Next Article in Journal
Comprehensive Study of Variety Oenological Potential Using Statistic Tools for the Efficient Use of Non-Renewable Resources
Next Article in Special Issue
Bot Datasets on Twitter: Analysis and Challenges
Previous Article in Journal
Geotechnical Property Modeling and Construction Safety Zoning Based on GIS and BIM Integration
Previous Article in Special Issue
An Empirical Study of Drivers, Barriers, and Cost Efficiency of Information Systems in Greek Industry
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Many-Objective Optimization for Anomaly Detection on Multi-Layer Complex Interaction Networks

by
Asep Maulana
1,† and
Martin Atzmueller
1,2,*,†,‡
1
Department of Cognitive Science and Artificial Intelligence, Tilburg University, 5000 Tilburg, The Netherlands
2
Semantic Information Systems Group, Osnabrück University, 49074 Osnabrück, Germany
*
Author to whom correspondence should be addressed.
Both authors contributed equally to this work.
This article is a substantially adapted and extended revision of our paper “Centrality-Based Anomaly Detection on Multi-Layer Networks Using Many-Objective Optimization” published in the 7th International Conference on Control, Decision and Information Technologies (CoDIT), Prague, Czech Republic, 29 June–2 July 2020; Volume 1, pp. 633–638.
Appl. Sci. 2021, 11(9), 4005; https://doi.org/10.3390/app11094005
Submission received: 31 March 2021 / Revised: 21 April 2021 / Accepted: 25 April 2021 / Published: 28 April 2021
(This article belongs to the Special Issue New Trends in Social Computing and Its Applications)

Abstract

:
Anomaly detection in complex networks is an important and challenging task in many application domains. Examples include analysis and sensemaking in human interactions, e.g., in (social) interaction networks, as well as the analysis of the behavior of complex technical and cyber-physical systems such as suspicious transactions/behavior in financial or routing networks; here, behavior and/or interactions typically also occur on different levels and layers. In this paper, we focus on detecting anomalies in such complex networks. In particular, we focus on multi-layer complex networks, where we consider the problem of finding sets of anomalous nodes for group anomaly detection. Our presented method is based on centrality-based many-objective optimization on multi-layer networks. Starting from the Pareto Front obtained via many-objective optimization, we rank anomaly candidates using the centrality information on all layers. This ranking is formalized via a scoring function, which estimates relative deviations of the node centralities, considering the density of the network and its respective layers. In a human-centered approach, anomalous sets of nodes can then be identified. A key feature of this approach is its interpretability and explainability, since we can directly assess anomalous nodes in the context of the network topology. We evaluate the proposed method using different datasets, including both synthetic as well as real-world network data. Our results demonstrate the efficacy of the presented approach.

1. Introduction

With the current trends and advances in the digital transformation, an ever-increasing amount of complex relational data is observed. Naturally, such data and information can be modeled in networks; this specifically extends to multi-layer networks [1,2,3,4], which allow for modeling complex relationships on multiple levels or layers. Identifying and detecting anomalies in such complex networks is an important research problem that is relevant in various contexts, e.g., for the extended (behavioral) analysis of social interaction networks [5,6]. Further applications concern the analysis of (financial) transaction networks, cyber-physical systems, or trade networks. Here, the respective interactions can be analyzed, e.g., for detecting new knowledge about deviating (social/economical) behavior [7,8]. Specifically, the identification and analysis of sets of anomalous nodes is of particular interest, relating to the group anomaly detection problem. A further aspect is given by human-centered approaches, enabling computational sensemaking on the complex data and the detected anomalies, respectively.
In this paper—a substantially adapted and extended revision of [9]—we aim to identify and analyze potential anomalies in complex networks using many-objective optimization. We specifically focus on a specific class of networks, i.e., multiplex/multi-layer networks [2,10]. For multi-layer networks, each node is not only part of a single (layered) network but also part of multiple layers of a complex network. Here, a low/high centrality of a node in one layer of the network might not imply a low/high node centrality in another layer of the network. Multiplex networks are a special case of multilayer ones, being restricted to the same set of nodes in the layers and having according connections between layers [2]. Compared to our work in [9], we have both adapted/extended the presentation, the related work, the contextualization and description of the method, the discussion of the human-centered anomaly detection process, as well as the experimentation: Specifically, we present and discuss new experiments on three additional real-world datasets in our results and discussion.
In general, optimizing more than three objective function simultaneously can be categorized as many-objective optimization, yielding the Pareto Front in the multi-layer space. It is easy to see that different layers as different objective functions can be complementary. This means that, for example, minimizing the centrality of one layer could also imply minimizing the centrality of another layer as well. In contrast, the layers could also be contrary (conflicting) to the others. This then means that the structure of centrality is very different among the layers. Thus, our proposed method first estimates the centrality of all nodes in each layer of the multi-layer network, by applying many-objective optimization with full enumeration based on minimization and obtains the Pareto Front. The objective functions to be optimized simultaneously are the centralities of each layer in the network; thus, the number of objective function are given by the number of existing layers of a multi-layer network. Given the Pareto Front, we consider the contained set of nodes as a basis for identifying a candidate set of suspected anomaly nodes. For this, we apply the proposed novel ACE score for ranking the nodes. The ACE score is estimated using the centrality of the nodes relative to each layer, also taking the density of those layers into account. A high ACE score then indicates candidate anomalous nodes.
We evaluated our proposed approach on a multi-layer synthetic network as well as real-world complex networks, demonstrating its efficacy. Specifically, for the synthetic network, we applied data generated via Erdős-Rényi random graphs with a set of different link probability (p) configuration settings in order to generate structurally different network layers. In addition, we applied four real-world multi-layer networks, including social interaction, trade, and social media networks. A key feature of our proposed approach is its interpretability and explainability, since we can directly assess anomalous nodes with respect to the network topology; for this, we present a human-centered process model for anomaly detection, enabling computational sensemaking [11] on complex network data.
Our contributions are summarized as follows:
  • This paper presents a novel approach for identifying a set of anomalous nodes using many-objective optimization on multi-layer networks. Optimization is based on minimizing network centrality, to find a set of less important nodes in the network.
  • We present a novel measure, i.e., the ACE score, for ranking and identifying anomaly candidates balancing the criteria of connectedness, centrality, and density.
  • In our experiments, we evaluated the proposed method using one synthetic and four real-world networks: Thus, we generated simple to interpret network data and demonstrated the effectiveness of our approach on this synthetic data as well as on real-world multi-layer network data.
  • One particularly appealing feature of our proposed approach is its interpretability and explainability: the results of many-objective optimization and the presented ACE score can directly be assessed in a human-centered process for computational sensemaking. For this, we can use simple and intuitive topological network features as well as layered visualizations; we show some examples in our case studies.
The rest of this article is structured as follows: Section 2 discusses related work. Next, Section 3 describes our proposed method. After that, we discuss the experiments, case studies, and results in Section 4. Finally, Section 5 concludes with a summary and interesting directions for future work.

2. Related Work

Below, we outline and discuss related work on social interaction networks, anomaly detection, and many-objective optimization in the context of our presented approach.

2.1. Social Interaction Networks

Social network analysis [12,13] has the concept of a social network at its core: Following Wassermann and Faust [13], a social network is a social structure consisting of a set of actors (such as individuals or organizations); it includes a set of dyadic ties, i.e., relationships between these actors, e.g., induced by friendship, kinship, or organizational position. Usually, these relationships are modeled as a graph, with the actors as nodes and the ties as edges connecting the nodes. The analysis of social network data has received significant attention; enabling sophisticated modeling this can facilitate understanding and computational sensemaking, as well as making use of the collected data, e.g., [5,11,14,15,16].
Following [5], in this work, we focus on social interaction networks. These can be regarded as user-related social networks in social media capturing social relations inherent in social contexts. This includes social interactions, social activities, and other social phenomena. These, respectively, then act as proxies for social user-relatedness. In particular, according to Wassermann and Faust [13] (p. 37 ff.), social interaction networks focus on interaction relations between people as the corresponding actors, whereas this can also be extended towards other types of relationships and actors. User-generated ubiquitous and social interaction data represented as networks or graphs is observed in many different contexts, for example, in social media, Web 2.0, ubiquitous applications, sensor networks, or complex interaction processes, e.g., [17,18,19]. Specifically, we can also consider social relations implemented using specific resources, according to the principle of object-centric sociality, see [20]: Here, objects of a specific actor, e.g., resources, mediate connections to other actors such that traces of user interactions are captured. These basically form implicit interactions, e.g., if one actor visits a webpage of the other actor or clicks on a respective link in such a context.

2.2. Multi-Layer Networks

As outlined in [4], multi-layer networks enable advanced modeling options as an extension of simple social networks. In particular, multilayer networks enable sophisticated analysis approaches regarding complex real-world networks and according systems. Mining and analyzing multi-layer networks can enable a fine-grained perspective on the respective modeled characteristics and dynamics on multi-layer networks. Ultimately, this can then lead to an in-depth understanding of the respective node relationships and their interactions, c.f., [4]. As already discussed above in the context of social interaction networks, multi-layer networks feature advanced modeling options regarding different interaction contexts, which are considered on different interaction layers in the multi-layer setup.
As an example, ubiquitous and social interactions of an actor can occur directly, e.g., if she buys a certain product at an online store, sends a message in an online social network, or has a face-to-face conversation that is detected by special sensors. As another example, physical devices, e.g., mobile phones or RFID devices, can link relations in the digital domain to those in physical space, e.g., [17,18,19], corresponding to the idea of object-centric sociality discussed above. However, it is important to note that each of these interactions are performed by the same actor but in a different context; thus, this creates different interaction contexts that can then be used in modeling multi-layer networks. The emerging data is thus typically multi-relational and heterogeneous and usually includes several layers of interdependent abstractions. The collected data in such contexts can be conveniently modeled in the form of networks on multiple layers (and can be intuitively represented as graphs). In the form of a multi-layer network, this complex network structure then includes the respective multiple relationships between the actors on the respective layers.

