ArticlePDF Available

Modeling Dynamic Behavior in Large Evolving Graphs

Authors:
  • Adobe Research

Abstract

Given a large time-evolving graph, how can we model and characterize the temporal behaviors of individual nodes (and network states)? How can we model the behavioral transition patterns of nodes? We propose a temporal behavior model that captures the "roles" of nodes in the graph and how they evolve over time. The proposed dynamic behavioral mixed-membership model (DBMM) is scalable, fully automatic (no user-defined parameters), non-parametric/data-driven (no specific functional form or parameterization), interpretable (identifies explainable patterns), and flexible (applicable to dynamic and streaming networks). Moreover, the interpretable behavioral roles are generalizable and computationally efficient. We applied our model for (a) identifying patterns and trends of nodes and network states based on the temporal behavior, (b) predicting future structural changes, and (c) detecting unusual temporal behavior transitions. The experiments demonstrate the scalability, flexibility, and effectiveness of our model for identifying interesting patterns, detecting unusual structural transitions, and predicting the future structural changes of the network and individual nodes.
Modeling Dynamic Behavior in Large Evolving Graphs
Ryan A. Rossi
Jennifer Neville
Purdue University
{rrossi, neville}@purdue.edu
Brian Gallagher
Keith Henderson
Lawrence Livermore National Laboratory
{bgallagher, keith}@llnl.gov
ABSTRACT
Given a large time-evolving graph, how can we model and
characterize the temporal behaviors of individual nodes (and
network states)? How can we model the behavioral transi-
tion patterns of nodes? We propose a temporal behavior
model that captures the “roles” of nodes in the graph and
how they evolve over time. The proposed dynamic behav-
ioral mixed-membership model (DBMM) is scalable, fully au-
tomatic (no user-defined parameters), non-parametric/data-
driven (no specific functional form or parameterization), in-
terpretable (identifies explainable patterns), and flexible (ap-
plicable to dynamic and streaming networks). Moreover, the
interpretable behavioral roles are generalizable and compu-
tationally ecient. We applied our model for (a) identify-
ing patterns and trends of nodes and network states based
on the temporal behavior, (b) predicting future structural
changes, and (c) detecting unusual temporal behavior tran-
sitions. The experiments demonstrate the scalability, flexi-
bility, and eectiveness of our model for identifying interest-
ing patterns, detecting unusual structural transitions, and
predicting the future structural changes of the network and
individual nodes.
Categories and Subject Descriptors
H.2.8 [Database Applications]: Data Mining
General Terms
Algorithms, Experimentation
Keywords
Graph mining, dynamic network models, dynamic roles
1. INTRODUCTION
In recent years, we have witnessed a tremendous growth
in both the variety and scope of network datasets. In partic-
ular, network datasets often record the interactions and/or
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
WSDM’13, February 4–8, 2013, Rome, Italy.
Copyright 2013 ACM 978-1-4503-1869-3/13/02 ...$15.00.
transactions among a set of entities—for example, personal
communication (e.g., email, phone), online social network
interactions (e.g., Twitter, Facebook), web trac between
servers and hosts, and router trac among autonomous sys-
tems. A notable characteristic of these activity networks, is
that the structure of the networks change over time (e.g.,
as people communicate with dierent friends). These tem-
poral dynamics are key to understanding system behavior,
thus it is critical to model and predict the network changes
over time. An improved understanding of temporal patterns
will facilitate for example, the development of software sys-
tems to optimally manage data flow, to detect fraud and
intrusions, and to allocate resources for growth over time.
Although some recent research has focused on the anal-
ysis of dynamic networks [17,3,5,12,4,21], there has
been less work on developing models of temporal behavior
in large scale network datasets. There has been some work
on modeling temporal events in large scale networks [2,31]
and other work that uses temporal link and attribute pat-
terns to improve predictive models [26]. In addition, there is
work on identifying clusters in dynamic data [5,27] but these
methods focus on discovering underlying communities over
time—sets of nodes that are densely connected together. In
contrast, we are interested in uncovering the behavioral pat-
terns of nodes in the graph and modeling how those pat-
terns change over time. In the simple example below, the
red node is a “star-center” and the
blue represents peripheral nodes. At
some later time, the top nodes tran-
sition to a“near-clique” while the two
bottom nodes become inactive.
The recent work on dynamic mixed-membership stochas-
tic block models (dMMSB: [9,30]), is to our knowledge,
one of the only methods suitable for modeling node-centric
properties over time. The dMMSB model identifies groups of
nodes with similar patterns of linkage and characterizes how
group memberships change over time. However, dMMSB
assumes a specific parametric form where the groups are
defined through linkage to specific nodes (i.e., in particu-
lar types of groups) rather than more general forms of node
behavior over dynamic node sets. More importantly the
dMMSB estimation algorithm is not scalable, which makes
the method unsuitable for analysis of large graphs.
In this work, we aim to develop a descriptive model to an-
swer the following questions for dynamic network datasets:
1. Identify dynamic patterns in node behavior. What
types of high level temporal patterns and trends do the
data exhibit? Are behaviors cyclical or predictable? Do
nodes have dierent behavioral patterns?
2. Predict future structural changes. Can we predict
when a node’s role will change (e.g., a node with high
in-degree transitions to a node with high betweenness)?
Is the overall structure of the graph becoming more or
less predictable over time?
3. Detect unusual transitions in behavior. Are there
nodes and/or points in time with significantly dierent
behavioral patterns?
To facilitate the investigation of these questions, we pro-
pose to model node “roles” and how they change over time.
Informally, rol es can be viewed as sets of nodes that are
more structurally similar to nodes inside the set than out-
side whereas communities are sets of nodes with more con-
nections inside the set than outside. Specifically, to focus
on node behavior (rather than the complimentary concept
of community finding) we use non-parametric feature-based
roles.
Using these non-parametric roles, which can generalize
to new unseen nodes, we propose a novel dynamic behav-
ioral mixed-membership model (DBMM) suitable for large,
unbounded, time-evolving networks. The DBMM discov-
ers features (i.e., using the graph and intrinsic attributes),
extracts these features for all timesteps, and automatically
learns behavioral “roles” for nodes at each timestep. The
number of behavioral roles are selected automatically using
MDL or AIC. Afterwards, we learn behavior transition ma-
trices for each node (i.e., given a node role ri, what is the
probability of transitioning to rjat the next point in time).
Our proposed DBMM technique allows us to investigate
the properties of temporal networks and understand both
global and local behaviors, detect anomalies, as well as pre-
dict future structural changes. The main strengths of the
approach include:
?Automatic. The algorithm doesn’t require user-defined
parameters.
?Scalable. The learning algorithm is linear in the num-
ber of edges in the time-interval under consideration. It
is also easily parallelizable as features, roles, transition
models can be learned independently at each time.
?Non-parametric and data-driven. The model struc-
ture (i.e., number of parameters) and more generally the
parameterization depends on the properties of the time-
evolving network.
?Interpretable and intuitive. The DBMM is based on
an intuitive behavioral representation (structural prop-
erties) of the network and individual nodes. It identifies
explainable patterns, trends, and aids in understanding
the underlying dynamic process.
?Flexible. The definition of behavior in our model can
be tuned for specific applications. The algorithm is ap-
plicable for all types of time-evolving networks.
We demonstrate the application our our model on several
real world datasets, showing that it both accurately predicts
future structural changes as well as identifying interesting
temporal patterns and anomalies. We discuss the scalabil-
ity of the approach and notably we apply the DBMM to
networks with up to 300,000 nodes and 4 million edges—
datasets that are orders of magnitude larger than could be
modeled with dMMSBs.
2. DYNAMIC BEHAVIORAL MODEL
Our goal is to model the behavioral roles of nodes and
their evolution over time. Given a sequence of network
snapshots (graphs and attributes), the Dynamic Behavioral
Mixed Membership Model (DBMM) consists of (1) automat-
ically learning a set of representative features, (2) extracting
features from each graph, (3) discovering behavioral roles
(4) iteratively extracting these roles from the sequence of
network snapshots over time and (5) learning a predictive
model of how these behaviors change over time. As an aside,
let us note that DBMM is a scalable general framework for
analyzing temporal behavior as the model components can
be replaced by others and each component can be appro-
priately tuned for any application (e.g., for the feature set,
any feature construction system from [25] can conceivably
be used).
