SlideShare a Scribd company logo
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Monitoring User-System
Interactions through Graph-Based
Intrinsic Dynamics Analysis
S´ebastien Heymann, B´en´edicte Le Grand
Emails: Sebastien.Heymann@lip6.fr, Benedicte.Le-Grand@univ-paris1.fr
May 30, 2013
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Monitoring user-system
interactions
What type of user-system interactions?
• user-invoked services in information systems
• social networks
• ...
What kind of monitoring?
• discovery
• conformance
• model improvement
Our ultimate goal: automatic and real-time anomaly detection.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
2/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Studied social network
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
3/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Github interaction: code commit
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
4/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Github interaction: bug report
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
5/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Collected Dataset
👤  👤   👤
📸  📸  📸 📸  📸  📸
  
  
❞ ❞ 🎔
Interactions examples
commit code / merge
repositories.
open / close bug reports.
❞comment on bug reports.
🎔edit the repository wiki.
”who contributes to which source code repository”
• 336 000 users and repositories monitored during 4 months.
• 2.2 million interactions recorded sequentially with timestamps.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
6/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Log trace sample
User, user, repository, event, timestamp
lukearmstrong, fuel, core, IssuesEvent, 1341420003
Try-Git, clarkeash, try git, CreateEvent, 1341420006
uGoMobi, jquery, jquery-mobile, IssuesEvent, 1341420009
jexp, neo4j, java-rest-binding, IssueCommentEvent, 1341420011
HosipLan, nette, nette, PullRequestEvent, 1341420152
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
7/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Bipartite graph
👤  👤   👤
📸  📸  📸 📸  📸  📸
: users
⊥: repositories
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
8/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤
📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤
📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤
📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤
📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤
📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤👤
📸 📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤👤
📸 📸 📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤👤
📸 📸 📸 📸 📸 📸
Detection of statistically abnormal links dynamics?
Model of links dynamics?
Link prediction?
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Methodology
1 Order links by timestamp.
2 Define a sliding window of width w (time unit?).
3 Extract the bipartite graph from each window at interval i.
4 Compute an appropriate property on each graph.
5 Analyze the time series.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
10/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Example
Date
Nbnodes
500
1000
1500
11 March 13 April 31 May 18 July
weekly patternNumber of nodes
Date
Nbnodes
400
600
800
1000
1200
1400
1600
15 April 22 April
day-night pattern
zoom
w =1 hour, i = 5 minutes.
Question: don’t temporal patterns hide information?
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
11/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Notions of time
Extrinsic time (real time)
Time measured in units such as seconds.
Good at revealing exogenous phenomena, e.g. day-night patterns.
Intrinsic time (related to graph dynamics)
Time measured in units such as the transition of two states in the
graph.
Better at revealing endogenous phenomena independently from the
graph dynamics?
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
12/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Window width: high resolution
Time (nb links)
Nbnodes
200
400
600
800
1000
1200
500000 1000000 1500000 2000000
Number of nodes
w = 1000 links, i = 100 links.
:) Additional observation
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
13/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Window width: lower resolution
Number of nodes
Time (nb links)
Nbnodes
15000
20000
25000
30000
500000 1000000 1500000 2000000
w = 50, 000 links, i = 1000 links.
:) No need for high resolution
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
14/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Event validation
Visualization of the sub-graph: connected nodes are closer,
disconnected nodes are more distant.
In the sub-graph of
8,370 nodes and
10,000 links at the
time of the event,
one node has a high
number of links:
Try-Git interacts with
4,127 users (over
5,000).
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
15/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
http://try.github.io
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
16/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Towards automatic anomaly
detection
Need for more elaborate properties, like:
Internal links
Their removal does not change the projection of the graph for a
given set of nodes, either or ⊥.
👤
👤
👤👤 👤👤
📸 📸 📸 📸 📸 📸
G G’ = G - (red link) G’T
= GT
👤 👤👤
📸 📸 📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
17/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Results
Ratio of -internal links
Time (nb links)
Ratiooftop−internallinks
0.5
0.6
0.7
0.8
0.9
1.0
0 500000 1000000 1500000 2000000 2300000
not outlier potential outlier outlier unknown
A
B C
D
E
F
G
H I
J
K
w = 10, 000 links, i = 1000 links.
Color = outlier class using the automatic Outskewer method*.
* S. Heymann, M.Latapy and C. Magnien. Outskewer: Using Skewness to Spot
Outliers in Samples and Time Series, IEEE ASONAM 2012
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
18/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Conclusion
Contributions
• Graph-based methodology to monitor user-system interactions
• Intrinsic time unit avoids exogeneous patterns impact
• Smaller windows not necessarily optimal
• Checked relevance of detected events
Applicable in other contexts
• Client-server architectures
• Processes-messages graphs
• File-provider graphs
• User-invoked services in information systems
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
19/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Future work
• Which property for anomaly detection?
• Models of interaction dynamics
• Link prediction
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
20/28
Questions?
Monitoring User-System Interactions through
Graph-Based Intrinsic Dynamics Analysis
<sebastien.heymann@lip6.fr>
Thank You!
Monitoring User-System Interactions through
Graph-Based Intrinsic Dynamics Analysis
<sebastien.heymann@lip6.fr>
Backup Slides
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Statistically significant anomalies
General definition
Values which deviate remarkably from the remainder of values
(Grubbs, 1969)
Outskewer method*:
Our definition
Extremal value which skews a distribution of values.
* Heymann, Latapy and Magnien. Outskewer: Using Skewness to Spot Outliers in Samples and Time Series, IEEE
ASONAM 2012
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
24/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Skewness coefficient
γ = n
(n−1)(n−2) x∈X
x−mean
standard deviation
3
density
x
density
xγ < 0
γ > 0
Example of skewed distributions.
It is sensitive to extremal values (min/max) far from the mean !
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
25/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Automatic anomaly detection
Outskewer classifies each value as:
qqqqqqqqqqqqq
qqqqqqqqqqq
2000
status
q not outlier
potential outlier
outlier
or ’unknown’ for heterogeneous distributions of values.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
26/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Event detection in time series
On a sliding window of size w, each value of X is classified w
times.
The final class of a value is the one that appears the most.
time
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
27/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Why Outskewer?
• claims no strong hypothesis on data
• 1 parameter: the time window width
• ignores regime changes (shifts in normality)
• can be implemented on-line.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
28/28