2.3. Many-Objective Optimization

Optimizing many-objective functions (≥3) simultaneously is called many-objective optimization, e.g., [21,22,23]. It is applied to tackle a wide range of problems not only in science and engineering, e.g., [24,25], but also in the social sciences. Here, different approaches have been developed, such as reducing the complexity, e.g., [7,26]. Other approaches apply multi- and many-objective optimization for network analysis such as [27], in order to identify key players in large social networks; [8] utilized modularity maximization in multiplex networks using many-objective optimization; [28] performed community detection from signed social networks using a multi-objective evolutionary algorithm; and finally, [29] presented an approach for many-objective optimization using eigenvector centrality in multiplex networks.
In this paper, we adapt and extend the approaches proposed by Maulana et al. [8,9,29]. The first step of the approach starts by measuring the centrality of all nodes on all layers of multi-layer network. This is followed by applying many-objective optimization with full enumeration of all layers based on a maximization problem to find the Pareto Front. In contrast to this approach, we utilize the Pareto Front as a non-dominated solution generated by many-objective optimization for minimization as a basis to extract a set of anomaly candidates, i.e., a set of suspected anomalous nodes from the network.

2.4. Anomaly Detection

Anomaly detection (or outlier detection) is an important research field with broad application directions, c.f., [30,31]. In general, it targets the identification and detection of irregular or exceptional points and/or structures, while there exist different definitions. According to the classical definition of [32], “an outlier is an observation that differs so much from other observations as to arouse suspicion that it was generated by a different mechanism”. Here, there exists a variety of techniques, e.g., using subspace clustering [33,34], tensor factorization [35], community detection [36], adapting deep learning (classification/condition monitoring) techniques [37,38,39], or graph/signal processing methods [40,41]. Identifying anomalies in network data is a prominent novel research area. It features many important applications, such as identifying new and/or emerging user behavior, as well as the identification of detrimental or malicious activities, c.f., [42,43,44,45,46,47].
The general graph anomaly detection problem can be defined as follows: “Given a […] graph database, find the graph objects […] that are rare and that differ significantly from the majority of the reference objects in the graph” [48]. Thus, for complex networks, we can focus on different types of graph objects. We can consider individual nodes, the respective links/edges between nodes, or more complex substructures of nodes and/or links. In our context, this extends to multi-layer networks naturally. Currently, in the literature, there are mainly approaches for handling individual point anomalies corresponding to detecting individual nodes, as discussed in [48]. Additionally, in graph anomaly detection scenarios [49,50,51], typically, static plain graphs are considered. However, in real-world networks, the situation is typically more complex than only considering point anomalies and static graphs: for these, it is difficult to capture the multi-relations of the complex heterogeneous networks. Therefore, we extend our focus from point anomalies to groups and more complex structures, i.e., towards multi-layer networks; in particular, this also covers multiplex networks if we consider the same set of nodes in each layer. Regarding group anomaly detection, for example, the authors of [52] defined the general group anomaly detection problem as follows: “We are interested in finding the groups which exhibit a pattern that does not conform to the majority of other groups”. Then, for example, groups can be detected based on mixture models [53] or graphical models, e.g., [52]. In this paper, we focus on the group anomaly detection problem, applying multi-objective optimization using centrality measures as well as applying a scoring method, which is implemented in a human-centered approach—in contrast to methods relying on purely automatic methods. With this human-in-the-loop approach, we also enable computational sensemaking, e.g., [11,54].

3. Method

Our proposed approach is built upon different modeling and analysis techniques from the fields of network science and optimization—including multi-layer networks, network statistics and centrality, edge density, many-objective optimization. Below, we first present an overview of our approach before we discuss those specific approaches in detail.

3.1. Algorithmic Overview

In this paper, our objective is to detect the anomalous behavior of a set of nodes in multi-layer networks. For this, we start by identifying a set of nodes that exhibit some unusual behavior in terms of their interaction with other nodes. In summary, we focus on the network structure and target nodes with little connectivity or a deviating network structure, i.e., nodes having a low centrality in the network and its respective layers. This is formalized in the novel ACE score. Utilizing many-objective optimization and statistical network analysis methods using the ACE score, we apply the following steps for identifying the anomalous behavior of a set of candidate nodes in the multi-layer network.
  • First, we obtain general network statistics: We estimate the centrality of all nodes in each layer of the multiplex network as well as the network density of each layer.
  • Second, we apply our many-objective optimization approach: we identify a set of less important nodes through minimization using node centrality as a criterion; the number of layers becomes the number of objective functions to be optimized simultaneously for obtaining the Pareto Front.
  • Finally, we apply a semiautomatic human-centered approach: we start with the Pareto Front, where we select a candidate node from that Pareto Front, guided by the ACE score, if
    (a)
    it is weakly connected, i.e., with no connection in at least one network layer;
    (b)
    it has a very low centrality in a rather dense layer – assessed by the ACE score; or
    (c)
    its centrality is almost zero.
    After that, we interactively inspect the further ranked levels in order to determine other candidate nodes in a human-in-the-loop approach. In this way, we directly utilize the ranking provided by the proposed many-objective optimization approach.
Figure 1 depicts the presented approach. It is important to note that, during the semiautomatic step, different candidate nodes are proposed in close collaboration with the human-in-the-loop. Furthermore, during inspection and selection, all previous steps are transparently available in order to enable, e.g., “drill-down”, “zoom and filter”, and “details on demand” techniques, as proposed in the visual information seeking mantra by Shneiderman [55]. For this, specific visualizations of the different layers can also be utilized, as also discussed in our case studies. In this way, the candidate nodes as well as their embedding in the network and the respective layers can be transparently assessed.

3.2. Multi-Layer Networks

A multi-layer network (with a multiplex network as a special case) consists of multiple layers, modeling multiple relations. More formally, it can be defined as a graph G = ( V , E l ) , l = 1 m composed of n = | V | nodes and m different link sets for those nodes, which we call layers; accordingly, the set of nodes is denoted by V and the sets of links are modeled by E l , l { 1 m } . Furthermore, distinguishing between the different layers and modeling them as separate graphs, a multiplex network then can be represented formally as G = ( G 1 , G 2 , , G l , , G m ) , where G i = ( V i , E i ) , with V i V and E i models the edges of the ith layer. For a multiplex network, it holds that V i = V j for i j . A visual depiction of the network with different layers is shown in Figure 2.
Each network G l is represented by an adjacency matrix A l with entries a i j l = W i j l > 0 if there is a positive weight of the link between nodes v i l , v j l E l in layer l and a i j l = 0 otherwise. We use this representation to simplify the formalization of weighted multiplex networks by only considering edges with an integer weight larger or equal to zero between any pair of nodes v i l and v j l in a layer l.

3.3. Network Centrality

To find the most influential node in a network, we can utilize the notion of network centrality. This is formalized using different network centrality metrics. In everyday life, for example, we perceive a person or some people to be very important in a community or in an organization if in some way those have a certain influence on others or can generate important decision for a community. Identifying important person or organizations can then be considered as identifying key players in a community.
Network centrality methods enable the identification of such key players or most influential nodes in a social setting [56,57]. They include, e.g., the following centrality measures:
  • closeness centrality, measuring the distance from a specific node to all other nodes [58];
  • betweenness centrality, taking into account the number of shortest paths past the certain nodes in the network [59];
  • eigenvector centrality, considering the number of links from other nodes, their importance, and to how many these nodes themselves point to, c.f., [60]; and
  • degree centrality, centering on the number of connected peers for a node [61,62].
For our proposed approach, we consider eigenvector centrality which is computed for each layer of the network. We applied eigenvector centrality, since this precisely corresponds to our intuition for estimating the notion of connections to important nodes and/or parts of the network, which is relevant for anomaly detection. However, our method can potentially also be adapted to other centrality measures, e.g., see those above.
The eigenvector centrality can be defined as follows: For a given graph G: = ( V , E ) with | V | denoting the number of nodes, let A = ( a v , t ) , v { 1 , , | V | } , t { 1 , , | V | } be the adjacency matrix, i.e., a v , t = 1 if vertex v is linked to vertex t, and a v , t = 0 otherwise.
The relative centrality score of vertex v is defined as
x v = 1 λ t M ( v ) x t = 1 λ t = 1 | V | a t , v x t ,
where M ( v ) is a set of the neighbors of v and λ is a constant.
Furthermore, the eigenvector centrality in vector notation can be written as follows: A x = λ x . It is clearly defined that x is an eigenvector of A. Since there could be many eigenvectors of A, by convention, the eigenvector that corresponds to the largest eigenvalue is considered. There are two important factors that influence the eigenvector centrality of each node: (1) the number of neighbors that point to the node and (2) the weight of neighbors that point to the node.
Furthermore, there is also a possibility that nodes with a larger number of neighbors have a lower eigenvector centrality compared to nodes with fewer neighbors. This situation can occur, for example, when the neighbors of the less connected node have higher weights.

3.4. Centrality-Based Many-Objective Optimization Approach

For many-objective optimization of the network centrality, we define one objective function for each layer; per layer, our method is applied to minimize the eigenvector centrality of that layer, while overall, all layers are obviously taken into account by our proposed many-objective optimization approach. Using this method, for a multiplex network G with layers G 1 , , G m , m is thus defined as the number of objective functions.
Obviously, each node in each layer of the network can have a different centrality—either high or low and dominated or non-dominated. The node centrality is said to be non-dominated if there is no other point better than or equal to the centralities in different layers and better in at least one criterion or in one layer. For computing the non-dominated subset from a finite set of n solutions, the algorithm by Kung, Luccio, and Preparata is the fastest known approach [63]. It accomplishes this task with a time complexity in O ( n log n ) for m = 2 , 3 and O n ( log n ) m 2 for m > 3 . For our proposed approach, we compute the Pareto Front using many-objective optimization (by minimizing eigenvector centrality) to find the set of non-dominated solutions, i.e., the set of nodes with very low importance in the multi-layer network. The set of nodes in the resulting Pareto Front, i.e., the set of non-dominated solutions, is then the basis to select suspected anomalous nodes.