2.1 Data Model for Temporal Networks
Given a dynamic network D=(N,E), where Nis the set
of nodes and Eis the set of edges in D, a network snapshot
St=(Nt,Et) is a subgraph of Dwhere Etare the edges in
Eactive at time tand Ntare the endpoints of the edges Et.
2.2 Representing Network Behavior
The idea is to discover a set of underlying roles, which
together describe the behaviors observed in the network, and
then assign a probability distribution over these roles to each
node in the network, which explain that node’s observed
behavior. Roles are extracted via a two-step process.
Feature Discovery. The first step is to represent each
active node in a given snapshot graph Stusing a set of rep-
resentative features. For this task, we leverage [15]. The
method constructs degree and egonet measures (in / out,
weighted, ...), then aggregates these measures using sum (or
mean) creating recursive features. After each aggregation
step, correlated features are pruned using logarithmic bin-
ning. The aggregation proceeds recursively, until there are
no new features. Formally, we discover a set of features at
time tdenoted Vtsuch that Vtis an ntfmatrix where nt
is the number of active nodes and fis the number of features
learned from the snapshot graph St. The features are ex-
tracted for each network snapshot resulting in a sequence of
node-feature matrices, denoted V={Vt:t=1,...,t
max}.
Role Discovery. The next step is to automatically discover
groups of nodes (representing common patterns of behav-
ior) based on their features. For this purpose, we use Non-
negative Matrix Factorization (NMF) to extract roles [14]
and extend it for a sequence of graphs. Given a sequence of
node-feature matrices, we generate a rank-r approximation
GtFVtwhere each row of Gt2Rnrrepresents a node’s
membership in each role and each column of F2Rrf
represents how membership of a specific role contributes
to estimated feature values. For constructing the “closest”
rank-r approximation we use NMF (multiplicative update
method) because of interpretability and eciency, though
any other method for constructing such an approximation
may be used instead (SVD, spectral decomposition). More
formally, given a non-negative matrix Vt2Rntfand a
positive integer r<min(nt,f), find non-negative matrices
Gt2Rntrand F2Rrfthat minimizes the functional,
f(Gt,F)= 1
2||VtGtF||2
F
Table 1: Dataset characteristics. The number of learned features and roles provide intuition about the
underlying generative process and also indicates the amount of complexity present in the network.
Dataset Feat. Roles |V||E||T|length
Twitter 1325 12 310K 4M 41 1 day
Twitter-Cop 150 5 8.5K 27.8K 112 3 hours
Fac e b o o k 161 9 46.9K 183K 18 1 day
Email-Univ 652 10 116K 1.2M 50 60 min
Network-Tra 268 11 183K 1.6M 49 15 min
Internet AS 30 2 37.6K 505K 28 3 months
Enron 173 6 151 50.5K 82 2 weeks
IMDB 45 3 21.2K 296K 28 1 year
Reality 99 5 97 31.6K 46 1 month
We iteratively estimate the node-role memberships for
each network snapshot G={Gt:t=1,...,t
max}given F
and V={Vt:t=1,...,t
max}using NMF. Afterwards, we
have a sequence of matrices G1,G2, ..., Gt, ..., Gtmax where
each active node at time tis represented with their current
role memberships.
The number of structural roles ris automatically selected
using Minimum Description Length (MDL) criterion. How-
ever, AIC or any model selection may be used instead. Intu-
itively, learning more roles, increases model complexity, but
decreases the amount of errors. Conversely, learning less
roles, decreases model complexity, but increases the amount
of errors. In this way, MDL selects the number of behavioral
roles rsuch that the model complexity (number of bits) and
model errors are balanced. Naturally, the best model mini-
mizes, number of bits +errors.See[14] for more details.
2.3 Behavioral Transition Model
Given a sequence of dynamic behaviors G={Gt:t=
1,...,t
max}, we can learn a model of how behavior in our
network changes over time. More formally, given two behav-
ioral snapshots, Gt1and Gt, we learn a transition matrix
T2Rrrthat approximates the change in behavior from
time t1tot. The transition matrix Trepresents how
likely a node is to transition from role rito role rjfor that
particular time interval:
T=
2
6
6
6
4
z(r1!r1)z(r1!r2)··· z(r1!rm)
z(r2!r1)z(r2!r2)··· z(r2!rm)
.
.
.··· ...···
z(rm!r1)z(rm!r2)··· z(rm!rm)
3
7
7
7
5
where Tis estimated using NMF such that Gt1TGt.
In the simple form of the model presented above, we learn
Tusing only a single transition (i.e., t1tot). However,
we also propose variations that leverage more available data
by considering multiple transitions (stacked model) or that
smooth over a sequence of transitions using kernel functions
(summary model). We discuss these in detail next.
2.3.1 Stacked Transition Model
The stacked model uses the training examples from the
kprevious timesteps. More formally, the stacked model is
defined as,
2
6
6
6
4
Gt1
Gt2
.
.
.
Gk1
3
7
7
7
5
T
2
6
6
6
4
Gt
Gt1
.
.
.
Gk
3
7
7
7
5
where k=twand wis the window size; typically w=
10. Let us denote the stacked behavioral snapshots as Gk:t
where k:trepresents all the training examples from timestep
ktotimestept.
2.3.2 Summary Transition Model
This class of models uses kprevious timesteps to weight
the training examples at time tusing some kernel function.
The exponential decay and linear kernels are used in this
work. The temporal weights can be viewed as probabilities
that a node behavior is still active at the current time step
t, given that it was observed at time (tk). We define
the summary behavioral snapshot GS(t)as a weighted sum
of the temporal role-memberships up to time tas follows,
GS(t)=1Gk+... +w1Gt1+wGt=Pt
i=kK(Gi;t, )
where determines the contribution of each snapshot in the
summary model.
In addition to exponential and linear kernels, we experi-
mented with the inverse linear and also tried various val-
ues. Overall, we found the linear kernel (and exponential)
to be the most accurate with =0.7. Nevertheless, the
optimal will depend on the type of dynamic network and
the volatility.
2.4 Remarks
For each type of transition model (e.g., stacked or sum-
mary), we may learn a global transition model that describes
how the behavior of the network as a whole changes over
time or we may learn a local transition model for each in-
dividual node. The local transition model describes more
precisely how the behavioral roles of that individual node
change over time. We can estimate the local transition
model for a node ias G(i)
t1T(i)G(i)
tusing NMF. The
global transition model for the network is estimated in ex-
actly the same way as described above in §2.3.
We have found the summary model to be the best per-
former for prediction tasks because of its ability to smooth
over multiple timesteps. However, for precisely this reason,
the summary model is more dicult to interpret. There-
fore, we use the summary model for prediction tasks and
the stacked representation for data analysis tasks, due to its
interpretability. Let us note that to achieve better accuracy
in predictions, one may also estimate local transition models
for each node and use these for predicting a node’s future
role memberships. All of these options make our model flex-
ible for use in a variety of applications.
We also experimented with other variants of the DBMM
transition model, including a stacked-summary hybrid and
multi-state models, which make an explicit distinction be-
tween transitions from activate states and transitions from
Fea t u r e s S-Center S-Edge Bridge Clique
S-Center 0.08 0.25 0.34 0.33
S-Edge 0.27 0.11 0.25 0.37
Bridge 0.29 0.20 0.17 0.34
Clique 0.24 0.24 0.29 0.23
Roles S-Center S-Edge Bridge Clique
S-Center 0.07 0.25 0.33 0.35
S-Edge 0.28 0.10 0.22 0.40
Bridge 0.29 0.18 0.16 0.37
Clique 0.24 0.25 0.29 0.22
Table 2: Validating DBMM’s ability to distinguish patterns. Note Cis row-normalized.