More Related Content

Similar to Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis

BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达
Jerry Wen
 
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
IEEEFINALYEARSTUDENTPROJECT
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSS
IRJET Journal
 
IRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
IRJET- Malicious Meter Inspection in Smart Grid using ABSC AlgorithmIRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
IRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
IRJET Journal
 
Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)
SocialMediaMining
 
Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)
SocialMediaMining
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Nicolas Kourtellis
 
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic ComputingAn Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
Alejandro Rivero
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
IRJET Journal
 
Detection of uncontrolled motion behavior in human crowds
Detection of uncontrolled motion behavior in human crowdsDetection of uncontrolled motion behavior in human crowds
Detection of uncontrolled motion behavior in human crowds
eSAT Publishing House
 
LRP for hand gesture recogntion.pptx
LRP for hand gesture recogntion.pptxLRP for hand gesture recogntion.pptx
LRP for hand gesture recogntion.pptx
shamim806425
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET Journal
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis
Athena Vakali
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
The math behind big systems analysis.
The math behind big systems analysis.The math behind big systems analysis.
The math behind big systems analysis.
Theo Schlossnagle
 
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...Sc Huang
 
An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...
eSAT Publishing House
 

Similar to Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis (20)

BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达
 
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSS
 
IRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
IRJET- Malicious Meter Inspection in Smart Grid using ABSC AlgorithmIRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
IRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
 
Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)
 
Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
 
Final Report
Final ReportFinal Report
Final Report
 
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic ComputingAn Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
Detection of uncontrolled motion behavior in human crowds
Detection of uncontrolled motion behavior in human crowdsDetection of uncontrolled motion behavior in human crowds
Detection of uncontrolled motion behavior in human crowds
 
LRP for hand gesture recogntion.pptx
LRP for hand gesture recogntion.pptxLRP for hand gesture recogntion.pptx
LRP for hand gesture recogntion.pptx
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
The math behind big systems analysis.
The math behind big systems analysis.The math behind big systems analysis.
The math behind big systems analysis.
 
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
 
An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...
 

More from Sébastien

Gephi short introduction
Gephi short introductionGephi short introduction
Gephi short introductionSébastien
 
Gephi : dynamic features
Gephi : dynamic featuresGephi : dynamic features
Gephi : dynamic features
Sébastien
 
Motivation in FLOSS communities
Motivation in FLOSS communitiesMotivation in FLOSS communities
Motivation in FLOSS communities
Sébastien
 
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time SeriesOutskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time SeriesSébastien
 
Réseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
Réseau thématique Analyse Exploratoire de Données pour les Réseaux DynamiquesRéseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
Réseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
Sébastien
 
Conclusion du cours Exploration du Web
Conclusion du cours Exploration du WebConclusion du cours Exploration du Web
Conclusion du cours Exploration du Web
Sébastien
 
Introduction à l'exploration du Web
Introduction à l'exploration du WebIntroduction à l'exploration du Web
Introduction à l'exploration du Web
Sébastien
 
WebCSTI Rencontres OCIM 2009
WebCSTI Rencontres OCIM 2009WebCSTI Rencontres OCIM 2009
WebCSTI Rencontres OCIM 2009
Sébastien
 