3.5. Statistical Analysis Based on Edge-Density

For statistical analysis of the nodes, we apply the nodes’ mean centrality and standard deviation for a respective layer to derive a specific score, as discussed below. We summarize basic notions according to the standard formalizations in the following.
In terms of arithmetics, the mean or average is usually denoted by x ¯ or μ , considering the sum of the sample values divided by the number of items in the sample, i.e.,
μ = 1 n i = 1 n x i = x 1 + x 2 + + x n n ,
as the sum of the sampled values x i divided by the number of items n in the sample.
The standard deviation
σ = 1 n 1 i = 1 n ( x i μ ) 2 ,
measures the spread of the sample compared to the mean. Thus, it can be interpreted as how the measurements for a group are spread out from the average (mean) or expected value. A low standard deviation means that most of the numbers are close to the average. A high standard deviation means that the numbers are more spread out. Furthermore, we include another parameter, i.e., the edge density, which measures the fraction of present to possible edges. In a dense graph, the number of edges is close to the maximal number of edges. In contrast, a graph with only a few edges is then a sparse graph. For undirected simple graphs, the (graph) density is defined as D = 2 | E | | V | ( | V | 1 ) . For a directed graph, this graph density is divided by two in order to take the directionality of edges into account.

3.6. Assessing Anomalous Nodes

For the final step in identifying a set of nodes that have no connection or have very low centrality in a high density layer, it is necessary to consider the density of the layer and to take the less important nodes, which are far from the mean in that layer, into account. In the following, we describe a special score to be applied, which we propose for indicating a node as an anomaly, the so-called ACE score (Anomaly candidate based on Centrality Evaluation).
The ACE score considers the mean and standard deviation of the centrality of all nodes in a specific layer (of the multiplex network), e.g., one which has very high edge density compared to other layers. Using the ACE score for the set of nodes on the Pareto Front, we chose those with the highest ACE score or those that are very close to this score and are far from the mean μ in each layer. Then, these nodes were indicated as anomalous candidate nodes. These candidates can then be further assessed and inspected in the described human-centered approach. More formally, the ACE score for node v in layer l is defined as follows:
A C E ( v , l ) = μ l x v l σ l D l ,
where μ l is the mean nodal centrality in layer l, x v l is the centrality of each node/vertex v in layer l, σ l is the standard deviation, and D l denotes the edge density of layer l.

4. Results

For our evaluation, we discuss the experimentation performed in four experiments and case studies using a synthetic as well as several real-world networks. Those include (face-to-face) social interactions, a trade interaction network, as well as social media induced networks. It is important to note that, in this paper, we focus on the task of group anomaly detection, specifically with a semiautomatic human-in-the-loop approach. To the best of the authors’ knowledge, this is a novel methodological focus, lacking standard methods for comparison. Therefore, in our experimentation and discussion, we focus on the evaluation of our proposed method, analyzing and discussing our results in detail, including qualitative results and insights in the context of several case studies on real-world datasets. We first provide an overview on the different network datasets before we provide our analysis results, discussing them in detail in context.

4.1. Datasets—Networks

For the synthetically generated network, we applied the Erdős and Rényi models since these are standard network generation models that are also simple to interpret. For the real-world networks, we utilized a range of datasets with different sizes and characteristics, also covering different domains. We applied the following datasets, as summarized in Table 1, which are also publicly available:
  • a standard multiplex network dataset from Aarhus university [64,65],
  • the Kapferer Tailor Shop multiplex network [66,67],
  • a multi-layer network modeling world trade [8,29,68], and
  • a multi-layer social network induced by social media (FriendFeed, Twitter, Youtube) [1,3,69].

4.2. Case Study I: Synthetic Multi-Layer Networks

In our first case study for evaluating our approach, we focus on synthetically generated networks. These are generated via a random graph according to the Erdős and Rényi model. In this complete graph model, each edge has a probability of 1 p to be removed from the network. By varying the probability and number of nodes, we can generate different networks and layers, respectively.
We generated networks with a specific number of nodes ( n = 100 ) and link probabilities ranging from p = 0.03 to p = 0.3 ; for the number of layers, we chose l = 5 layers. We denote the layers with g 1 to g 5 . Table 2 provides an overview on the respective network statistics. Figure 3 shows the applied synthetic network based on Erdős-Rényi graph generation. Each layer corresponds to one synthetic network with different link probabilities p { 0.03 , 0.05 , 0.20 , 0.25 , 0.30 } . We performed a round of experiments, and take this specific instantiation as an example to demonstrate the methodological approach. Other instantiations, e.g., varying the number of layers, showed similar results.
For our example case, as a result of the estimation of eigenvector centrality and the application of many-objective optimization for synthetics networks, we detected 38 nodes in the Pareto Front, c.f., Table 3. Applying our selection methodology described in Section 3, we started with those nodes in the Pareto Front in order to identify candidate nodes as sets of anomalous nodes. Therefore, starting with these 38 nodes, we observe a set of nodes with very high ACE score values or some nodes that are very close to these and show a large deviation from the respective centrality mean μ . In particular, we took those nodes with very high ACE score in specific consideration, where we observe them being contained in the layers that have high density D. In our case, these are the layers g 3 , g 4 , and g 5 . As a result, we can identify six nodes (35, 39, 48, 68, and node 99), which were then categorized as anomalous nodes.
As can be observed in Table 3 and Table 4 and Figure 3, in this way, we selected the nodes with the highest ACE score that are also in the Pareto Front, focusing on the denser layers, while the low-density layers are neglected since these also feature quite low ACE scores. Intuitively, this makes sense since a node with a low connectivity and/or high eigenvector centrality on a layer with higher density then gets a higher chance to be proposed as an anomalous node. It is important to note that layers g 1 and g 2 feature some unconnected nodes, which can then be indicated as anomaly candidates for these layers based on a connectivity criterion as well. Such a (simple) criterion can of course be implemented complementing the Pareto-front-based selection. However, in our many-objective optimization approach, we consider all layers at the same time to first find initial candidates on the Pareto Front by minimizing eigenvector centrality, which are then refined using further criteria such as density and connectivity, which are formalized in the novel ACE score.
Overall, it is important to note that all of the steps of this process occur transparently, i.e., the initial candidates can be inspected and validated by the human-in-the-loop and guided by visualizations such as those given in Figure 3. This is an important and relevant feature of our approach regarding interpretability and explainability, as also discussed in the process model in Section 3.

4.3. Case Study II: Aarhus Real-World Multi-Layer Network

In our second experiment, we consider the analysis of a first real-world multiplex network. The network application context relates to the scope of social interactions, i.e., interactions in a departmental context between people working at that department [64,65]. Here, we observed slightly different patterns compared to the synthetic network data, which we discuss in detail below.
The applied network data consist of five layers modeling online and offline relationships (Facebook, Leisure, Work, Co-authorship, and Lunch) between the employees of the Computer Science department at Aarhus University. The network includes 61 nodes, representing the respective members at the department. Figure 4 depicts the individual layers of the multiplex network, representing the individual relationships. We observe a rather relative dense structure in layer 5 compared to the other layers, this is also summarized in Table 5 where we present a statistical overview on the network and its layers, respectively.
Figure 5 shows a detailed view on layer 5, i.e., the densest layer. Here, we can already observe some interesting findings regarding the connection structure, i.e., regarding relatively loosely connected nodes and one unconnected node. This will be useful when interpreting our results, which we will discuss in the following.
As result of estimating the centrality for all nodes in all layers and applying many-objective optimization through minimization, we found a Pareto Front that consists of six nodes. As shown in Figure 6, these are the nodes 1, 8, 12, 14, 37, and 60. For determining the nodes to be categorized as anomalous nodes, we considered the high density D layers as a basis to find nodes with the highest ACE score. Additionally, we considered the ones closest to the highest ACE score and far from the mean μ , being contained in the Pareto Front. In Figure 6, we show a visualization of the different layers and the Pareto Front.
From those nodes in the Pareto Front shown in Table 6, we assessed those with the highest ACE score in each layer—these are summarized in Table 7. As we can see in the table, in layer 1, the highest score is achieved by node 60, while in layer 2, there are nodes 1 and 14; in layer 3, there are nodes 4, 8, 12, and 14; in layer 4, there are nodes 1, 14, and 60; and finally, in layer 5, there is node 1. Since layer 3 exhibits a very low density D, we did not consider this layer as a high indicator in consideration in order to find anomalous nodes. Additionally, as can be seen from the scores and the different layers, we can actually focus on those nodes that occur in more than two layers as interesting candidates, which also supports our intuitions. Therefore, in this way, we can actually collect “evidence” in this network towards designating nodes as anomalous from several layers of the network.
As a consequence, we can identify four nodes out of six nodes in the Pareto Front to be selected as candidate anomalous nodes in our semiautomatic human-centered process, as we have discussed above. As an outcome, the designated final set of anomalous nodes is given by nodes 1, 12, 14, and 60. In the social context, this then indicates, for example, that node 1, node 12, node 14, and node 60 are not very active in the interaction with their colleague in terms of special interactions (layer1 = Facebook, layer 2 = Leisure, layer 3 = Work, layer 4 = Co-authorship, and layer 5 = Lunch): node 60 and node 12 are very rare in interactions with their colleagues on Facebook, and node 1 and node 14 are not very active in communication with their colleague related to leisure and co-authorship. Additionally, node 1 shows little interaction in leisure and co-authorship and is less active in interacting with his colleagues regarding lunch. The analysis process described above provides for a human-centered interpretable and explainable approach since simple network metrics and topological indicators can be easily inspected in context on the multiplex network, making use of the visualization of different layers and contextual inspection of their parameters [55,70].