1 (scenter) 2 (scenter) 3 (scenter) 4 (scenter) 5 (scenter) 6 (scenter) 7 (scenter) 8 (scenter) 9 (scenter) 10 (scenter)
11 (sedge) 12 (sedge) 13 (sedge) 14 (sedge) 15 (sedge) 16 (sedge) 17 (sedge) 18 (sedge) 19 (sedge) 20 (sedge)
21 (bridge) 22 (bridge) 23 (bridge) 24 (bridge) 25 (bridge) 26 (bridge) 27 (bridge) 28 (bridge) 29 (bridge) 30 (bridge)
31 (clique) 32 (clique) 33 (clique) 34 (clique) 35 (clique) 36 (clique) 37 (clique) 38 (clique) 39 (clique) 40 (clique)
Figure 1: The pattern of each node is listed below the mixed-membership plot whereas the colors represent
roles learned from our model. For simplicity, the node’s pattern-type is kept stable over time. Strikingly, the
DBMM clearly reveals the underlying patterns of the nodes as each pattern has a distinct signature in terms
of the role distribution. For instance, the blue role of a bridge node indicates the local similarity with that of
a star-edge node (low degree,...) while the red role captures the bridges more global and intrinsic property
of acting as a backbone for the other nodes. The other patterns are even more straightforward to interpret.
We also inject a type of global anomaly at t=6(bridges connecting to each other) which is clearly revealed
as such in the plots.
inactive states. However, we opted in favor of the simpler
stacked and summary models because none of these other
models provided an obvious advantage.
While our model currently assumes the role definitions
are somewhat stationary, we have found that these roles
generalize and can even be applied across dierent networks.
Nevertheless, to remove this assumption, we could simply
track the loss over time and recompute the roles when it
surpasses some threshold.
3. EXPLORATORY ANALYSIS
This section explores the eectiveness of DBMM for dy-
namic network analysis tasks.
3.1 Datasets & Structural Analysis
We apply the DBMM model using a variety of dynamic
networks from dierent domains [23]. See Table 1for de-
tails. Interestingly, we find a relationship between the com-
plexity of DBMM and the complexity present in the graph.
This is clearly clearly shown in Table 1by analyzing simple
measures generated from the DBMM behavioral representa-
tion such as the number of learned features and the number
of roles. For instance, the Internet AS topology has some
hierarchical structure or recurring patterns of connectivity
among ISPs and therefore our model discovers only 30 fea-
tures. This is in contrast to networks with more complex
patterns of connectivity such as twitter and other transac-
tion networks like the email network. In these cases, the
links are instantaneous and might only last for some du-
ration of time, thus making more complex structures more
likely.
3.2 Experiments on Synthetic Data
In this section, we demonstrate the ability of DBMM
to distinguish between common graph patterns (and conse-
quently recover the synthetic roles). For this task, we design
a simple graph generator that constructs graphs probabilis-
tically with four main patterns: ‘center of a star’, ‘edge of
a star’, bridge nodes (connecting stars/cliques), and clique
nodes. After constructing the graph, we validate that the
DBMM model captured these patterns by measuring if the
extracted features and roles represent the known probabilis-
tic patterns. We do this by computing the pairwise eu-
clidean distance matrix Dusing the initial feature matrix
V(and role-membership matrix G). Let ridenote the ac-
tual pattern of node i, and P={(i, j)|ri=p, rj=q}then
Cp,q =P(i,j)2PDi,j .
Clearly, the roles and features from nodes of the same pat-
tern are shown to be more similar than the others (smaller
values along the diagonal). See Table 2.3. Additionally, the
patterns that are structurally similar to one another are rep-
resented as such by our model (star-center and clique). In
Fig. 1, we visualize the mixed-memberships of 10 randomly
chosen nodes from each pattern-type. Each pattern has a
distinct and consistent signature in terms of the role distri-
bution.
3.3 Interpretation & Analysis
We start with an illustrative example of applying DBMM
to a large IP trace network, shown in Figure 2. We first
plot the time-evolving mixed-memberships from four nodes
shown in Figure 2(b) and then visualize their correspond-
ing transition models in Figure 2(a). In the time-evolving
mixed-memberships, inactivity is represented by white bars
whereas in the transition models inactivity corresponds to
the last row/column. The transition models are learned
using the stacked representation which aids in the under-
standability and interpretation of the roles and their mod-
eled transitions.
The time-evolving mixed-memberships for each of the four
example nodes in Figure 2(b) show distinct patterns from
one another which are easy to identify. The four patterns
represented by these nodes can be classified as having the
following patterns of structural behavior,
1. Structural Stability. This node’s structural behavior
(and communication pattern) doesn’t is relatively stable
over the time.
2. Homogeneous. The node for the most part takes on a
single behavioral role.
3. Abrupt transition. Their structural behavior changes
abruptly. In the IP-network, it could be that the IP was
released and someone was assigned it or perhaps that the
machine was compromised and began acting maliciously.
4. Periodic activity. The node has periodic activity, but
maintains similar structural behavior. In the case of the
IP-communication network, this machine could be in-
fected and every 30 minutes sends out a communication
to the master indicating it’s connected and “listening”.
For the four example nodes, we show their transition mod-
els in Figure 2(a). The transition models represent the prob-
ability of transitioning or taking on the structural behavior
of role jgiven that your current role (or main role) is role
i. For instance, node 2 homogeneously takes on the red role
over time as discussed previously. From Figure 2(c),wesee
that the red role is “role 9”, and looking back at the node’s
learned transition model, we find that column 9 contains
most of the mass, which represents that their is a high prob-
ability of transitioning from any other role to the red role. As
shown in the mixed-memberships over time, this is exactly
what is expected. As another example, we find that node
4 usually transitions from a mix of active roles to the inac-
tive role (i.e., the inactive role is represented by column/row
eleven). Therefore, we would expect our learned transition
model to capture this by placing most of the mass on the
last column, representing the probability of going inactive
after having a mix of active roles in the previous timestep,
which is exactly what we see in the fourth transition model.
Instead of providing subjective or anecdotal evidence for
what the roles represent, we interpret the roles of the DBMM
with respect to well-known node measurements (e.g., de-
gree, clustering coecient, betweenness,...). We extend the
analytical tools from [14] for use in interpreting the role
dynamics. The first technique interprets the roles using the
dynamic node-role memberships Gtand a node measure ma-
trix Mt2Rnmto compute a non-negative matrix Etsuch
that GtEtMt. The node measurements used are be-
tweenness, biconnected components, PageRank, clustering
coecient, and degree. The matrix Etrepresents the con-
tributions of the node measures to the roles at time t.We
report average contributions over time.
Figure 2(c) shows this quantitative interpretation of roles
for the IP network. Intuitively, the first role represents nodes
with high PageRank, while role five represents nodes with
high betweenness, whereas role nine represents nodes with
large clustering coecient. The other roles represent more
specialized structural motifs that were not captured by the
set of traditional measures used for interpretation.
The DBMM can be used to understand the temporal be-
havior across a variety of time-evolving networks. Figure 3
shows another example for an email communication net-
work. Just as before, we can identify significant trends and
patterns and interpret these using the role interpretations
from Figure 3(b). One notable behavioral pattern in the
email communications is that most users have a set of roles
for the daytime and a dierent set for night. Intuitively,
one set of roles is work related and the other is more per-
sonal/family related (see nodes 1 & 2, among others). We
also find nodes that have inconsistent or unstable behavior
over the time, such as 17, 18, 19, among others. Addition-
ally, some nodes have relatively stable structural behavior
(a) Transition Models
1 2
3 4
(b) Time-evolving Mixed-Memberships
#BCC Betweenness CC PageRank Degree
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
Role1
Role2
Role3
Role4
Role5
Role6
Role7
Role8
Role9
Role10
(c) Role Interpretation
Figure 2: The DBMM transition model eec-
tively captures the diverse temporal behavior of
hosts in a computer network. (a) Transition ma-
trices for 4 hosts. The y-axis represents the role
the node transitions from, the x-axis is the role we
transition to. Inactivity is represented by the last
row/column. (b) Corresponding role-memberships
over time. The x-axis represents time while the y-
axis represents the role distribution at each point in
time. Each distinct color represents a learned role.
(c) Characteristics of individual roles.
over the two days, such as node 4. This is also unusual,
since one might expect a user’s behavior to change from
the work hours to the evening/night. However, users that
are consistently dominated by multiple active roles are of
importance (may serve in managerial or leadership roles),
since they connect to groups of nodes with dierent types of
structural patterns (see nodes 5-7).
3.4 Clustering Temporal Behaviors
Lastly to show the patterns of the learned transition ma-
trices, we cluster nodes based on their temporal behaviors.
