z-logo
open-access-imgOpen Access
Threat Identification and Examination using Graph Based Anomaly Detection
Author(s) -
S. Dutta,
R. Parvathi,
R. Ganesan
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.a3129.109119
Subject(s) - substructure , anomaly detection , graph , computer science , theoretical computer science , algorithm , data mining , engineering , structural engineering
The aim of this paper is to investigate the Graph Based Anomaly Detection (GBAD) systems to find anomalies or features in a graph that are inconsistent with the general or maximal substructures of the graph. A substructure miner approach was implemented. The Frequent Substructure Miner (FSM) was adopted to find the optimal substructure, which was then used to compare the normal GBAD and Minimum Description Length (MDL) approach that has been in use. The FSM approach uses graphs of size 10, 100 and 1000 nodes to determine the resulting efficiency and hence the runtime as well. The runtime determines how long the two systems require to find anomalies in each type of graph.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here