4.4. Case Study III: Real-World Multi-Layer Network—Kapferer Tailor Shop

The third experiment concerns another well-known social network dataset in a multi-relational context [66,67]. This well-known social network dataset was collected by Bruce Kapferer himself in Zambia (June to August 1965), c.f., [66]. The dataset involves interactions among workers in a tailor shop. An interaction is defined by Kapferer as “continuous uninterrupted social activity involving the participation of at least two persons” (p. 163, [66]); only transactions that were relatively frequent are recorded. All of the interactions in this particular dataset are “sociational”, as opposed to “instrumental”. Kapferer explained the difference (p. 164, [66]) as follows: “I have classed as transactions which were sociational in content those where the activity was markedly convivial such as general conversation, the sharing of gossip and the enjoyment of a drink together. Examples of instrumental transactions are the lending or giving of money, assistance at times of personal crisis and help at work.” [66].
Kapferer also observed and recorded instrumental transactions, many of which are unilateral (directed) rather than reciprocal (undirected), though those transactions are not recorded here. In addition, there was a second period of data collection, from September 1965 to January 1966, but these data are also not recorded here. All data are given in Kapferer’s 1972 book [66] on pp. 176–179. Kapferer observed different types of interactions in two different time intervals, which were seven months apart. Each layer of the network denotes a different type of interaction at the shop, i.e., sociational (friendship and socioemotional) and instrumental (work- and assistance-related).
Our applied dataset was taken from the well-known Kapferer multi-layer network data. The network data includes 39 individuals who are represented as nodes in the network. Table 8 provides a statistical characterization of the network and its layers. Figure 7 shows a visualization of the different layers and the Pareto Front using a Parallel Coordinates plot. Here, we can clearly identify the anomaly candidates (on the right) obtained by our approach.
From our experimentation utilizing many-objective optimization, we detected eight nodes in the Pareto Front. These are Donald, Mateo, Chipalo, Paulos, Sign, Zakeyo, Adrian and Kallundwe; see Table 9 for details. By calculating and identifying the highest ACE score in each layer except in the layer with the lowest of the density, we finally obtained the following nodes: Sign, Donald, Zakeyo, and Chipalo have the highest ACE-Score in layers 1, 2, and 4 respectively; here, we neglect layer 3 as it is the one with the lowest network density. Therefore, Sign, Donald, Zakeyo, and Chipalo are finally selected as anomalous nodes in the network. For a detailed view on the statistics, we refer to Table 10.

4.5. Case Study IV: Real-World Multi-Layer Network of World Trade Network

In our fourth experiment, we consider a multi-layer network modeling world trade relationships. These data originate from import–export interactions on commodities between some countries of the world in 2011, c.f., [8,29,68], disaggregated for different traded commodities. This network can be defined as a multiplex network composed of many layers, where each layer is given by a different commodity. Figure 8 shows the first layer of the network. The nodes are given by the 207 countries contained. A link between two countries in a layer is given if there is trade between them in the respective commodity. The data are presented in matrix form: rows and columns represent countries, and the entries of the matrices are the volumes of trade. It is therefore a weighted multiplex network. The general classification is based on 96 different commodities. The classification was performed by grouping together similar commodities; this procedure leads to 11 aggregated ‘super-commodities’.
In our experiment, we applied anomaly detection using the method explained above. Our results indicate a special outcome compared to other dataset—we can observe a specific special case here. Having obtained the Pareto Front and after having computed the respective ACE scores, we observe that, as a result, only one single node in the Pareto Front is provided, c.f., Table 11. Therefore, assessing a set of nodes using the ACE score cannot be performed–since we only have one candidate, which is already our final result. To this end, we conclude that, for our specific case, if we found a single node in the Pareto Front, then this node has quite different characteristics compared to all other nodes. For further (but weaker) candidates, we could resort to the nodes at the second rank of the dominated solution from the Pareto Front, using the ACE score for assessment as well.

4.6. Case Study V: Real-World Multi-Layer Social Media Network—FriendFeed, Twitter, Youtube (FFTWYT)

For the experiments in this final case study, we focused on a multi-layer network in the context of social media—considering networks on FriendFeed, Twitter, and Youtube (FFTWYT). The respective anonymized dataset [1,3,69] was obtained starting from FriendFeed, i.e., a social media aggregator. In the following, we summarize the data collection and aggregation according to [1,3,69]: In the FriendFeed system, the users can directly post messages and comment on other messages; in addition, they can also register their accounts on other systems. For constructing the dataset, the FriendFeed social media aggregator was used to align users also registered on the respective other platforms (http://multilayer.it.uu.se/datasets.html; last accessed, 17 November 2020).
Using the FriendFeed information about users who registered exactly one Twitter account that was associated to exactly one FriendFeed account, two layers can be inferred (ff-tw); in addition, an additional YouTube layer (ff-tw-yt) could be constructed using the respective links to YouTube, c.f., [1,3,69]. This results in three layers in total. The real network data applied features a total number of 6407 nodes and 74,862 edges. Table 12 shows a statistical characterization and network metrics of the different layers.
From the Pareto Front of the social media network data, we obtained 7 nodes, i.e., nodes 143, 1101, 1102, 2551, 3418, 4391, and 4497, as shown in Table 13. While the many-objective optimization approach works fine on the dataset, it is easy to see that layer 1 (Youtube) does not contribute much regarding the findings, since the centralities are mostly zero due to the sparseness (low density) of the network. Therefore, we consider the ACE score only with the layer of high edge density edge, i.e., focusing on the FriendFeed and Twitter layers (layer 2 and layer 3). Due to the very large number of nodes, we show a summary of the detailed results in Table 14. As the result, from layer 2, we can observe that nodes in the Pareto Front with high ACE scores are nodes 143, 1101, and 1102. In addition, when we compute the ACE score in layer 3, we can see that the nodes in the Pareto Front with high ACE score are the nodes 1101, 1102, and 2551. Therefore, taking both these layers into account, we determined the final set of anomalous candidate nodes from this social media multiplex network as the nodes 143, 1101, 1102, and 2551, in total.

5. Conclusions

In this paper, we proposed a novel approach for centrality-based anomaly detection on multi-layer networks using many-objective optimization. In summary, the presented approach identifies anomaly candidates based on a new method to obtain a Pareto Front of potential anomalous nodes via minimizing eigenvector centrality. Given these candidates, we applied a statistical network metrics criterion—formalized in the novel ACE score—which balances the connectivity and eigenvector centrality of a node in relation to density relative to the containing layer.
For our evaluation, we conducted experiments using synthetic as well as real-world multi-layer network data. Specifically, we utilized a synthetic dataset generated by an Erdős Rényi random graph generation approach. Furthermore, we applied four different real-world multiplex networks capturing different (social) relations.
From our results and the analysis in detecting anomalous nodes in the synthetic network generated by an Erdős Rényi generator, we could clearly identify the anomalous nodes given the different layer structure on the synthetic data. Regarding the real-world networks, such as the Aarhus, Kapferer, trade, and social media networks, we could also apply our proposed approach well, identifying some special cases such as singular anomalies and anomalies supported by layers with different densities. In this respect, our results were quite clear in identifying the sets of anomalous nodes. Finally, by measuring the mean μ , standard deviation σ , and edge-density D, from the population of nodes centrality in each layer, the ACE score of each layer can be directly calculated. Then, the nodes with the highest ACE scores, which imply potentially anomaly nodes, can be easily identified and assessed. Overall, our results thus indicate that we can identify anomalous nodes quite well based on the criteria of connectivity and importance (as estimated by the eigenvector centrality), always relative to the density of the containing network/layer. Additionally, a specific advantage of the proposed method is its interpretability and explainability, referring to the network structure and topological features, which can be intuitively assessed in a human-centered approach, c.f. [70].
In future work, we aim to extend the analysis towards further real-world complex networks in order to capture and investigate further real-world phenomena about potential anomalies, e.g., in feature-rich networks [4] as well as taking temporal relations into account [4,41]. In addition, we plan to analyze other centrality measures in order to compare those results with eigenvector centrality in terms of detection performance. Furthermore, we aim to investigate interactive explanation methods for anomaly detection, also including declarative approaches, e.g., [71].

Author Contributions

Conceptualization, A.M. and M.A.; methodology, A.M. and M.A.; software, A.M.; validation, A.M. and M.A.; formal analysis, M.A.; investigation, A.M. and M.A.; resources, A.M.; data curation, A.M.; writing—original draft preparation, A.M. and M.A.; writing—review and editing, M.A.; visualization, A.M.; supervision, M.A.; project administration, M.A.; funding acquisition, M.A. All authors have read and agreed to the published version of the manuscript.

