Design and Development of Ternary-Based Anomaly Detection in Semantic Graphs Using Metaheuristic Algorithm
Open Access
- 1 September 2021
- journal article
- research article
- Published by IGI Global in International Journal of Digital Crime and Forensics
- Vol. 13 (5), 43-64
- https://doi.org/10.4018/ijdcf.20210901.oa3
Abstract
At present, the field of homeland security faces many obstacles while determining abnormal or suspicious entities within the huge set of data. Several approaches have been adopted from social network analysis and data mining; however, it is challenging to identify the objective of abnormal instances within the huge complicated semantic graphs. The abnormal node is the one that takes an individual or abnormal semantic in the network. Hence, for defining this notion, a graph structure is implemented for generating the semantic profile of each node by numerous kinds of nodes and links that are associated to the node in a specific distance via edges. Once the graph structure is framed, the ternary list is formed on the basis of its adjacent nodes. The abnormalities in the nodes are detected by introducing a new optimization concept referred to as biogeography optimization with fitness sorted update (BO-FBU), which is the extended version of the standard biogeography optimization algorithm (BBO). The abnormal behavior in the network is identified by the similarities among the derived rule features. Further, the performance of the proposed model is compared to the other classical models in terms of certain performance measures. These techniques will be useful to detect digital crime and forensics.Keywords
This publication has 39 references indexed in Scilit:
- Multi-attribute and relational learning via hypergraph regularized generative modelNeurocomputing, 2018
- Multi-source alert data understanding for security semantic discovery based on rough set theoryNeurocomputing, 2016
- The Whale Optimization AlgorithmAdvances in Engineering Software, 2016
- CoMRing: A Framework for Community Detection Based on Multi-relational Querying ExplorationProcedia Computer Science, 2016
- An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve CryptographyJournal of Medical Systems, 2015
- Privacy-preserving data aggregation scheme against internal attackers in smart gridsWireless Networks, 2015
- Multi-Verse Optimizer: a nature-inspired algorithm for global optimizationNeural Computing & Applications, 2015
- Mining Malware to Detect VariantsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Parallel processing of filtered queries in attributed semantic graphsJournal of Parallel and Distributed Computing, 2014
- Graph-based semantic annotation for enriching educational content with linked dataKnowledge-Based Systems, 2014