We find that this clustering reveals the underlying structural
patterns of the evolving mixed-memberships. Formally, let
12345
6 7 8 9 10
11 12 13 14 15
16 17 18 19 20
21 22 23 24 25
26 27 28 29 30
31 32 33 34 35
36 37 38 39 40
(a) Time-evolving Mixed-Memberships (Email)
#BCC Betweenness CC PageRank Degree
0
0.02
0.04
0.06
0.08
0.1
Role1
Role2
Role3
Role4
Role5
Role6
Role7
Role8
Role9
Role10
(b) Email Role Interpretation
Figure 3: The DBMM model allows us to uncover
patterns of behavior in an email network. (a) evolv-
ing memberships for a group of nodes and (b) the
characteristics associated with the roles.
T(i)and T(j)be the transition matrices of two nodes iand
j. Then we create an rrvector from each of the node
transition models and define a similarity function between
these vectors.
First we estimate a single transition model Tfor each node
using the stacked model. We then compute an nnsimilar-
ity matrix using Frobenious loss between the transition ma-
trices from the nodes. Next, we apply the classical k-means
clustering algorithm to cluster the nodes by their transi-
tion matrices. Afterwards, we compute the closest rank-k
approximation (k = 2 or 3) of the similarity matrix. The
nodes are plotted using the low-rank approximation and la-
beled using the previous clustering algorithm. To reveal the
structural transition pattern, we then compute the average
dynamic mixed-membership for each cluster using only the
nodes from that cluster.
This clustering method reveals common structural trends
and patterns between nodes. For instance, this technique
may group nodes together that share similar transitional
patterns such as nodes with stable roles vs. nodes with
more dynamic roles or nodes with high activity vs. nodes
with low activity. An example is provided in Figure 4.For
clarity in the visualization, we randomly selected a small
subset of nodes from the 183,389 candidates and identified
common transition patterns among them. The first visual-
ization in Figure 4(a) identifies four distinct well-separated
clusters of nodes with similar transition models. Figure 4(b)
shows the average dynamic behavioral mixed-membership
for each cluster. This visualization shows that each cluster
represents a unique structural transition pattern between
the nodes. The structural patterns can be interpreted us-
ing the previous role interpretation from Figure 2(c). This
technique can be used for general exploratory analysis such
0.1 0.05 0 0.05 0.1 0.15
0.1
0.05
0
0.05
0.1
Transition Pattern1
Transition Pattern2
Transition Pattern3
Transition Pattern4
(a) Transition Clustering
(b) Dynamic Mixed-Membership Patterns
Figure 4: The DBMM model provides an intuitive
means of clustering nodes that exhibit similar pat-
terns of behavior over time. (a) identifies four dis-
tinct clusters of nodes with similar transition pat-
terns. (b) provides a sense of the behavior of each
cluster in terms of the average role-membership over
time. Again, we see that DBMM captures dier-
ences in both overall static behavior (i.e., the spe-
cific roles that dominate) and in patterns of how
behaviors (i.e., roles) change over time.
as characterizing the patterns and trends of nodes or even-
tually used as a means to detect anomalies or nodes that do
not fit any transition pattern.
4. PREDICTING FUTURE BEHAVIOR
In this section, we further validate the utility of the DBMM
model by demonstrating its ability to predict the future be-
havior of nodes. This could be useful for optimizing caches
on the Web, or for improving dynamic social recommenda-
tion systems, among many others.
Models. The goal is to accurately predict Gt+1 given Gs(t),
the summary behavioral snapshot described in Section 2.3.2.
Our primary means of predicting Gt+1 is using our DBMM
summary transition model Tas follows: ˆ
Gt+1 =GtT.
We compare this summary model to two sensible baselines:
PrevRole and AvgRole. PrevRole simply assigns each node
the role distribution from the previous time t. That is,
ˆ
Gt+1 =Gt. AvgRole assigns each node the average role
distribution over all nodes at time t. The AvgRole model
can be expressed as ˆ
Gt+1 =GtTAwhere TAis estimated
from Gt=[1]T. Essentially, PrevRole assumes node behav-
ior does not change from each point in time to the next and
AvgRole assumes that all nodes exhibit the average behavior
of the network.
Evaluation. We consider two strategies for evaluating our
predictive models: (a) compare the predicted ˆ
Gt+1 to the
true Gt+1 using a loss function (we use the Frobenious norm)
and (b) Use ˆ
Gt+1 to predict the modal role of each node at
time t+ 1 and evaluate these predictions using a multi-class
0 5 10 15 20 25 30 35 40 45 50
30
40
50
60
70
80
90
100
110
120
130
Time
Frobenius Loss
Summary (Linear)
Baseline (Prev Role)
Baseline (Avg Role)
(a) IP-Trace
0 5 10 15 20 25 30 35 40
20
40
60
80
100
120
140
Time
Frobenius Loss
Summary (Linear)
Baseline (Prev Role)
Baseline (Avg Role)
(b) Twitter Relationships
0 5 10 15 20 25 30 35 40 45 50
0
20
40
60
80
100
120
140
Time
Frobenius Loss
Summary (Linear)
Baseline (Prev Role)
Baseline (Avg Role)
(c) Email Univ
0 5 10 15
0
20
40
60
80
100
120
Time
Frobenius Loss
Summary (Linear)
Baseline (Prev Role)
Baseline (Avg Role)
(d) Facebook
0 20 40 60 80 100 120
0
5
10
15
20
25
30
Time
Frobenius Loss
Summary (Linear)
Baseline (Prev Role)
Baseline (Avg Role)
(e) Twitter Copenhagen
0 10 20 30 40 50 60 70 80
0
1
2
3
4
5
6
7
8
Time
Frobenius Loss
Summary (Linear)
Baseline (Prev Role)
Baseline (Avg Role)
(f) Enron
0 5 10 15 20 25
10
20
30
40
50
60
70
80
Time
Frobenius Loss
Summary (Linear)
Baseline (Prev Role)
Baseline (Avg Role)
(g) IMDB
0 5 10 15 20 25
80
90
100
110
120
130
140
150
160
Time
Frobenius Loss
Summary (Linear)
Baseline (Prev Role)
Baseline (Avg Role)
(h) Internet AS
Figure 5: The DBMM transition model accurately predicts future behavior of individual nodes (i.e., mixed
role membership) compared to sensible baseline models.
AUC (Area Under the ROC curve) measure. We describe
each of these strategies more formally below.
Frobenious Loss on G.The goal here is to estimate Gt+1
as accurately as possible. The approximation error between
the estimated node memberships ˆ
Gt+1 =GtTt+1 and the
true node memberships Gt+1 is defined as ||Gt+1 ˆ
Gt+1||F
Structural Prediction with Multi-class AUC. This is a multi-
class classification task where the true class label for node
iis the modal role from the ith row of Gt+1 (i.e., the role
with maximum membership for this node). The predicted
class label for node iis the modal role from the ith row of
ˆ
Gt+1.
We evaluate the predictions using a generalization of AUC
extended for multi-class problems. In particular, we com-
pute the AUC of all combinations of labels and take the
mean (also known as Total AUC) [13]. The diculty of the
prediction task varies based on the number of roles discov-
ered, complexity of the network evolution, and the type of
time-evolving network (e.g., transactional vs. stable).
Results. Figure 5demonstrate that the DBMM summary
transition model is an eective predictor across the range
of experiments. With few exceptions, DBMM outperforms
both baselines for all data sets and timesteps. This is even
true for the more complex time-evolving networks such as
Twitter, email, and the IP-traces, which are more transac-
tional with rapidly evolving network structure. For brevity,
some findings were omitted, for others see [23].
In addition to validating the DBMM model, both fig-
ures oer some interesting insights into the characteristics
of time-evolving networks. For example, an increase in loss
over time may indicate a concept drift” where behavior in
the network has evolved to the point where the current roles
can no longer adequately explain node behavior. This eect
is seen most prominently in Figures 5(b),5(d),5(g) and 5(h).
Interestingly, the drift we see in Figure 5(h) agrees with the
current understanding that the underlying evolutionary pro-
cess of the Internet AS is not constant, as was previously
believed [19,29]. Most notably, there is recent evidence of
the Internet topology transitioning from hierarchical to a
flat topological structure [7,6].