Funding

The research leading to this work has been funded by the German Research Foundation (DFG) project “MODUS” under grant AT 88/4-1.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Magnani, M.; Rossi, L. The ml-model for multi-layer social networks. In Proceedings of the 2011 International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, Taiwan, 25–27 July 2011; pp. 5–12. [Google Scholar]
  2. Boccaletti, S.; Bianconi, G.; Criado, R.; Del Genio, C.I.; Gómez-Gardenes, J.; Romance, M.; Sendina-Nadal, I.; Wang, Z.; Zanin, M. The structure and dynamics of multilayer networks. Phys. Rep. 2014, 544, 1–122. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Dickison, M.E.; Magnani, M.; Rossi, L. Multilayer Social Networks; Cambridge University Press: Cambridge, UK, 2016. [Google Scholar]
  4. Interdonato, R.; Atzmueller, M.; Gaito, S.; Kanawati, R.; Largeron, C.; Sala, A. Feature-Rich Networks: Going Beyond Complex Network Topologies. Appl. Netw. Sci. 2019, 4, 1–13. [Google Scholar] [CrossRef] [Green Version]
  5. Atzmueller, M. Data Mining on Social Interaction Networks. arXiv 2014, arXiv:1312.6675. [Google Scholar]
  6. Mitzlaff, F.; Atzmueller, M.; Stumme, G.; Hotho, A. Semantics of User Interaction in Social Media. In Complex Networks IV; Springer: Berlin/Heidelberg, Germany, 2013; Volume 476. [Google Scholar]
  7. Maulana, A.; Jiang, Z.; Liu, J.; Bäck, T.; Emmerich, M.T. Reducing complexity in many objective optimization using community detection. In Proceedings of the IEEE Congress on Evolutionary Computation (CEC), Sendai, Japan, 25–28 May 2015; pp. 3140–3147. [Google Scholar]
  8. Maulana, A.; Gemmetto, V.; Garlaschelli, D.; Yevesyeva, I.; Emmerich, M. Modularities maximization in multiplex network analysis using Many-Objective Optimization. In Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, 6–9 December 2016; pp. 1–8. [Google Scholar]
  9. Maulana, A.; Atzmueller, M. Centrality-Based Anomaly Detection on Multi-Layer Networks Using Many-Objective Optimization. In Proceedings of the 2020 7th International Conference on Control, Decision and Information Technologies (CoDIT), Prague, Czech Republic, 29 June–2 July 2020; Volume 1, pp. 633–638. [Google Scholar]
  10. Battiston, F.; Nicosia, V.; Latora, V. The new challenges of multiplex networks: Measures and models. Eur. Phys. J. Spec. Top. 2017, 226, 401–416. [Google Scholar] [CrossRef] [Green Version]
  11. Atzmueller, M. Declarative Aspects in Explicative Data Mining for Computational Sensemaking. In Proceedings International Conference on Declarative Programming; Seipel, D., Hanus, M., Abreu, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2018; pp. 97–114. [Google Scholar]
  12. Scott, J. Social Network Analysis: Developments, Advances, and Prospects. Soc. Netw. Anal. Min. 2011, 1, 21–26. [Google Scholar] [CrossRef]
  13. Wasserman, S.; Faust, K. Social Network Analysis: Methods and Applications, 1st ed.; Number 8 in Structural Analysis in the Social Sciences; Cambridge University Press: Cambridge, UK, 1994. [Google Scholar]
  14. Newman, M.E. Detecting community structure in networks. Eur. Phys. J. 2004, 38, 321–330. [Google Scholar] [CrossRef]
  15. Getoor, L.; Diehl, C.P. Link Mining: A Survey. SIGKDD Explor. Newsl. 2005, 7, 3–12. [Google Scholar] [CrossRef]
  16. Fortunato, S. Community Detection in Graphs. Phys. Rep. 2010, 486, 75–174. [Google Scholar] [CrossRef] [Green Version]
  17. Atzmueller, M. Mining Social Media. Inform. Spektrum 2012, 35, 132–135. [Google Scholar] [CrossRef]
  18. Atzmueller, M. Onto Collective Intelligence in Social Media: Exemplary Applications and Perspectives. In Proceedings 3rd International Workshop on Modeling Social Media; Hypertext 2012; ACM Press: New York, NY, USA, 2012. [Google Scholar]
  19. Atzmueller, M. Mining Social Media: Key Players, Sentiments, and Communities. WIREs Data Min. Knowl. Discov. 2012, 2, 411–419. [Google Scholar] [CrossRef]
  20. Knorr-Cetina, K. Sociality with Objects: Social Relations in Postsocial Knowledge Societies. Theory Cult. Soc. 1997, 14, 1–43. [Google Scholar] [CrossRef]
  21. Fleming, P.J.; Purshouse, R.C.; Lygoe, R.J. Many-objective optimization: An engineering design perspective. In International Conference on Evolutionary Multi-Criterion Optimization; Springer: Berlin/Heidelberg, Germany, 2005; pp. 14–32. [Google Scholar]
  22. Bader, J.; Zitzler, E. HypE: An algorithm for fast hypervolume-based many-objective optimization. Evol. Comput. 2011, 19, 45–76. [Google Scholar] [CrossRef]
  23. Li, B.; Li, J.; Tang, K.; Yao, X. Many-objective evolutionary algorithms: A survey. ACM Comput. Surv. (CSUR) 2015, 48, 1–35. [Google Scholar] [CrossRef] [Green Version]
  24. Radosław Winiczenko, J.M. Multi-objective optimization of the apple drying and rehydration processes parameters. Emir. J. Food Agric. 2018, 30, 1–9. [Google Scholar]
  25. Górnicki, K.; Winiczenko, R.; Kaleta, A. Estimation of the Biot number using genetic algorithms: Application for the drying process. Energies 2019, 12, 2822. [Google Scholar] [CrossRef] [Green Version]
  26. Saxena, D.K.; Duro, J.A.; Tiwari, A.; Deb, K.; Zhang, Q. Objective reduction in many-objective optimization: Linear and nonlinear algorithms. IEEE Trans. Evol. Comput. 2012, 17, 77–99. [Google Scholar] [CrossRef]
  27. Gunasekara, R.C.; Mehrotra, K.; Mohan, C.K. Multi-objective optimization to identify key players in large social networks. Soc. Netw. Anal. Min. 2015, 5, 21. [Google Scholar] [CrossRef]
  28. Zeng, Y.; Liu, J. Community detection from signed social networks using a multi-objective evolutionary algorithm. In Proceedings Asia Pacific Symposium on Intelligent and Evolutionary Systems; Springer: Berlin/Heidelberg, Germany, 2015; Volume 1, pp. 259–270. [Google Scholar]
  29. Maulana, A.; Emmerich, M.T. Towards many-objective optimization of eigenvector centrality in multiplex networks. In Proceedings of the 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT), Barcelona, Spain, 5–7 April 2017; pp. 0729–0734. [Google Scholar]
  30. Müller, E.; Schiffer, M.; Gerwert, P.; Hannen, M.; Jansen, T.; Seidl, T. SOREX: Subspace Outlier Ranking Exploration Toolkit. In Machine Learning and Knowledge Discovery in Databases; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6323, pp. 607–610. [Google Scholar]
  31. Zimek, A.; Schubert, E.; Kriegel, H.P. A Survey on Unsupervised Outlier Detection in High-Dimensional Numerical Data. Stat. Anal. Data Mining 2012, 5, 363–387. [Google Scholar] [CrossRef]
  32. Hawkins, D. Identification of Outliers; Monographs on Statistics and Applied Probability; Springer: Dordrecht, The Netherlands, 1980. [Google Scholar]
  33. Seidl, T.; Müller, E.; Assent, I.; Steinhausen, U. Outlier Detection and Ranking based on Subspace Clustering. In Uncertainty Management in Information Systems; Number 08421 in Dagstuhl Seminar Proceedings; Koch, C., König-Ries, B., Markl, V., van Keulen, M., Eds.; Schloss Dagstuhl— Leibniz-Zentrum fuer Informatik, Germany: Dagstuhl, Germany, 2009. [Google Scholar]
  34. Kriegel, H.P.; Kröger, P.; Zimek, A. Subspace Clustering. Wiley Interdiscip. Rev. 2012, 2, 351–364. [Google Scholar] [CrossRef]
  35. Sapienza, A.; Panisson, A.; Wu, J.; Gauvin, L.; Cattuto, C. Anomaly Detection in Temporal Graph Data: An Iterative Tensor Decomposition and Masking Approach. In Proceedings of the International Workshop on Advanced Analytics and Learning on Temporal Data, Porto, Portugal, 11 September 2015; Volume 1425. CEUR Workshop Proceedings. [Google Scholar]
  36. Gao, J.; Liang, F.; Fan, W.; Wang, C.; Sun, Y.; Han, J. On Community Outliers and Their Efficient Detection in Information Networks. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’10, Washington, DC, USA, 24–28 July 2010; ACM: New York, NY, USA, 2010; pp. 813–822. [Google Scholar]
  37. Ullah, I.; Manzo, M.; Shah, M.; Madden, M. Graph Convolutional Networks: Analysis, improvements and results. arXiv 2019, arXiv:1912.09592. [Google Scholar]
  38. van den Hoogen, J.; Bloemheuvel, S.; Atzmueller, M. An Improved Wide-Kernel CNN for Classifying Multivariate Signals in Fault Diagnosis. In Proceedings of the IEEE International Conference on Data Mining Workshops (ICDMW), Sorrento, Italy, 17 November 2020. [Google Scholar]
  39. Deng, A.; Hooi, B. Graph Neural Network-Based Anomaly Detection in Multivariate Time Series. In Proceedings of the 35th AAAI Conference on Artificial Intelligence, Vancouver, BC, Canada, 2–9 February 2021. [Google Scholar]
  40. Egilmez, H.E.; Ortega, A. Spectral anomaly detection using graph-based filtering for wireless sensor networks. In Proceedings of the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, 4–9 May 2014; pp. 1085–1089. [Google Scholar]
  41. Bloemheuvel, S.; van den Hoogen, J.; Atzmueller, M. Graph Signal Processing on Complex Networks for Structural Health Monitoring. In International Conference on Complex Networks and Their Applications; Springer: Berlin/Heidelberg, Germany, 2020; pp. 249–261. [Google Scholar]
