Header menu link for other important links
X
Threat Identification and Examination using Graph Based Anomaly Detection
Published in Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
2019
Volume: 9
   
Issue: 1
Pages: 7510 - 7513
Abstract
The aim of this paper is to investigate the Graph Based Anomaly Detection (GBAD) systems to find anomalies or features in a graph that are inconsistent with the general or maximal substructures of the graph. A substructure miner approach was implemented. The Frequent Substructure Miner (FSM) was adopted to find the optimal substructure, which was then used to compare the normal GBAD and Minimum Description Length (MDL) approach that has been in use. The FSM approach uses graphs of size 10, 100 and 1000 nodes to determine the resulting efficiency and hence the runtime as well. The runtime determines how long the two systems require to find anomalies in each type of graph.
About the journal
JournalInternational Journal of Engineering and Advanced Technology Regular Issue
PublisherBlue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
ISSN22498958
Open AccessNo