Furthermore, the figures provide insights into behavioral
anomalies, such as the spike we see in Figure 5(g). The spike
in loss indicates the significant deviation of the node roles
at a specific time.
Finally, in the large Twitter Relationships network, we
see seasonality among the role transitions. In particular, we
find that the users generally behave significantly dierent
over the weekends, seen by the increase in loss on these days.
Intuitively, we would expect users to be tweeting about dif-
ferent topics and using the system in dierent manner than
they do during the work days. The Twitter Copenhagen net-
work captures the more locally-temporal seasonality; that is
users behave dierently during the daytime and the night-
time hours.
5. ANOMALOUS DYNAMIC PATTERNS
We further demonstrate the use of DBMMs for detecting
anomalies in time-evolving networks. In particular, we for-
mulate this problem with respect to identifying nodes that
have unusual structural transition patterns. For instance, a
node might transition from being a hub (i.e., a node with
many people linking to it) to a node with low degree.
5.1 Node Transition Anomalies
While there are many ways to define an anomaly detection
technique with respect to the DBMM model, we propose an
intuitive algorithm shown in Alg. 1that uses a node’s transi-
tion model for predicting the network memberships at t+1.
The anomaly score is the dierence between the predicted
network mixed-memberships and the ground-truth mixed-
memberships. Therefore, the score represents the divergence
of that nodes transitions from the entire network. One sim-
(a) T Model (b) T Model (c) Network T Mod
(d) Louise Kitchen (e) Sara Shackleton (f) Network
#BCC Betweenness CC PageRank Degree
0
0.01
0.02
0.03
0.04
0.05
0.06
0.07
Role1
Role2
Role3
Role4
Role5
Role6
(g) Role Interpretation
Figure 6: The DBMM transition model provides
an eective means of automatically discovering and
visualizing nodes with anomalous temporal behav-
ior. (a)-(b) are the transition models for two of
the most anomalous nodes in the Enron email net-
work compared to (c) the normal network transition
model. (d)-(f) show the corresponding role mem-
berships over time. (g) shows the characteristics of
roles.
ple example is shown in Figure 6(a) where we find Louise
Kitchen as having unusual behavioral transitions.
5.2 Time-varying Node Anomalies
For detecting the specific time interval in which a node has
unusual behavior we use the previous method with a few sub-
tle distinctions. The global and node models are estimated
at each timestep (in a sort of streaming fashion) using the
stacked representation with a shorter window (for leveraging
past training examples). The final result is a ranked list of
potential node anomalies for each timestep, shown in Fig-
ure 8. The justification for such an approach is that nodes
may become anomalous or have unusual behavior only for
a specified time interval. In the case of IP-communications,
it is unlikely for the behavior of an IP-address to remain
unusual as IP-addresses are released/expires and users are
assigned entirely new IP-addresses. These types of dynamic
anomalies are shown in Figure 8.
5.3 Anomalous Structural Transitions
We first interpret the roles and their temporal variation
quantitatively as shown in Figure 6(g) and then provide
some simple examples of nodes that have unusual behav-
ior transitions. Intuitively, the first role represents nodes
with high clustering coecient, the second role represents
mainly nodes with high pagerank, while the third and fourth
roles represent some type of combination of these proper-
ties indicating a more complex structural motif that is not
Probability
Normal Anomalies
0
0.05
0.1
0.15
0.2
0.25
0.3
(a) Anomaly-Role Patterns
(b) Network Memberships (c) Anomaly Memberships
Figure 7: The DBMM anomaly detector eectively
captures dierences in both static and dynamic be-
havior in an email network. (a) shows that normal
and anomalous nodes (top-100) dier in their role
distribution (i.e., overall static behavior). (b)-(c)
show that normal and anomalous nodes also dier in
how their behavior changes over time, with anoma-
lies exhibiting more stable behavior over time than
normal.
suciently represented by the selected node metrics. How-
ever, the fifth role represents nodes with high degree and
the sixth role represents nodes that are articulation points
or that have high betweenness. Additionally, by analyzing
the neighbors roles dynamically, we find that nodes with
high clustering coecient primarily are neighbors to nodes
with high betweenness or high degree (this plot has been
removed for brevity).
In Figure 6(e), we find Louise Kitchen, one of the Enron
executives who was involved in the Fraud, as having unusual
behavioral transitions. Further examination of the network
transition model and the average evolution of the behavioral
mixed-memberships provide further insights into his abnor-
mal activities. In particular, there are two main role transi-
tions (r3!r7and r4!r1) in Louise Kitchen’s transition
model that are in contradiction with the network transition
model shown in Figure 6(c). Furthermore, analyzing the in-
dividual changes to the mixed-memberships over time com-
pared with the average behavioral mixed-memberships pro-
vides additional insight. For instance, the first two mixed-
memberships vectors of Louise Kitchen are mainly red and
then begin to deviate significantly with seemingly no un-
Algorithm 1: Anomalous Structural Transitions
Input:G={Gt:t=1,...,t
max}(evolving
mixed-memberships)
Output:x(vector of anomalous scores)
1for i 1to ndo
2T(i)2Rrr NMF(G(i)
1:t1,G(i)
2:t)
3ˆ
Gt+1 =T(i)·Gt
4x(i)=
ˆ
Gt+1 Gt+1
F
5end
0 5 10 15 20 25 30 35 40 45
0
5
10
x 1025
Network Loss
(a) Time-varying Anomalies
Node Anomaly 1 Node Anomaly 2 Node Anomaly 3
Node Anomaly 4 Node Anomaly 5 Node Anomaly 6
(b) Evolving memberships of the time-varying anomalies
Figure 8: The DBMM model allows us to find
nodes that are anomalous for only short periods of
time and normal otherwise. Such temporally local
anomalies are often impossible to find using static
graph analysis because brief abnormal periods are
drowned out by mostly normal behavior. (a) shows
examples of short lived anomalies in a computer net-
work. (b) shows the corresponding behavior over
time for each node in detail.
derlying correlation or pattern between the role transitions.
Moreover, there is not any significant correlation between
Louise’s mixed-memberships and the average memberships
at each point in time.
In addition, we also identify interesting patterns of the
nodes with unusual behavioral transitions in Figure 7. In
particular, the DBMM anomaly detector eectively captures
dierences in both static and dynamic behavior in an email
network. Interestingly, in 7(b), normal users exhibit a clear
cyclical pattern which indicates that normal nodes have a
set of roles during the day and another set at night (which
agrees with intuition). In contrast, the anomalies 7(c) have
stable roles over the time that barely fluctuate.
Figure 8also indicates that the DBMM model allows us to
find nodes that are anomalous for only short periods of time
and normal otherwise. Such temporally local anomalies are
often impossible to find using static graph analysis because
brief abnormal periods are drowned out by mostly normal
behavior. 8(a) shows examples of short lived anomalies in a
computer network. 8(b) shows the corresponding behavior
over time for each node in detail.
Synthetic Data. In a separate set of experiments, we further
validate our “unusual structural transition” anomaly detec-
tor by injecting anomalies into synthetic data (see §3.2).
Initially, the dynamics of nodes are predefined to have nor-
mal transitions between patterns (e.g., star-center to clique).
Then we inject some nodes with anomalous transition be-
havior by randomly transitioning to an abnormal pattern
which we define as star-edge to clique. For 200 repeated
Table 3: Performance Analysis of the Dynamic Be-
havioral Mixed-Membership Model. The dMMSB
takes a day to handle 1,000 nodes [30], while our
model takes only 8.44 minutes for 8,000 nodes.
Dataset Nodes Edges Performance
Enron 151 50,572 117.51 sec
Twitter (Copen) 8,581 27,889 506.61 sec
Facebook 46,952 183,831 1,468.65 sec
Internet AS 37,632 505,772 1,922.85 sec
Network-Trace 183,389 1,631,824 16,138.71 sec
simulations, we achieve high accuracy (88.5%) in detecting
the anomalous behavior.