  42. Wang, J.F.; Liu, X.; Zhao, H.; Chen, X.C. Anomaly detection of complex networks based on intuitionistic fuzzy set ensemble. Chin. Phys. Lett. 2018, 35, 058901. [Google Scholar] [CrossRef] [Green Version]
  43. Atzmueller, M. Onto Model-based Anomalous Link Pattern Mining on Feature-Rich Social Interaction Networks. In Proceedings of the Companion The 2019 World Wide Web Conference, San Francisco, CA, USA, 13–17 May 2019. [Google Scholar]
  44. Yasami, Y. Anomaly Detection in Dynamic Complex Networks. Mod. Interdiscip. Probl. Netw. Sci. 2018, 239. [Google Scholar]
  45. Huang, D.; Mu, D.; Yang, L.; Cai, X. CoDetect: Financial fraud detection with anomaly feature detection. IEEE Access 2018, 6, 19161–19174. [Google Scholar] [CrossRef]
  46. Mittal, R.; Bhatia, M. Anomaly detection in multiplex networks. Procedia Comput. Sci. 2018, 125, 609–616. [Google Scholar] [CrossRef]
  47. Zhao, Y.; Chen, J.; Wu, D.; Teng, J.; Yu, S. Multi-task network anomaly detection using federated learning. In Proceedings of the International Symposium on Information and Communication Technology, Ha Long Bay, Vietnam, 4–6 December 2019; pp. 273–279. [Google Scholar]
  48. Akoglu, L.; Tong, H.; Koutra, D. Graph Based Anomaly Detection and Description. Data Min. Knowl. Discov. 2015, 29, 626–688. [Google Scholar] [CrossRef] [Green Version]
  49. Noble, C.C.; Cook, D.J. Graph-Based Anomaly Detection. In Proceedings ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’03, Washington, DC, USA, 24–27 August 2003; ACM: New York, NY, USA, 2003; pp. 631–636. [Google Scholar]
  50. Eberle, W.; Holder, L.B. Anomaly Detection in Data Represented as Graphs. Intell. Data Anal. 2007, 11, 663–689. [Google Scholar] [CrossRef] [Green Version]
  51. Ranshous, S.; Shen, S.; Koutra, D.; Harenberg, S.; Faloutsos, C.; Samatova, N.F. Anomaly Detection in Dynamic Networks: A Survey. Wiley Interdiscip. Rev. 2015, 7, 223–247. [Google Scholar] [CrossRef]
  52. Yu, R.; He, X.; Liu, Y. GLAD: Group Anomaly Detection in Social Media Analysis. In Proceedings ACM SIGKDD; ACM: New York, NY, USA, 2014; pp. 372–381. [Google Scholar]
  53. Xiong, L.; Póczos, B.; Schneider, J.G. Group Anomaly Detection using Flexible Genre Models. In Advances in Neural Information Processing Systems 24 (NIPS-24); Shawe-Taylor, J., Zemel, R.S., Bartlett, P.L., Pereira, F.C.N., Weinberger, K.Q., Eds.; Curran Associates Inc.: Red Hook, NY, USA, 2011; pp. 1071–1079. [Google Scholar]
  54. Stefan Bloemheuvel, B.K.; Atzmueller, M. Graph Summarization for Computational Sensemaking on Complex Industrial Event Logs. In Proceedings of the Workshop on Methods for Interpretation of Industrial Event Logs, International Conference on Business Process Management, Vienna, Austria, 3–5 September 2019. [Google Scholar]
  55. Shneiderman, B. The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations. In Proceedings of the IEEE Symposium on Visual Languages, Boulder, CO, USA, 3–6 September 1996; pp. 336–343. [Google Scholar]
  56. Bonacich, P.; Lloyd, P. Eigenvector-like measures of centrality for asymmetric relations. Soc. Netw. 2001, 23, 191–201. [Google Scholar] [CrossRef]
  57. Borgatti, S.P.; Everett, M.G. A graph-theoretic perspective on centrality. Soc. Netw. 2006, 28, 466–484. [Google Scholar] [CrossRef]
  58. Okamoto, K.; Chen, W.; Li, X.Y. Ranking of closeness centrality for large-scale social networks. In Frontiers in Algorithmics; Springer: Berlin/Heidelberg, Germany, 2008; pp. 186–195. [Google Scholar]
  59. Barthelemy, M. Betweenness centrality in large complex networks. Eur. Phys. J. 2004, 38, 163–168. [Google Scholar] [CrossRef]
  60. Page, L.; Brin, S.; Motwani, R.; Winograd, T. The PageRank Citation Ranking: Bringing Order to the Web; Technical Report; Stanford InfoLab: Stanford, CA, USA, 1999. [Google Scholar]
  61. Freeman, L.C. Centrality in social networks conceptual clarification. Soc. Netw. 1978, 1, 215–239. [Google Scholar] [CrossRef] [Green Version]
  62. Ruhnau, B. Eigenvector-centrality—A node-centrality? Soc. Netw. 2000, 22, 357–365. [Google Scholar] [CrossRef]
  63. Kung, H.T.; Luccio, F.; Preparata, F.P. On finding the maxima of a set of vectors. J. Acm (JACM) 1975, 22, 469–476. [Google Scholar] [CrossRef]
  64. Magnani, M.; Micenkova, B.; Rossi, L. Combinatorial analysis of multiple networks. arXiv 2013, arXiv:1303.4986. [Google Scholar]
  65. Li, X.; Xu, G.; Lian, W.; Xian, H.; Jiao, L.; Huang, Y. Multi-layer network local community detection based on influence relation. IEEE Access 2019, 7, 89051–89062. [Google Scholar] [CrossRef]
  66. Kapferer, B. Strategy and Transaction in an African Factory: African Workers and Indian Management in a Zambian Town; Manchester University Press: Manchester, UK, 1972. [Google Scholar]
  67. Wijayanto, A.W.; Murata, T. Pre-emptive spectral graph protection strategies on multiplex social networks. Appl. Netw. Sci. 2018, 3, 1–24. [Google Scholar] [CrossRef] [Green Version]
  68. Barigozzi, M.; Fagiolo, G.; Garlaschelli, D. Multinetwork of international trade: A commodity-specific analysis. Phys. Rev. 2010, 81, 046104. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  69. Celli, F.; Lascio, F.M.L.D.; Magnani, M.; Pacelli, B.; Rossi, L. Social Network Data and Practices: The case of Friendfeed. In International Conference on Social Computing, Behavioral Modeling and Prediction; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
  70. Masiala, S.; Atzmueller, M. First Perspectives on Explanation in Complex Network Analysis. In Proceedings BNAIC. Jheronimus Academy of Data Science; JADS: Den Bosch, The Netherlands, 2018. [Google Scholar]
  71. Guven, C.; Atzmueller, M. Applying Answer Set Programming for Knowledge-Based Link Prediction on Social Interaction Networks. Front. Big Data 2019, 2, 15. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Overview on the procedural steps of the proposed approach: first, centralities and densities are estimated before many-objective optimization is applied in order to obtain the Pareto Front, i.e., the set of less important nodes. Finally, these are assessed in a human-in-the-loop approach.
Figure 1. Overview on the procedural steps of the proposed approach: first, centralities and densities are estimated before many-objective optimization is applied in order to obtain the Pareto Front, i.e., the set of less important nodes. Finally, these are assessed in a human-in-the-loop approach.
Applsci 11 04005 g001
Figure 2. Depiction sketch of a multi-layer network consisting of ten nodes, with two types of different links. The different sets of links in this network are illustrated by different colors (of the respective links/edges).
Figure 2. Depiction sketch of a multi-layer network consisting of ten nodes, with two types of different links. The different sets of links in this network are illustrated by different colors (of the respective links/edges).
Applsci 11 04005 g002
Figure 3. Synthetic network generated by an Erdős Rényi random graph generation strategy. Each layer consists of 100 nodes. For the different layers (1–5), layer 1 top left, layer 2 top right, etc. to bottom layer 5, we applied different link probabilities p for generation, thus each layer has a different edge-density.
Figure 3. Synthetic network generated by an Erdős Rényi random graph generation strategy. Each layer consists of 100 nodes. For the different layers (1–5), layer 1 top left, layer 2 top right, etc. to bottom layer 5, we applied different link probabilities p for generation, thus each layer has a different edge-density.
Applsci 11 04005 g003
Figure 4. Aarhus multiplex network. Here, we show the individual layers of the network, where the different sets of edges of each layer are also illustrated via different colors for the connected edges.
Figure 4. Aarhus multiplex network. Here, we show the individual layers of the network, where the different sets of edges of each layer are also illustrated via different colors for the connected edges.
Applsci 11 04005 g004
Figure 5. Visualization of the Aarhus network, i.e., layer 5. Here, we observe clearly how the nodes connect to others with many connections, few connections, or even without a single connection.
Figure 5. Visualization of the Aarhus network, i.e., layer 5. Here, we observe clearly how the nodes connect to others with many connections, few connections, or even without a single connection.
Applsci 11 04005 g005
Figure 6. Pareto Front chart for the Aarhus multiplex network and the different layers ( L 1 L 5 ): it depicts the Pareto Front (PF) based on minimization of the nodes’ centrality on the right side of the picture; the PF for the minimization is shown in the lower part of the vertical PF line.
