The explosive growth of online-Social-Networks and the vast number of their subscribers’ data has played a major role at this time to the trend toward interest to detect suspicious and anomalous behaviours on this OSNs. Moreover, the attracted attackers and impostors were intercepted personal data, share false news and promote malignant activities. Thus, the researchers were encouraged by the graphical structure of social networks to use different graph metrics and classification algorithms to detect anomalous activities. However, some of those classification algorithms have been a negative effect or no effect on the end-results, nor do they always achieve satisfactory results by using standalone classification algorithms. This article introduces a new algorithm, called PCA-NN which suggest efficient detection of anomalies and non-anomalies for Facebook. Also, the feature selection and Principal Component Analysis (PCA) techniques have applied. furthermore, classification algorithms for machine learning have used to assess the anomalies and non-anomalies such as supporting vector machine (SVM), neural network (NN), logistic regression (LR) and our built algorithm PCA-NN. Lastly, a minimum number of features have used by the proposed algorithm (PCA-NN) to identify the anomalies on online social networks with the highest accuracy and sensitivity.

1.
Cadena
,
J.
,
F.
Chen
, and
A.
Vullikanti
,
Graph anomaly detection based on Steiner connectivity and density.
Proceedings of the IEEE
,
2018
.
106
(
5
): p.
829
845
.
2.
Akoglu
,
L.
,
M.
McGlohon
, and
C.
Faloutsos
. Oddball: Spotting anomalies in weighted graphs. in
Pacific-Asia Conference on Knowledge Discovery and Data Mining
.
2010
.
Springer
.
3.
Kaur
,
R.
and
S.
Singh
.
Detecting anomalies in online social networks using graph metrics. in
2015 annual IEEE India conference (INDICON)
.
2015
.
IEEE
.
4.
Wang
,
B.
, et al 
Spatial scan statistics for graph clustering
. in
Proceedings of the 2008 SIAM international conference on data mining
.
2008
. SIAM.
5.
Arias-Castro
,
E.
,
E.J.
Candes
, and
A.
Durand
,
Detection of an anomalous cluster in a network.
The Annals of Statistics
,
2011
: p.
278
304
.
6.
Sun
,
J.
, et al 
Graphscope: parameter-free mining of large time-evolving graphs. in
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
.
2007
.
7.
Akoglu
,
L.
,
H.
Tong
, and
D.
Koutra
,
Graph based anomaly detection and description: a survey.
Data mining and knowledge discovery
,
2015
.
29
(
3
): p.
626
688
.
8.
Ranshous
,
S.
, et al,
Anomaly detection in dynamic networks: a survey.
Wiley Interdisciplinary Reviews
:
Computational Statistics
,
2015
.
7
(
3
): p.
223
247
.
9.
Elghanuni
,
R.H.
,
M.A.
Ali
, and
M.B.
Swidan
.
An Overview of Anomaly Detection for Online Social Network. in
2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC)
.
2019
. IEEE.
10.
Kaur
,
R.
and
S.
Singh
,
A survey of data mining and social network analysis based anomaly detection techniques.
Egyptian informatics journal
,
2016
.
17
(
2
): p.
199
216
.
11.
Yasami
,
Y.
and
F.
Safaei
,
A statistical infinite feature cascade-based approach to anomaly detection for dynamic social networks.
Computer Communications
,
2017
.
100
: p.
52
64
.
12.
Kaur
,
R.
and
S.
Singh
,
A comparative analysis of structural graph metrics to identify anomalies in online social networks.
Computers & Electrical Engineering
,
2017
.
57
: p.
294
310
.
13.
Manjunatha
,
H.
and
R.
Mohanasundaram
.
BRNADS: Big data real-time node anomaly detection in social networks. in
2018 2nd International Conference on Inventive Systems and Control (ICISC)
.
2018
.
IEEE
.
14.
Chaudhary
,
A.
,
H.
Mittal
, and
A.
Arora
.
Anomaly Detection Using Graph Neural Networks. in
2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon)
.
2019
.
IEEE
.
15.
Haq
,
A.U.
, et al 
Comparative analysis of the classification performance of machine learning classifiers and deep neural network classifier for prediction of Parkinson disease. in
2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
.
2018
.
IEEE
.
16.
Li
,
L.-L.
, et al,
Short-term wind power forecasting based on support vector machine with improved dragonfly algorithm.
Journal of Cleaner Production
,
2020
.
242
: p.
118447
.
17.
Senanayaka
,
J.S.L.
, et al 
Early detection and classification of bearing faults using support vector machine algorithm. in
2017 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD)
.
2017
.
IEEE
.
18.
Chen
,
S.
, et al 
Anomaly Subgraph Mining in Large-Scale Social Networks. in
2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)
.
2019
.
IEEE
.
19.
Hemalatha
,
K.
and
K.U.
Rani
,
Advancements in multi-layer perceptron training to improve classification accuracy.
International Journal on Recent and Innovation Trends in Computing and Communication
,
2017
.
5
(
6
): p.
353
357
.
20.
Abbas
,
R.A.
, et al,
Curve fitting predication with artificial neural networks: A comparative analysis.
Periodicals of Engineering and Natural Sciences (PEN)
,
2020
.
8
(
1
): p.
125
132
.
21.
Ayesha
,
S.
,
M.K.
Hanif
, and
R.
Talib
,
Overview and comparative study of dimensionality reduction techniques for high dimensional data.
Information Fusion
,
2020
.
59
: p.
44
58
.
22.
Khaled
,
S.
,
N.
El-Tazi
, and
H.M.
Mokhtar
.
Detecting Fake Accounts on Social Media. in
2018 IEEE International Conference on Big Data (Big Data)
.
2018
.
IEEE
.
23.
Jolliffe
,
I.T.
and
J.
Cadima
,
Principal component analysis: a review and recent developments.
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2016.
374
(
2065
): p.
20150202
.
24.
Viswanath
,
B.
, et al 
On the evolution of user interaction in facebook. in
Proceedings of the 2nd ACM workshop on Online social networks
.
2009
.
ACM
.
25.
Hassanzadeh
,
R.
, Anomaly detection in online social networks: using data-mining techniques and fuzzy logic.
2014
,
Queensland University of Technology
.
26.
Man
,
T.
, et al 
Predict anchor links across social networks via an embedding approach
. in
Ijcai.
2016
.
27.
Blum
,
A.L.
and
P.
Langley
,
Selection of relevant features and examples in machine learning.
Artificial intelligence
,
1997
.
97
(
1-2
): p.
245
271
.
28.
Kaur
,
R.
,
M.
Kaur
, and
S.
Singh
,
A novel graph centrality based approach to analyze anomalous nodes with negative behavior.
Procedia Computer Science
,
2016
.
78
: p.
556
562
.
29.
Golbeck
,
J.
, Chapter 3 - Network Structure and Measures, in Analyzing the Social Web,
J. Golbeck, Editor
.
2013
,
Morgan Kaufmann
:
Boston
. p.
25
44
.
30.
Hassanzadeh
,
R.
and
R.
Nayak
.
A rule-based hybrid method for anomaly detection in online-social-network graphs. in
2013 IEEE 25th International Conference on Tools with Artificial Intelligence
.
2013
.
IEEE
.
31.
Kas
,
M.
, et al 
Incremental algorithm for updating betweenness centrality in dynamically growing networks. in
Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining
.
2013
.
ACM
.
32.
Page
,
A.
, et al,
Hunter-Gatherer Social Networks and Reproductive Success.
Scientific Reports
,
2017
.
7
.
33.
Haq
,
A.U.
, et al,
A hybrid intelligent system framework for the prediction of heart disease using machine learning algorithms.
Mobile Information Systems
,
2018
.
2018
.
34.
Shung
,
K.P.
,
Accuracy, precision, recall or F1.
Towards Data Science
,
2018
.
35.
Zheng
,
X.
, et al,
Detecting spammers on social networks.
Neurocomputing
,
2015
.
159
: p.
27
34
.
This content is only available via PDF.
You do not currently have access to this content.