6. SCALABILITY AND COMPLEXITY
Most importantly, our dynamic role model is linear in
the number of edges. Let nbe the number of nodes, f
be the number of features, rbe the number of roles and
tbe the number of timesteps. The feature discovery is
O(t(mf +nf2)) [15]. For the NMF step, we use the multi-
plicative update method which has worst case O(tnfr). The
transition models is O(tnr2) using the multiplicative update
method. Thus, the running time of DBMM is linear in the
number of edges, specifically, O(t(mf +nfr +nr2)). The
time-scale tis usually small compared to the edges (even
when the time-scale corresponds to minutes or seconds in
the IP-trace data). A more accurate bound can be stated
in terms of the maximum number of edges at any given
timestep.
Our model is capable of handling realistic networks such
as social and technological networks consisting of millions of
nodes and edges. This is in contrast to a similar dynamic
mixed-membership models that have been recently proposed
such as the dMMSB [30,9]. These models are quadratic in
the number of nodes and therefore unable to scale to the
realistic networks with the number of edges in the millions.
Furthermore, these models have been typically used for visu-
alizing trivial sized networks of 18 nodes up to 1,000 nodes.
This is in contrast to our work where we apply DBMM not
only for visualizations, but for a variety of analysis tasks
using large dynamic networks.
Moreover, the dMMSB can handle 1,000 nodes in a day
[30] (See page 30), while our model handles 8,000 nodes
in 506.61 seconds (or 8 minutes and 26 seconds) shown in
Table 3. We provide performance results for other larger
datasets of up to 183,389 nodes and 1,631,824 edges. In all
cases, even for these large networks with over a million edges,
our model takes less than a day to compute and the perfor-
mance results show the linearity of our model in the number
of edges. For the scalability experiments, we recorded the
performance results using a commodity machine Intel Core
i7 @2.7Ghz with 8Gb of memory.
In addition, the proposed DBMM model is also trivially
parallelizable (e.g., using Hadoop/MapReduce on Amazon
EC2/Cloud) as features, roles, and transition models can be
learned at each timestep independent of one another.
7. RELATED WORK
There has been an abundance of work in analyzing dy-
namic networks. However, the majority of this work focuses
on dynamic patterns [10,17,16,22,27], temporal link pre-
diction [8], anomaly detection [1], dynamic communities [18,
28,11], dynamic ranking [20,24], and many others [31,12].
In contrast, we propose a scalable temporal behavioral
model that captures the node behaviors over time and con-
sequently learns a predictive model for how these behav-
iors evolve over time. Perhaps the most related work is
that of [9] where they develop the dMMSB model to iden-
tify roles in the graph and how these memberships change
over time. However, this type of mixed-membership model
assumes a specific parametric form, which is not scalable
(1,000 nodes takes a day to model), and where the groups
are defined through linkage to specific nodes (in particu-
lar types of groups) rather than more general node behav-
ior or structural properties [30]. This is in contrast to our
proposed model, which is based on our intuitive behavioral
representation and can be interpreted quantitatively. In ad-
dition, our model is not tied to any single notion of behavior
and thus is flexible in the roles discovered and generalizable.
Moreover, not only do we evaluate our model on detect-
ing unusual behavior, identifying explainable patterns and
trends, and for clustering nodes with respect to their tran-
sition patterns, but we apply our model on large real-world
networks to demonstrate its scalability. To the best of our
knowledge, our proposed model is the first scalable dynamic
mixed-membership model capable of identifying explainable
patterns and trends on large networks.
8. CONCLUSIONS
We proposed a dynamic behavioral mixed-membership
model for large networks and used it for identifying inter-
esting and explainable patterns and trends. Moreover, we
demonstrated its scalability on a variety of real-world tempo-
ral networks and provided striking performance results. The
experiments have shown the scalability, flexibility, and eec-
tiveness of our model for identifying interesting patterns, de-
tecting unusual structural transitions, and predicting the fu-
ture structural changes of the network and individual nodes.
Acknowledgments
This work was performed under the auspices of the U.S. De-
partment of Energy by Lawrence Livermore National Labo-
ratory under Contract DE-AC52-07NA27344. This research
was also supported by ARO and NSF under contract num-
bers W911NF-08-1-0238, IIS-1017898, IIS-0916686. The views
and conclusions contained herein are those of the authors
and should not be interpreted as necessarily representing the
ocial policies or endorsements either expressed or implied,
of ARO, NSF or the U.S. Government.
9. REFERENCES
[1] J. Abello, T. Eliassi-Rad, and N. Devanur. Detecting novel
discrepancies in communication networks. In ICDM,2010.
[2] S. Asur, S. Parthasarathy, and D. Ucar. An event-based
framework for characterizing the evolutionary behavior of
interaction graphs. In SIGKDD,2007.
[3] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan.
Group formation in large social networks: membership,
growth, and evolution. In KDD,2006.
[4] M. Cha, A. Mislove, and K. P. Gummadi. A
Measurement-driven Analysis of Information Propagation
in the Flickr Social Network. In WWW,2009.
[5] D. Chakrabarti, R. Kumar, and A. Tomkins. Evolutionary
clustering. In KDD,2006.
[6] A. Dhamdhere and C. Dovrolis. Ten years in the evolution
of the internet ecosystem. In SIGCOMM,2008.
[7] A. Dhamdhere and C. Dovrolis. The internet is flat:
modeling the transition from a transit hierarchy to a
peering mesh. In In CoNEXT,page21,2010.
[8] D. Dunlavy, T. Kolda, and E. Acar. Temporal link
prediction using matrix and tensor factorizations. TKDD,
5(2):10, 2011.
[9] W. Fu, L. Song, and E. Xing. Dynamic mixed membership
blockmodel for evolving networks. In ICML, pages 329–336.
ACM, 2009.
[10] M. Gotz, J. Leskovec, M. McGlohon, and C. Faloutsos.
Modeling blog dynamics. In ICWSM,2009.
[11] D. Greene, D. Doyle, and P. Cunningham. Tracking the
evolution of communities in dynamic social networks. In
ASONAM,2010.
[12] H. Habiba, Y. Yu, T. Berger-Wolf, and J. Saia. Finding
spread blockers in dynamic networks. In ASONAM,2008.
[13] D. Hand and R. Till. A simple generalisation of the area
under the roc curve for multiple class classification
problems. Machine Learning, 45(2):171–186, 2001.
[14] K. Henderson, B. Gallagher, T. Eliassi-Rad, H. Tong,
S. Basu, L. Akoglu, D. Koutra, C. Faloutsos, and L. Li.
Rolx: structural role extraction & mining in large graphs.
In KDD,pages12311239.ACM,2012.
[15] K. Henderson, B. Gallagher, L. Li, L. Akoglu,
T. Eliassi-Rad, H. Tong, and C. Faloutsos. It’s Who You
Know: Graph Mining Using Recursive Structural Features.
In SIGKDD,pages110,2011.
[16] J. Leskovec, L. Adamic, and B. Huberman. The dynamics
of viral marketing. TWEB, 1(1):1–39, 2007.
[17] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over
time: densification laws, shrinking diameters and possible
explanations. In KDD,2005.
[18] Y. Lin, Y. Chi, S. Zhu, H. Sundaram, and B. Tseng.
Analyzing communities and their evolutions in dynamic
social networks. TKDD, 3(2):8, 2009.
[19] P. Ma h a devan , D . Krio u ko v, M. Fo m e nkov,
X. Dimitropoulos, et al. The Internet AS-level topology:
three data sources and one definitive metric. ACM
SIGCOMM CCR, 36(1):17–26, 2006.
[20] J. O’Madadhain, J. Hutchins, and P. Smyth. Prediction
and ranking algorithms for event-based network data.
SIGKDD Explorations, 7(2):30, 2005.
[21] R. Pan and J. Saramaki. Path lengths, correlations, and
centrality in temporal networks. arXiv:1101.5913,2011.
[22] S. Papadimitriou, J. Sun, and C. Faloutsos. Streaming
pattern discovery in multiple time-series. In VLDB,2005.
[23] R. Rossi, B. Gallagher, J. Neville, and K. Henderson.
Modeling temporal behavior in large networks: A dynamic
mixed-membership model. In LLNL-TR-514271,2011.
[24] R. Rossi and D. Gleich. Dynamic pagerank using evolving
teleportation. In WAW, pages 126–137. LNCS 7323, 2012.
[25] R. Rossi, L. McDowell, D. Aha, and J. Neville.