Figure 6. Pareto Front chart for the Aarhus multiplex network and the different layers ( L 1 L 5 ): it depicts the Pareto Front (PF) based on minimization of the nodes’ centrality on the right side of the picture; the PF for the minimization is shown in the lower part of the vertical PF line.
Applsci 11 04005 g006
Figure 7. Pareto Front chart for the Kapferer multiplex network and the different layers ( L 1 L 4 ): it depicts the Pareto Front (PF) based on minimization of the nodes’ centrality on the right side of the picture; the PF for the minimization is shown in the lower part of the vertical PF line.
Figure 7. Pareto Front chart for the Kapferer multiplex network and the different layers ( L 1 L 4 ): it depicts the Pareto Front (PF) based on minimization of the nodes’ centrality on the right side of the picture; the PF for the minimization is shown in the lower part of the vertical PF line.
Applsci 11 04005 g007
Figure 8. Visualization of world trading network on layer 1. Here, can be seen how the nodes (representing the countries) connect to the others, From the picture we can see that Ant (Antilles) node has no single connection in this layer.
Figure 8. Visualization of world trading network on layer 1. Here, can be seen how the nodes (representing the countries) connect to the others, From the picture we can see that Ant (Antilles) node has no single connection in this layer.
Applsci 11 04005 g008
Table 1. Summary: statistical overview on the applied networks, describing the overall number of nodes, the number of layers, and the overall number of edges of the respective multiplex networks.
Table 1. Summary: statistical overview on the applied networks, describing the overall number of nodes, the number of layers, and the overall number of edges of the respective multiplex networks.
Network TypeNumber of NodesNumber of LayersNumber of Edges
Synthetic10058158
CS-Aarhus615620
Kapferer-Tailor394552
Social Media6407374,862
Trade Network20711148,727
Table 2. Statistical characterization: synthetic multiplex network generated via an Erdős-Rényi graph generation process. Each layer of the network corresponds to one synthetic network with the link probability p { 0.03 , 0.05 , 0.20 , 0.25 , 0.30 } .
Table 2. Statistical characterization: synthetic multiplex network generated via an Erdős-Rényi graph generation process. Each layer of the network corresponds to one synthetic network with the link probability p { 0.03 , 0.05 , 0.20 , 0.25 , 0.30 } .
Layer μ σ D
L1 ( p = 0.03 )0.1941140.19117890.028889
L2 ( p = 0.05 )0.343860.19795470.056566
L3 ( p = 0.20 )0.6741280.14724020.198384
L4 ( p = 0.25 )0.6519310.12321150.235556
L5 ( p = 0.30 )0.7264980.12208310.29899
Table 3. Synthetic network with 100 nodes consisting of five layers, with 38 nodes in the Pareto Front.
Table 3. Synthetic network with 100 nodes consisting of five layers, with 38 nodes in the Pareto Front.
L1L2L3L4L5Node IDLevel
10.2388470.2788690.5863410.6422870.92478811
20.1911640.1748770.6875590.6752310.7541121
31.25E-170.4160060.754820.4745290.75762131
41.25E-170.4019820.5514250.6626490.7992341
51.25E-170.2137360.73070.6176630.89772591
61.25E-170.1259570.7901280.5672240.633085111
70.2625060.1911370.517560.5891890.7169131
800.4760250.7840850.6587020.609807151
900.6130120.5509160.7646430.708011201
101.25E-170.3369070.5202730.7618820.922795241
1100.1483210.6985930.7033810.876309261
120.9575540.0453960.6761440.465050.723078271
131.25E-170.1306150.4909350.732680.893768281
141.25E-170.0851990.6173850.5678310.848255311
151.25E-170.2415170.4530560.8518970.617858321
1600.7271160.4107350.7139410.911162331
1700.6347360.8488630.7122450.491106351
181.25E-170.3827770.5007780.6887170.72154381
190.489380.3986310.452820.443270.752472391
201.25E-170.1335650.6268050.624830.912015441
210.489380.9157950.63774610.730629461
220.1996380.1154160.5883510.5224530.499154481
230.19963810.6166060.7362920.885649511
2400.5020890.690110.704340.66845561
250.4686080.2016630.8589880.4526520.66817601
260.5150270.2057720.9483340.6646730.786612611
271.25E-170.1743220.8403230.5987450.637779631
281.25E-170.4394020.3819910.7109020.693444681
291.25E-170.6711610.7799290.6873630.80535691
300.12846500.695840.7021460.915057701
3100.1646570.5785980.8132640.685314731
321.25E-170.15480.5822330.5781180.894428791
330.0524060.350370.5472680.7390410.81452831
3400.9128720.5920010.737040.904102881
3500.216710.7744210.7971051891
361.25E-170.0676910.5757050.6013730.643516921
3710.1780880.401330.7399260.676465991
3800.5587780.4949430.7646860.8274971001
Table 4. ACE score of the synthetic/artificial network with 100 nodes consisting of five layers.
Table 4. ACE score of the synthetic/artificial network with 100 nodes consisting of five layers.
NoL1L2L3L4L5
ACE scoreNodeACE scoreNodeACE scoreNodeACE scoreNodeACE scoreNode
10.00348970.029332220.39361680.520676400.57649135
20.003489120.029332700.37581660.398917390.55678148
30.003489150.028154570.367554990.38098600.51222649
40.003489190.026904410.36481770.373612850.4926171
50.003489200.025192490.363811710.357277270.36435375
60.003489210.024367960.362636780.33915630.33296714
70.003489220.024012210.354883330.290516930.32764164
80.003489260.023848500.30052180.278613780.32331543
90.003489330.023426870.298178390.270124470.30367430
100.003489350.023066780.297861320.26853180.30176798
110.003489360.022582140.249337500.265734300.28798666
Table 5. Statistical characterization: Aarhus multiplex network.
Table 5. Statistical characterization: Aarhus multiplex network.
Layer μ σ D
Layer 10.2579860.2913110.1054645
Layer 20.2730810.3311480.06775956
Layer 30.0731820.2407340.01147541
Layer 40.1762490.222610.04808743
Layer 50.2668310.206740.1060109
Table 6. Pareto Front—many-objective centrality optimization on the Aarhus multiplex network.
Table 6. Pareto Front—many-objective centrality optimization on the Aarhus multiplex network.
Aarhus Pareto Front
NoL1L2L3L4L5NodeLabelLevel
10.020595708.12E-1701.56E-171U1021
20.00922030.327664100.12280.48735118 U11
30.00872730.251037600.12320.132533812 U291
40.01993060000.087740314U411
50.00272040.38510500.19070.256383637U101
63.06E-1708.12E-1700.141506360 U1401
70.04937920.2837498000.22058274U1062
80.0219950000.45900276U1182
470.009208.12E-170.290.2391820U174
480.1300200.366030.3960.1497848U1384
490.276250.737298.12E-17017U1235
500.297990.821068.12E-170.3330.272419U1245
510.231580.300948.12E-170.4170.1351217U595
5210.504038.12E-170.40.1149424U1095
530.718360.599228.12E-170.2180.1230429U35
540.9027108.12E-170.6530.2575435U905
550.866810.7421300.4140.2471733U765
560.414650.91338.12E-170.0170.7007244U45
570.333250.77898.12E-170.10.6574351U675
580.9897318.12E-170.4560.4811834U796
590.231580.85764110.1896723U916
600.872780.762298.12E-170.6650.3492931U546
610.232630.6502110.5890.5338946U1106
Table 7. ACE scores for the Aarhus multiplex network.
Table 7. ACE scores for the Aarhus multiplex network.
NoAarhus L1Aarhus L2Aarhus L3Aarhus L4Aarhus L5
ACE scoreNodeACE scoreNodeACE scoreNodeACE scoreNodeACE scoreNode
10.0933996 600.0558778310.003488540.0380710.13682 1
20.092538120.0558778320.003488560.0380720.1069622
30.0924148370.0558778330.003488580.0380730.1038443
40.0918969410.0558778360.0034885100.0380740.1005249
50.0916538420.05587783100.0034885110.0380760.0965953
60.090967350.05587783110.0034885120.0380770.0965961
70.0902401120.05587783 140.0034885130.03807140.0956859
80.0901458450.05587783180.0034885140.03807180.0931356
90.090068200.05587783200.0034885260.03807210.0918314
100.090061680.05587783220.0034885270.03807220.0914154
110.0897165400.05587783250.0034885280.03807260.0870750
120.0861841140.05587783320.0034885300.03807270.0849555
130.0861841160.05587783350.0034885330.03807530.077999
140.085943310.05587783360.0034885360.03807540.0778924
150.085436760.05587783380.0034885370.03807570.0756738
160.0854367100.05587783400.0034885380.03807590.0737329
170.0854367110.05587783410.0034885390.03807600.0727825
180.0810578220.05587783420.0034885540.03774610.0688612
190.0788396130.05587783430.0034885550.03607550.0675417
200.075522740.05587783450.003488510.03488100.0667858
Table 8. Statistical characterization: Kapferer Tailor Shop multiplex network.
Table 8. Statistical characterization: Kapferer Tailor Shop multiplex network.
Layer μ σ D
Layer 10.38546880.21254240.4264507
Layer 20.48994190.24591410.6018893
Layer 30.2602660.27093720.1470985
Layer 40.25066080.23629660.1983806
Table 9. Pareto Front and network centralities of the Kapferer Tailor Shop multiplex network.
Table 9. Pareto Front and network centralities of the Kapferer Tailor Shop multiplex network.
NoL1L2L3L4NodeLabelLevel
10.3971010.0768990.2272714.36E-196DONALD1
20.177090.2554651.57E-170.0753948MATEO1
30.0599980.3410191.57E-170.25595910CHIPALO1
40.2970210.3733861.57E-170.03453418PAULOS1
50.0134550.0848260.0285620.16069820SIGN1
60.0221490.2599870.0066860.07851422ZAKEYO1
70.1544520.4808421.57E-172.47E-1826ADRIAN1
80.1430180.1729890.0201642.47E-1827KALUNDWE1
90.4811910.1045470.2285070.0509054SEAMS2
100.1419110.3523550.1226650.14718917ENOCH2