IC05 cours 4
IC05 cours 4IC05 cours 4
IC05 cours 4
Sébastien
 
IC05 cours 3
IC05 cours 3IC05 cours 3
IC05 cours 3
Sébastien
 
IC05 cours 2
IC05 cours 2IC05 cours 2
IC05 cours 2
Sébastien
 
IC05 cours 1
IC05 cours 1IC05 cours 1
IC05 cours 1
Sébastien
 
IC05 2008 - Le Web, objet de science?
IC05 2008 - Le Web, objet de science?IC05 2008 - Le Web, objet de science?
IC05 2008 - Le Web, objet de science?
Sébastien
 
Des traces d'usages aux patterns relationnels : la construction technologique...
Des traces d'usages aux patterns relationnels : la construction technologique...Des traces d'usages aux patterns relationnels : la construction technologique...
Des traces d'usages aux patterns relationnels : la construction technologique...
Sébastien
 
Tour d'horizon des personnes morales adhérentes à l'APRIL
Tour d'horizon des personnes morales adhérentes à l'APRILTour d'horizon des personnes morales adhérentes à l'APRIL
Tour d'horizon des personnes morales adhérentes à l'APRIL
Sébastien
 

More from Sébastien (15)

Gephi short introduction
Gephi short introductionGephi short introduction
Gephi short introduction
 
Gephi : dynamic features
Gephi : dynamic featuresGephi : dynamic features
Gephi : dynamic features
 
Motivation in FLOSS communities
Motivation in FLOSS communitiesMotivation in FLOSS communities
Motivation in FLOSS communities
 
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time SeriesOutskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
 
Réseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
Réseau thématique Analyse Exploratoire de Données pour les Réseaux DynamiquesRéseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
Réseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
 
Conclusion du cours Exploration du Web
Conclusion du cours Exploration du WebConclusion du cours Exploration du Web
Conclusion du cours Exploration du Web
 
Introduction à l'exploration du Web
Introduction à l'exploration du WebIntroduction à l'exploration du Web
Introduction à l'exploration du Web
 
WebCSTI Rencontres OCIM 2009
WebCSTI Rencontres OCIM 2009WebCSTI Rencontres OCIM 2009
WebCSTI Rencontres OCIM 2009
 
IC05 cours 4
IC05 cours 4IC05 cours 4
IC05 cours 4
 
IC05 cours 3
IC05 cours 3IC05 cours 3
IC05 cours 3
 
IC05 cours 2
IC05 cours 2IC05 cours 2
IC05 cours 2
 
IC05 cours 1
IC05 cours 1IC05 cours 1
IC05 cours 1
 
IC05 2008 - Le Web, objet de science?
IC05 2008 - Le Web, objet de science?IC05 2008 - Le Web, objet de science?
IC05 2008 - Le Web, objet de science?
 
Des traces d'usages aux patterns relationnels : la construction technologique...
Des traces d'usages aux patterns relationnels : la construction technologique...Des traces d'usages aux patterns relationnels : la construction technologique...
Des traces d'usages aux patterns relationnels : la construction technologique...
 
Tour d'horizon des personnes morales adhérentes à l'APRIL
Tour d'horizon des personnes morales adhérentes à l'APRILTour d'horizon des personnes morales adhérentes à l'APRIL
Tour d'horizon des personnes morales adhérentes à l'APRIL
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis

  • 1. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis S´ebastien Heymann, B´en´edicte Le Grand Emails: Sebastien.Heymann@lip6.fr, Benedicte.Le-Grand@univ-paris1.fr May 30, 2013
  • 2. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Monitoring user-system interactions What type of user-system interactions? • user-invoked services in information systems • social networks • ... What kind of monitoring? • discovery • conformance • model improvement Our ultimate goal: automatic and real-time anomaly detection. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 2/28
  • 3. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Studied social network S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 3/28
  • 4. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Github interaction: code commit S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 4/28
  • 5. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Github interaction: bug report S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 5/28
  • 6. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Collected Dataset 👤 👤 👤 📸 📸 📸 📸 📸 📸       ❞ ❞ 🎔 Interactions examples commit code / merge repositories. open / close bug reports. ❞comment on bug reports. 🎔edit the repository wiki. ”who contributes to which source code repository” • 336 000 users and repositories monitored during 4 months. • 2.2 million interactions recorded sequentially with timestamps. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 6/28
  • 7. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Log trace sample User, user, repository, event, timestamp lukearmstrong, fuel, core, IssuesEvent, 1341420003 Try-Git, clarkeash, try git, CreateEvent, 1341420006 uGoMobi, jquery, jquery-mobile, IssuesEvent, 1341420009 jexp, neo4j, java-rest-binding, IssueCommentEvent, 1341420011 HosipLan, nette, nette, PullRequestEvent, 1341420152 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 7/28
  • 8. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Bipartite graph 👤 👤 👤 📸 📸 📸 📸 📸 📸 : users ⊥: repositories S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 8/28
  • 9. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 10. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 11. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 12. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 13. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 14. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤👤 📸 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 15. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤👤 📸 📸 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 16. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤👤 📸 📸 📸 📸 📸 📸 Detection of statistically abnormal links dynamics? Model of links dynamics? Link prediction? S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 17. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Methodology 1 Order links by timestamp. 2 Define a sliding window of width w (time unit?). 3 Extract the bipartite graph from each window at interval i. 4 Compute an appropriate property on each graph. 5 Analyze the time series. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 10/28
  • 18. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Example Date Nbnodes 500 1000 1500 11 March 13 April 31 May 18 July weekly patternNumber of nodes Date Nbnodes 400 600 800 1000 1200 1400 1600 15 April 22 April day-night pattern zoom w =1 hour, i = 5 minutes. Question: don’t temporal patterns hide information? S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 11/28
  • 19. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Notions of time Extrinsic time (real time) Time measured in units such as seconds. Good at revealing exogenous phenomena, e.g. day-night patterns. Intrinsic time (related to graph dynamics) Time measured in units such as the transition of two states in the graph. Better at revealing endogenous phenomena independently from the graph dynamics? S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 12/28
  • 20. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Window width: high resolution Time (nb links) Nbnodes 200 400 600 800 1000 1200 500000 1000000 1500000 2000000 Number of nodes w = 1000 links, i = 100 links. :) Additional observation S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 13/28
  • 21. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Window width: lower resolution Number of nodes Time (nb links) Nbnodes 15000 20000 25000 30000 500000 1000000 1500000 2000000 w = 50, 000 links, i = 1000 links. :) No need for high resolution S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 14/28
  • 22. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Event validation Visualization of the sub-graph: connected nodes are closer, disconnected nodes are more distant. In the sub-graph of 8,370 nodes and 10,000 links at the time of the event, one node has a high number of links: Try-Git interacts with 4,127 users (over 5,000). S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 15/28
  • 23. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i http://try.github.io S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 16/28
  • 24. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Towards automatic anomaly detection Need for more elaborate properties, like: Internal links Their removal does not change the projection of the graph for a given set of nodes, either or ⊥. 👤 👤 👤👤 👤👤 📸 📸 📸 📸 📸 📸 G G’ = G - (red link) G’T = GT 👤 👤👤 📸 📸 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 17/28
  • 25. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Results Ratio of -internal links Time (nb links) Ratiooftop−internallinks 0.5 0.6 0.7 0.8 0.9 1.0 0 500000 1000000 1500000 2000000 2300000 not outlier potential outlier outlier unknown A B C D E F G H I J K w = 10, 000 links, i = 1000 links. Color = outlier class using the automatic Outskewer method*. * S. Heymann, M.Latapy and C. Magnien. Outskewer: Using Skewness to Spot Outliers in Samples and Time Series, IEEE ASONAM 2012 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 18/28
  • 26. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Conclusion Contributions • Graph-based methodology to monitor user-system interactions • Intrinsic time unit avoids exogeneous patterns impact • Smaller windows not necessarily optimal • Checked relevance of detected events Applicable in other contexts • Client-server architectures • Processes-messages graphs • File-provider graphs • User-invoked services in information systems S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 19/28
  • 27. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Future work • Which property for anomaly detection? • Models of interaction dynamics • Link prediction S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 20/28
  • 28. Questions? Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis <sebastien.heymann@lip6.fr>
  • 29. Thank You! Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis <sebastien.heymann@lip6.fr>
  • 31. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Statistically significant anomalies General definition Values which deviate remarkably from the remainder of values (Grubbs, 1969) Outskewer method*: Our definition Extremal value which skews a distribution of values. * Heymann, Latapy and Magnien. Outskewer: Using Skewness to Spot Outliers in Samples and Time Series, IEEE ASONAM 2012 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 24/28
  • 32. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Skewness coefficient γ = n (n−1)(n−2) x∈X x−mean standard deviation 3 density x density xγ < 0 γ > 0 Example of skewed distributions. It is sensitive to extremal values (min/max) far from the mean ! S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 25/28
  • 33. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Automatic anomaly detection Outskewer classifies each value as: qqqqqqqqqqqqq qqqqqqqqqqq 2000 status q not outlier potential outlier outlier or ’unknown’ for heterogeneous distributions of values. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 26/28
  • 34. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Event detection in time series On a sliding window of size w, each value of X is classified w times. The final class of a value is the one that appears the most. time S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 27/28
  • 35. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Why Outskewer? • claims no strong hypothesis on data • 1 parameter: the time window width • ignores regime changes (shifts in normality) • can be implemented on-line. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 28/28