Transforming graph data for statistical relational learning.
Journal of Artificial Intelligence (JAIR),2012.
[26] R. Rossi and J. Neville. Time-evolving relational
classification and ensemble methods. In PAKDD,2012.
[27] J. Sun, C. Faloutsos, S. Papadimitriou, and P. Yu.
Graphscope: parameter-free mining of large time-evolving
graphs. In KDD,2007.
[28] L. Tang, H. Liu, J. Zhang, and Z. Nazeri. Community
evolution in dynamic multi-mode networks. In SIGKDD,
pages 677–685. ACM, 2008.
[29] X. Wang, X. Liu, and D. Loguinov. Modeling the Evolution
of Degree Correlation in Scale-Free Topology Generators.
In INFOCOM,2007.
[30] E. Xing, W. Fu, and L. Song. A state-space mixed
membership blockmodel for dynamic network tomography.
Ann. Appl. Stat., 4(2):535–566, 2010.
[31] J. Yang and J. Leskovec. Patterns of temporal variation in
online media. In WSDM,2011.
... In the work of Rossi et al. (29), large time-evolving graphs were analyzed for anomaly detection. They found that it is possible to identify interesting patterns and detect unusual structural transitions. ...
... Following the work of Rossi et al. (29), we estimate the latent features, which are called the "roles of the graph," and use them to describe the behaviors of the graph. A role transition model is used to capture the behavioral transitions of the nodes in each snapshot over time t. ...
... Nodes with similar role representations can be considered to be in one group with a common role in the graph. We estimate the role representations as a low-rank r matrix R t ∈ R n×r of the nodes of snapshot G t as R t F ≈ V t using NMF for reasons of interpretability and efficiency (29). The value of r is chosen such that r < min t (n t , f ), where n t is the number of active nodes at time t, and f is the number of discovered features. ...
Article
Full-text available
Introduction The worldwide COVID-19 pandemic, which began in December 2019 and has lasted for almost 3 years now, has undergone many changes and has changed public perceptions and attitudes. Various systems for predicting the progression of the pandemic have been developed to help assess the risk of COVID-19 spreading. In a case study in Japan, we attempt to determine whether the trend of emotions toward COVID-19 expressed on social media, specifically Twitter, can be used to enhance COVID-19 case prediction system performance. Methods We use emoji as a proxy to shallowly capture the trend in emotion expression on Twitter. Two aspects of emoji are studied: the surface trend in emoji usage by using the tweet count and the structural interaction of emoji by using an anomalous score. Results Our experimental results show that utilizing emoji improved system performance in the majority of evaluations.
... Using NLP to analyse data like [12], [15]- [16] and [16-[17], for example, is common since security events are typically reported in natural language. Some projects also use statistical and graph mining [13] methods to attain their objectives. [13]. ...
... Some projects also use statistical and graph mining [13] methods to attain their objectives. [13]. ...
Article
Data science may be used to detect, prevent, and address ever-evolving cybersecurity risks. CSDS is a fast developing field. When it comes to cybersecurity, CSDS emphasises the use of data, concentrates on generating warnings that are specific to a particular threat and uses inferential methods to categorise user behaviour in the process of attempting to enhance cybersecurity operations. Data science is at the heart of recent developments in cybersecurity technology and operations. Automation and intelligence in security systems are only possible through the extraction of patterns and insights from cybersecurity data, as well as the creation of data-driven models that reflect those patterns and insights An attempt is made in this work to describe the various data-driven research approaches with a focus on security. In accordance with the phases of the technique, each work that anticipates cyber-incidents is thoroughly investigated to create an automated and intelligent security system.
... In reality, many networks, such as passenger flow networks, evolve over time with the changing number and weight of edges and nodes. Although the temporal information in graphs has received increasing attention from the research community, most existing studies can only partially capture it by approximating the dynamical network using a sequence of static network snapshots (Rossi et al., 2012(Rossi et al., , 2013Saha et al., 2018). A few recent studies have developed temporal random walk-based approaches to address the problem of node embedding in dynamical networks, typically a communication network consisting of a sequence of edges with single unique timestamps (Béres et al., 2019;Lee et al., 2020). ...
Article
Service bottlenecks are a key barrier to building a resilient public transport system. In this paper, we propose a new approach to automatically extract the role of a station in dynamical public transport flow networks based on the emerging role discovery method in network science. The term "role" in this study refers to the distinctive position or function that a station plays within the public transport flow network. Using smart card data from Nanjing public bikesharing agencies, we first construct dynamical public transport flow networks with notions of dynamical graph and edge. We then develop a dynamical algorithm to recursively compute the structural flow characteristics of nodes in passenger flow networks. Non-negative Matrix Factorization is conducted to extract the role memberships from the derived structural feature matrix and interpret each role in terms of measurements with practical values. The network hubs and potential service bottlenecks are then identified based on their operating characteristics and dynamics. Furthermore, the day-today and within-day role dynamics of public transport stations over time are unveiled. The results contribute to a better understanding of the interplay between stations in the network, and the identification of roles provides insight for public transport agencies to improve service resilience.
... When developing an econometric model, it is crucial to consider the asymptotic behaviour of the model, meaning how it will behave over time as it approaches its limiting distribution. The choice of the sample size (represented by "N" in the statement) can also impact the model's behaviour, so it is essential to consider these factors when constructing and analysing econometric models carefully [56]. ...
Article
Full-text available
In this work, through employing Friedkin Johnsen's model, we provide a valuable tool for understanding the complex dynamics of social influence and informational inducements in shaping consumption behaviour and highlight the need for governments, businesses, and individuals to address environmental concerns proactively. People mostly derive anticipation utility from consuming commodities through online shopping. Results suggest that in an information-loving society, people tend to follow the opinion of their groups, which can lead to inefficient choices. On the other hand, in a completely information-averse society, people tend to make inconsistent choices, leading to a lack of consensus. However, in a responsible society, individuals prioritise their own opinions and preferences while still taking into account the information and opinions of others. This results in a slow convergence of opinions, which can lead to responsible consumption and decision-making. People should be encouraged to form their own opinions based on their own experiences and preferences while still considering the information and opinions of others. It can lead to a more efficient and responsible society. Individuals with high self-confidence and self-control are more likely to resist peer pressure and make decisions that align with their values and goals. So, it is essential to consider the context and nature of the social influence when evaluating its impact on people's decision-making. Consumers are not the only players who can shape the world's future. Consumers, governments, corporations, and the media all have important roles to play, and their efforts must be coordinated and complementary to create a more sustainable future.
... Several models applied node proximity matrix factorization directly to dynamic graphs by updating the proximity matrix between entities in the dynamic graphs. Rossi et al. [134] presented dynamic graphs as a set of static graph snapshots: ...
Article
Full-text available
Graphs are data structures that effectively represent relational data in the real world. Graph representation learning is a significant task since it could facilitate various downstream tasks, such as node classification, link prediction, etc. Graph representation learning aims to map graph entities to low-dimensional vectors while preserving graph structure and entity relationships. Over the decades, many models have been proposed for graph representation learning. This paper aims to show a comprehensive picture of graph representation learning models, including traditional and state-of-the-art models on various graphs in different geometric spaces. First, we begin with five types of graph embedding models: graph kernels, matrix factorization models, shallow models, deep-learning models, and non-Euclidean models. In addition, we also discuss graph transformer models and Gaussian embedding models. Second, we present practical applications of graph embedding models, from constructing graphs for specific domains to applying models to solve tasks. Finally, we discuss challenges for existing models and future research directions in detail. As a result, this paper provides a structured overview of the diversity of graph embedding models.
... In [56], the following example is provided: when analysing reviewer-reviewed product data it may become much more important to represent the connections between the reviewer and the product in a graphical way and later to analyse the connections. Based on such an approach, a variety of methods have been developed [57][58][59]. ...
Article
Full-text available
It seems to be a truism to say that we should pay more and more attention to network traffic safety. Such a goal may be achieved with many different approaches. In this paper, we put our attention on the increase in network traffic safety based on the continuous monitoring of network traffic statistics and detecting possible anomalies in the network traffic description. The developed solution, called the anomaly detection module, is mostly dedicated to public institutions as the additional component of the network security services. Despite the use of well-known anomaly detection methods, the novelty of the module is based on providing an exhaustive strategy of selecting the best combination of models as well as tuning the models in a much faster offline mode. It is worth emphasizing that combined models were able to achieve 100% balanced accuracy level of specific attack detection.
Article
Existing graph systems focus mainly on the execution efficiency of the graph analysis tasks, often ignoring the importance and efficiency of time-evolving graph storage. However, to effectively mine the potential application values, an efficient storage system is important for time-evolving graphs whose storage requirement scales with the increasing number of snapshots. Storage cost and snapshot access speed are the two most important performance indicators for a time-evolving graph storage system, which are challenging for designers of such systems because they are conflicting goals. In this article, we address these challenges by proposing an efficient storage scheme for the large time-evolving graphs. We first design a Snapshot-level Data Deduplication (SLDD) strategy to eliminate the large number of repeated vertices and edges among the snapshots, and then a Structure-Changing Graph Representation (SCGR) to significantly improve the snapshot access speed. We implement an efficient time-evolving graph storage system, TgStore, based on this scheme to effectively store large-scale time-evolving graphs, aiming to efficiently support the time-evolving graph analysis tasks. Experimental results show that TgStore can obtain a high compression ratio of 43.03:1 when storing 100 snapshots of Twitter, while with an average snapshot access speedup of 16×. Efficient storage scheme enables TgStore to efficiently support time-evolving graph algorithms. For example, when executing the Pagerank algorithm on the time-evolving graph of Twitter, TgStore outperforms Graphone, a state-of-the-art time-evolving graph storage system, by 15.9× in algorithm execution speed and 1.45× in memory usage.
Article
Predicting link states on dynamic attributed networks is one of the most fundamental problems for network analysis. To accurately predict the formations and disappearances of links, we need to utilize three types of information, that is, structural information, node content information, and temporal information, simultaneously. To this end, we propose a novel approach called LUSTC for predicting links and unlinks with structural information, temporal information, and node content information on dynamic attributed networks. For each snapshot, LUSTC first randomly chooses some sets of active nodes whose degree changes between adjacent snapshots and collects higher-order structural information using a random walk method based on the active nodes. Then, LUSTC generates two global matrices containing the temporal structural information and temporal node content information, respectively, as well as a sequence of auxiliary matrices for reconstructing the structural information and node content information of snapshots. These generated matrices are optimized using a nonnegative matrix factorization (NMF) method based on the structural information and node content information of snapshots. Finally, LUSTC estimates the similarity matrix for future snapshots to predict the links that are more likely to be formed or broken. The experimental results on various dynamic attributed networks demonstrate the effectiveness of LUSTC on the link prediction and unlink prediction tasks.
Article
Full-text available
Relational data representations have become an increasingly important topic due to the recent proliferation of network datasets (e.g., social, biological, information networks) and a corresponding increase in the application of statistical relational learning (SRL) algorithms to these domains. In this article, we examine and categorize techniques for transforming graph-based relational data to improve SRL algorithms. In particular, appropriate transformations of the nodes, links, and/or features of the data can dramatically affect the capabilities and results of SRL algorithms. We introduce an intuitive taxonomy for data representation transformations in relational domains that incorporates link transformation and node transformation as symmetric representation tasks. More specifically, the transformation tasks for both nodes and links include (i) predicting their existence, (ii) predicting their label or type, (iii) estimating their weight or importance, and (iv) systematically constructing their relevant features. We motivate our taxonomy through detailed examples and use it to survey competing approaches for each of these tasks. We also discuss general conditions for transforming links, nodes, and features. Finally, we highlight challenges that remain to be addressed.
Conference Paper
Full-text available
Relational networks often evolve over time by the addition, deletion, and changing of links, nodes, and attributes. However, accu-rately incorporating the full range of temporal dependencies into relational learning algorithms remains a challenge. We propose a novel framework for discovering temporal-relational representations for classi-fication. The framework considers transformations over all the evolving relational components (attributes, edges, and nodes) in order to accu-rately incorporate temporal dependencies into relational models. Addi-tionally, we propose temporal ensemble methods and demonstrate their effectiveness against traditional and relational ensembles on two real-world datasets. In all cases, the proposed temporal-relational models outperform competing models that ignore temporal information.
Conference Paper
Full-text available
The importance of nodes in a network constantly fluctuates based on changes in the network structure as well as changes in external interest. We propose an evolving teleportation adaptation of the PageRank method to capture how changes in external interest influence the importance of a node. This framework seamlessly generalizes PageRank because the importance of a node will converge to the PageRank values if the external influence stops changing. We demonstrate the effectiveness of the evolving teleportation on the Wikipedia graph and the Twitter social network. The external interest is given by the number of hourly visitors to each page and the number of monthly tweets for each user.
Conference Paper
Full-text available
A multi-mode network typically consists of multiple hetero- geneous social actors among which various types of interac- tions could occur. Identifying communities in a multi-mode network can help understand the structural properties of the network, address the data shortage and unbalanced prob- lems, and assist tasks like targeted marketing and finding in- fluential actors within or between groups. In general, a net- work and the membership of groups often evolve gradually. In a dynamic multi-mode network, both actor membership and interactions can evolve, which poses a challenging prob- lem of identifying community evolution. In this work, we try to address this issue by employing the temporal information to analyze a multi-mode network. A spectral framework and its scalability issue are carefully studied. Experiments on both synthetic data and real-world large scale networks demonstrate the efficacy of our algorithm and suggest its generality in solving problems with complex relationships.
Article
Given a large time-evolving network, how can we model and characterize the temporal behaviors of individual nodes (and network states)? How can we model the behavioral transition patterns of nodes? We propose a temporal behavior model that captures the 'roles' of nodes in the graph and how they evolve over time. The proposed dynamic behavioral mixed-membership model (DBMM) is scalable, fully automatic (no user-defined parameters), non-parametric/data-driven (no specific functional form or parameterization), interpretable (identifies explainable patterns), and flexible (applicable to dynamic and streaming networks). Moreover, the interpretable behavioral roles are generalizable, computationally efficient, and natively supports attributes. We applied our model for (a) identifying patterns and trends of nodes and network states based on the temporal behavior, (b) predicting future structural changes, and (c) detecting unusual temporal behavior transitions. We use eight large real-world datasets from different time-evolving settings (dynamic and streaming). In particular, we model the evolving mixed-memberships and the corresponding behavioral transitions of Twitter, Facebook, IP-Traces, Email (University), Internet AS, Enron, Reality, and IMDB. The experiments demonstrate the scalability, flexibility, and effectiveness of our model for identifying interesting patterns, detecting unusual structural transitions, and predicting the future structural changes of the network and individual nodes.
Article
Given a network, intuitively two nodes belong to the same role if they have similar structural behavior. Roles should be automatically determined from the data, and could be, for example, "clique-members," "periphery-nodes," etc. Roles enable numerous novel and useful network-mining tasks, such as sense-making, searching for similar nodes, and node classification. This paper addresses the question: Given a graph, how can we automatically discover roles for nodes? We propose RolX (Role eXtraction), a scalable (linear in the number of edges), unsupervised learning approach for automatically extracting structural roles from general network data. We demonstrate the effectiveness of RolX on several network-mining tasks: from exploratory data analysis to network transfer learning. Moreover, we compare network role discovery with network community discovery. We highlight fundamental differences between the two (e.g., roles generalize across disconnected networks, communities do not); and show that the two approaches are complimentary in nature.
Conference Paper
Interaction graphs are ubiquitous in many elds such as bioinformatics, sociology and physical sciences. There have been many studies in the literature targeted at studying and mining these graphs. However, almost all of them have studied these graphs from a static point of view. The study of the evolution of these graphs over time can provide tremendous insight on the behavior of entities, communities and the o w of information among them. In this work, we present an event-based characterization of critical behavioral patterns for temporally varying interaction graphs. We use non-overlapping snapshots of interaction graphs and develop a framework for capturing and identifying interesting events from them. We use these events to characterize complex behavioral patterns of individuals and communities over time. We show how semantic information can be incorporated to reason about community-behavior events. We also demonstrate the application of behavioral patterns for the purposes of modeling evolution, link prediction and inuence maximization. Finally, we present a diusion model for evolving networks, based on our framework.