110.2375730.8039710.1052870.14118625MESHAK2
120.2354350.236920.1583040.01210223BEN2
130.3722480.287980.0455720.08165335CHRISTIAN2
140.4466930.3104560.0609730.07757538CHILUFYA2
150.2509120.2416520.078161.14E-1739MABANGE2
160.2018210.6078070.230930.3534061KAMWEFU3
170.2412370.6556920.2034350.6230165CHIPATA3
180.2761160.3078870.3023460.03874615NYIRENDA3
190.3074720.3356430.1802250.25270828MPUNDU3
200.3511990.2842290.3440070.22424337ANGEL3
210.4174020.4037910.0844833.21E-1733CHOBE3
220.401630.4759650.6040550.3040779CHILWA4
230.3181120.6171830.2822750.2553972NKUMBULA4
240.3739170.5716050.2404670.49122614LWANGA4
250.4308330.4817830.1724910.23762729JOHN4
260.4386430.7218080.091520.18895621KALAMBA4
270.4950240.4056380.0930420.02529731WILLIAM4
280.4675630.4181680.1295410.09245336KALONGA4
290.6377610.6582910.775090.41173412ZULU5
300.3336990.6661460.4329990.6497437NKOLOYA5
310.5084620.8815210.2773810.50661824IBRAHIM5
320.5102480.7303960.2527530.26810230JOSEPH5
330.641770.5437670.2997180.30326632HENRY5
340.6668470.6498580.1344230.45569134MUBANGA5
350.6770780.7926111111LYASHI6
360.5140910.8102660.4335720.39004413HASTINGS6
3710.8779870.928560.43148216CHISOKONE7
380.5853840.8263990.9006690.7441393ABRAHAM7
390.80672710.6742420.41208919MUKUBWA7
Table 10. Anomalous nodes of the Kapferer Tailor Shop multiplex network that are extracted from the Pareto Front based on the ACE score.
Table 10. Anomalous nodes of the Kapferer Tailor Shop multiplex network that are extracted from the Pareto Front based on the ACE score.
NoKapferer L1Kapferer L2Kapferer L3Kapferer L4
ACE L1Node IDACE L2Node IDACE L3Node IDACE L4Node ID
10.746419SIGN1.010946DONALD0.141305MATEO0.21044DONALD
20.728975ZAKEYO0.991545SIGN0.141305CHIPALO0.21044ADRIAN
30.653032CHIPALO0.943277SEAMS0.141305PAULOS0.21044KALUNDWE
40.488681ENOCH0.775762KALUNDWE0.141305ADRIAN0.21044MABANGE
50.48646KALUNDWE0.619287BEN0.137675ZAKEYO0.21044CHOBE
60.463518ADRIAN0.607705MABANGE0.130357KALUNDWE0.20028BEN
70.418096MATEO0.573896MATEO0.125798SIGN0.189202WILLIAM
80.368476KAMWEFU0.562828ZAKEYO0.116563CHRISTIAN0.181447PAULOS
90.301032BEN0.503495ANGEL0.108201CHILUFYA0.177911NYIRENDA
100.296742MESHAK0.494314CHRISTIAN0.09887MABANGE0.167703SEAMS
110.289391CHIPATA0.445591NYIRENDA0.095437CHOBE0.147144MATEO
120.269979MABANGE0.439303CHILUFYA0.091617KALAMBA0.145312CHILUFYA
130.219408NYIRENDA0.377656MPUNDU0.09079WILLIAM0.144524ZAKEYO
140.177464PAULOS0.364497CHIPALO0.084142MESHAK0.141889CHRISTIAN
150.156495MPUNDU0.336752ENOCH0.074707ENOCH0.132822KALONGA
160.135147NKUMBULA0.285278PAULOS0.070974KALONGA0.091908MESHAK
170.103872NKOLOYA0.210859CHOBE0.068323MUBANGA0.086868ENOCH
180.068759ANGEL0.206339WILLIAM0.055357BEN0.075528SIGN
190.026526CHRISTIAN0.175672KALONGA0.047655JOHN0.051804KALAMBA
200.023177LWANGA0.03421CHILWA0.043456MPUNDU0.022179ANGEL
21 0.02334 DONALD0.022272ADRIAN0.030855CHIPATA0.010942JOHN
22 0.03243 CHILWA0.01997JOHN0.017914DONALD 0.00172 MPUNDU
23 0.06407 CHOBE-0.13174HENRY0.017243SEAMS 0.00398 NKUMBULA
24 0.09102 JOHN-0.19988LWANGA0.015927KAMWEFU 0.00445 CHIPALO
25 0.10669 KALAMBA-0.28848KAMWEFU0.010749LWANGA 0.01464 JOSEPH
26 0.12284 CHILUFYA-0.31143NKUMBULA0.004079JOSEPH 0.04416 HENRY
27 0.16472 KALONGA-0.3914MUBANGA 0.00929 IBRAHIM 0.04485 CHILWA
28 0.19206 SEAMS-0.40568CHIPATA 0.01195 NKUMBULA 0.08626 KAMWEFU
29 0.21981 WILLIAM 0.41204 ZULU 0.02142 HENRY 0.11702 HASTINGS
30 0.24678 IBRAHIM 0.43127 NKOLOYA 0.02285 NYIRENDA 0.13523 ZULU
31 0.25036 JOSEPH 0.56751 KALAMBA 0.04547 ANGEL 0.13553 MUKUBWA
32 0.25807 HASTINGS 0.58853 JOSEPH 0.09378 NKOLOYA 0.15181 CHISOKONE
33 0.40111 ABRAHAM 0.7408 LYASHI 0.09409 HASTINGS 0.17213 MUBANGA
34 0.50621 ZULU 0.76861 MESHAK 0.18665 CHILWA 0.20196 LWANGA
35 0.51425 HENRY 0.78401 HASTINGS 0.22476 MUKUBWA 0.21489 IBRAHIM
36 0.56457 MUBANGA 0.8235 ABRAHAM 0.27951 ZULU 0.31261 CHIPATA
37 0.58509 LYASHI 0.94976 CHISOKONE 0.34769 ABRAHAM 0.33505 NKOLOYA
38 0.84522 MUKUBWA 0.95841 IBRAHIM 0.36283 CHISOKONE 0.41429 ABRAHAM
39 1.23301 CHISOKONE 1.2484 MUKUBWA 0.40162 LYASHI 0.6291 LYASHI
Table 11. Pareto Front of many-objective optimization regarding multiplex network centrality of the trading network.
Table 11. Pareto Front of many-objective optimization regarding multiplex network centrality of the trading network.
NoL1L2L3L4L5L6L7L8L9L10L11LabelLevel
11E-181E-184E-199E-194E-199E-193E-182E-184E-191E-182E-18‘ANT’1
23E-023E-022E-026E-025E-025E-026E-036E-026E-021E-016E-02‘CXR’2
36E-031E-184E-195E-035E-039E-197E-031E-022E-024E-022E-02‘ESH’2
42E-023E-028E-021E-011E-018E-026E-021E-011E-012E-019E-02‘TKL’3
51E-024E-023E-024E-026E-025E-022E-024E-027E-029E-027E-02‘NFK’3
66E-022E-025E-023E-023E-024E-021E-024E-025E-029E-024E-02‘SPM’3
73E-024E-023E-022E-024E-023E-024E-023E-025E-021E-015E-02‘NIU’3
85E-021E-025E-024E-024E-023E-023E-022E-025E-028E-026E-02‘TUV’3
92E-022E-028E-032E-023E-022E-029E-032E-025E-027E-024E-02‘PCN’3
101E-012E-023E-026E-025E-023E-024E-024E-026E-021E-015E-02‘FLK’4
113E-022E-025E-026E-027E-025E-022E-025E-028E-021E-019E-02‘NRU’4
124E-024E-026E-026E-025E-027E-021E-028E-028E-021E-019E-02‘MNP’4
133E-022E-021E-019E-027E-029E-021E-026E-021E-012E-011E-01‘AIA’4
143E-023E-022E-025E-026E-023E-022E-025E-028E-021E-016E-02‘CCK’4
155E-022E-026E-026E-024E-024E-023E-024E-025E-029E-026E-02‘PLW’4
163E-023E-025E-025E-026E-025E-024E-024E-025E-028E-026E-02‘WLF’4
176E-023E-022E-012E-012E-012E-016E-021E-012E-013E-012E-01‘GIB’5
185E-025E-022E-011E-011E-011E-015E-021E-012E-012E-011E-01‘TCA’5
197E-028E-022E-011E-011E-017E-022E-028E-022E-013E-011E-01‘STP’5
205E-025E-028E-028E-027E-026E-023E-027E-029E-022E-018E-02‘MSR’5
218E-023E-025E-028E-026E-025E-022E-026E-029E-022E-019E-02‘SHN’5
221E-018E-021E-019E-026E-028E-025E-027E-028E-021E-011E-01‘KIR’5
239E-023E-028E-029E-028E-027E-023E-021E-011E-012E-017E-02‘COK’5
249E-025E-028E-026E-029E-025E-025E-027E-027E-021E-017E-02‘FSM’5
258E-029E-022E-012E-012E-012E-017E-021E-012E-013E-012E-01‘LCA’6
268E-028E-023E-012E-012E-012E-015E-023E-012E-013E-012E-01‘BMU’6
275E-021E-011E-012E-012E-011E-011E-011E-012E-012E-012E-01‘ERI’6
289E-022E-019E-021E-011E-019E-024E-021E-012E-012E-012E-01‘TMP’6
296E-029E-022E-012E-012E-012E-014E-022E-012E-013E-012E-01‘CYM’6
Table 12. Statistical characterization: social media multiplex network (ff-tw-yt). μ is the mean centrality of the layer, σ is the standard deviation of the centrality, and D is the density of the layer.
Table 12. Statistical characterization: social media multiplex network (ff-tw-yt). μ is the mean centrality of the layer, σ is the standard deviation of the centrality, and D is the density of the layer.
Layer μ σ D
Layer 1 for Facebook0.0054837320.03270550.0007777407
Layer 2 for Twitter0.014832550.051581780.001031278
Layer 3 for YouTube0.0019215690.036221211.499258E-05
Table 13. Pareto Front of many-objective optimization regarding multiplex network centrality for the social media multiplex network.
Table 13. Pareto Front of many-objective optimization regarding multiplex network centrality for the social media multiplex network.
NOL1:YoutubeL2:FriendFeedL3:TwitterNodeLevel
103.15E-191.77E-061431
26.28E-063.53E-195.61E-1911011
303.19E-196.93E-1911021
403.32E-196.67E-1925511
503.87E-19034181
603.02E-190.000586243911
703.76E-195.64E-1944971
803.35E-194.96E-0824682
904.29E-192.59E-1913062
1004.14E-196.14E-1922182
1104.22E-195.79E-1922192
1204.43E-19029952
1303.19E-195.30E-0542082
1403.82E-196.43E-1929192
1503.35E-196.93E-1959152
1603.41E-194.85E-0510953
1703.43E-193.20E-0619153
1803.40E-190.000306825433
1903.42E-192.96E-0530893
2004.29E-193.00E-1913023
2109.03E-19023073
2204.08E-196.50E-191493
2303.85E-196.53E-1929733
2403.47E-196.93E-1961733
2503.46E-190.00058967964
2604.29E-194.05E-191644
2704.60E-193.97E-1933924
2801.19E-18029224
2904.15E-196.52E-1922264
Table 14. ACE score of multiplex network centrality for the social media network, only considering high-density layers L2 and L3.
Table 14. ACE score of multiplex network centrality for the social media network, only considering high-density layers L2 and L3.
ACE Score with High Density Network Only L2 and L3
L2:FriendFeedL3:Twitter
ACE ScoreNodeACE ScoreNode
0.0001304041430.00029655270
0.000130411010.0002965481101
0.000130411020.0002965481102
0.000130420190.0002972551
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Maulana, A.; Atzmueller, M. Many-Objective Optimization for Anomaly Detection on Multi-Layer Complex Interaction Networks. Appl. Sci. 2021, 11, 4005. https://doi.org/10.3390/app11094005

AMA Style

Maulana A, Atzmueller M. Many-Objective Optimization for Anomaly Detection on Multi-Layer Complex Interaction Networks. Applied Sciences. 2021; 11(9):4005. https://doi.org/10.3390/app11094005

Chicago/Turabian Style

Maulana, Asep, and Martin Atzmueller. 2021. "Many-Objective Optimization for Anomaly Detection on Multi-Layer Complex Interaction Networks" Applied Sciences 11, no. 9: 4005. https://doi.org/10.3390/app11094005

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop