in social networks. Firstly, RAU-GNNextracts multiple relations between users in social network, and accordingly construct the multiple user relation graphs. Secondly, the authors have designed a relevance-aware GNN framework to learn the high-level users and discriminate the anomalous users through discriminating.
Concretely, the authors have designed a GCN-based relation fusion layer to aggregate initial information from different relations through convolutional operation, and a GAT-based embedding layer to represent the hidden embeddings of users. Lastly, the authors feed the learned representations to the following GNN aggregator in order to get the node embedding by aggregating the final users’ embeddings and develop the robustness and generalization of RAU-GNN. The experimental results show that the approach can achieve better accuracy for anomalous user detection.
References
- Y. Li et al., “Relevance-Aware Anomalous Users Detection in Social Network via Graph Neural Network,” 2021 International Joint Conference on Neural Networks (IJCNN), 2021, pp. 1–8, doi: 10.1109/IJCNN52387.2021.9534136.
- What Are Graph Neural Networks? by Rick Merritt
- Introducing MIDAS: A New Baseline for Anomaly Detection in Graphs by Limarc Ambalina
- TY — JOUR
AU — Tanuja, U.
AU — Ramesh, B.
AU — H L, Gururaj
AU — Janhavi, V.
PY — 2021/01/01
SP — 229
T1 — Detecting malicious users in social networks using a machine learning approach
VL — 2
DO — 10.1504/IJSCCPS.2021.10041246
JO — International Journal of Social Computing and Cyber-Physical Systems
ER -