Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ANOMALY BEHAVIOR DETECTION IN INTERACTIVE NETWORKS
Document Type and Number:
WIPO Patent Application WO/2021/046377
Kind Code:
A1
Abstract:
A system and method for detecting anomaly behavior in interactive networks are described. An attributed bipartite graph related problem is generated. A graph convolutional memory network is developed based on the generated problem. A loss function is further developed based on the developed graph convolutional memory network. The developed graph convolutional memory network is trained to learn interaction patterns between different components. Anomalies are detected based on the trained developed graph convolutional memory network.

Inventors:
CAVALLARI SANDRO (US)
Application Number:
PCT/US2020/049445
Publication Date:
March 11, 2021
Filing Date:
September 04, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
PAYPAL INC (US)
International Classes:
H04L1/00; H04L29/06
Foreign References:
US20140279779A12014-09-18
US20160308884A12016-10-20
Attorney, Agent or Firm:
CHEN, Tom (US)
Download PDF:
Claims:
WHAT IS CLAIMED IS: 1. A system for detecting anomaly behavior in interactive networks comprising: a non-transitory memory storing instructions; and one or more hardware processors coupled to the non-transitory memory and configured to read the instructions from the non-transitory memory to cause the system to perform operations comprising: generating an attributed bipartite graph related problem; developing a graph convolutional memory network based on the generated problem; develop a loss function based on the developed graph convolutional memory network; training the developed graph convolutional memory network to learn interaction patterns between different components; and detecting anomalies based on the trained developed graph convolutional memory network. 2. The system of claim 1, wherein the attributed bipartite graph related problem is an anomaly detection problem. 3. The system of claim 1, wherein the bipartite graph provides an encoding representative of connections between users and bastions. 4. The system of claim 1, wherein the training of the graph convolutional memory network is performed in an unsupervised setting. 5. The system of claim 1, wherein the graph convolutional memory network enables a preservation of the interactions occurring at different nodes over time. 6. The system of claim 5, wherein the graph convolutional memory network includes a tunable parameter. 7. The system of claim 1, wherein the detected anomalies relate to unauthorized secure shell (SSH) connections. 8. A method for detecting anomaly behavior in interactive networks comprising: generating an attributed bipartite graph related problem; developing a graph convolutional memory network based on the generated problem; develop a loss function based on the developed graph convolutional memory network; training the developed graph convolutional memory network to learn interaction patterns between different components; and detecting anomalies based on the trained developed graph convolutional memory network. 9. The method of claim 8, wherein the attributed bipartite graph related problem is an anomaly detection problem. 10. The method of claim 8, wherein the bipartite graph provides an encoding representative of connections between users and bastions. 11. The method of claim 8, wherein the training of the graph convolutional memory network is performed in an unsupervised setting. 12. The method of claim 8, wherein the graph convolutional memory network enables a preservation of the interactions occurring at different nodes over time. 13. The method of claim 12, wherein the graph convolutional memory network includes a tunable parameter. 14. The method of claim 8, wherein the detected anomalies relate to unauthorized SSH connections. 15. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause performance of operations comprising: generating an attributed bipartite graph related problem; developing a graph convolutional memory network based on the generated problem; develop a loss function based on the developed graph convolutional memory network; training the developed graph convolutional memory network to learn interaction patterns between different components; and detecting anomalies based on the trained developed graph convolutional memory network. 16. The non-transitory machine-readable medium of claim 15, wherein the attributed bipartite graph related problem is an anomaly detection problem. 17. The non-transitory machine-readable medium of claim 15, wherein the bipartite graph provides an encoding representative of connections between users and bastions. 18. The non-transitory machine-readable medium of claim 15, wherein the training of the graph convolutional memory network is performed in an unsupervised setting. 19. The non-transitory machine-readable medium of claim 15, wherein the graph convolutional memory network enables a preservation of the interactions occurring at different nodes over time. 20. The non-transitory machine-readable medium of claim 19, wherein the graph convolutional memory network includes a tunable parameter.
Description:
ANOMALY BEHAVIOR DETECTION IN INTERACTIVE NETWORKS Cross-Reference to Related Application [0001] This application is a continuation and claims priority to U.S. Parent Application No. 16/563,807, filed September 6, 2019, which is incorporated by reference in its entirety. Technical Field [0002] The subject technology generally relates to anomaly detection and more particularly, relates to a model for detecting anomalous behavior on an interactive graph. Background [0003] Intrusion Detection Systems (IDS) have garnered much attention in recent years because of the critical impact these systems have had on sectors such as financial institutions, academia, energy industry and government. Anomaly detection, a specific research branch within IDS, is directed to identifying unexpected behaviors (e.g., behaviors that deviate from the common patterns). Anomaly detection further includes discovering the causes of unexpected events so that potential catastrophic consequences, such as data leaks, unauthorized transaction, or facilities breakdown may be prevented. [0004] Complex systems are generally composed of several specialized components that synergistically interact with one another to achieve an objective. Accordingly, attribute networks and interaction networks have been of interest as a result of their ability to model real-world collaborative structure such as social networks, financial transactions, etc. These networks use edges to represent interactions that occur between different components of an entire system, while nodes are defined by additional information that is available for the different components. Each node may also have an associated attribute. [0005] Graph analytics (i.e., the extraction of knowledge form graph structures) is known to be a challenging task. For example, tasks such as node classification, edge ranking or link prediction that require a set of features representative of the underlying structure cannot be fully captured by simple analytic values such as the node degree or the node centrality. Moreover, such feature sets are not easily generalizable from task to task and are thus generally expensive to compute on different graphs. Additionally, graph embedding, which is one of the more attractive techniques developed in recent years, proposes to automatically distill information produced by the graph into vectoral format. [0006] Anomaly detection in multi-dimensional data is an important task to be solved from both the perspective of academia as well as industry. Recently proposed methods of anomaly detection demonstrate that preserving an interactive graph structure that’s common in multiple applications in a vector space yields better performances. However, current methods for network based anomaly detection present limitations either in terms of scalability or in terms of representation learning. Accordingly, a more robust anomaly detection technique is required to address these issues. Summary [0007] According to various aspects of the subject technology, a system for detecting anomalous behavior in interactive networks is described. An attributed bipartite graph related problem is generated. A graph convolutional memory network is developed based on the generated problem. A loss function is further developed based on the developed graph convolutional memory network. The developed graph convolutional memory network is trained to learn interaction patterns between different components. Anomalies are detected based on the trained developed graph convolutional memory network. [0008] According to various aspects of the subject technology, a method for detecting anomalous behavior in interactive networks is described. An attributed bipartite graph related problem is generated. A graph convolutional memory network is developed based on the generated problem. A loss function is further developed based on the developed graph convolutional memory network. The developed graph convolutional memory network is trained to learn interaction patterns between different components. Anomalies are detected based on the trained developed graph convolutional memory network. [0009] According to various aspects of the subject technology, a non-transitory machine-readable medium having stored thereon machine-readable instructions executable for detecting anomalous behavior in interactive networks is described. An attributed bipartite graph related problem is generated. A graph convolutional memory network is developed based on the generated problem. A loss function is further developed based on the developed graph convolutional memory network. The developed graph convolutional memory network is trained to learn interaction patterns between different components. Anomalies are detected based on the trained developed graph convolutional memory network. [0010] Additional features and advantages of the subject technology will be set forth in the description below, and in part will be apparent from the description, or may be learned by practice of the subject technology. The advantages of the subject technology will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings. [0011] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the invention as claimed. BRIEF DESCRIPTION OF THE DRAWINGS [0012] The accompanying drawings, which are included to provide further understanding of the subject technology and are incorporated in and constitute a part of this specification, illustrate aspects of the subject technology and together with the description serve to explain the principles of the subject technology. [0013] Fig.1a provides an example input graph. [0014] Fig.1b provides a node embedding example in which the nodes of the input graph depicted in Fig.1a are represented by a 2D vector. [0015] Fig.1c provides an example of an edge embedding graph. [0016] Fig.1d provides an example of subgraph embedding. [0017] Fig.1e provides an example of a whole graph embedding. [0018] Fig. 2a depicts a bipartite graph used to represent secure shell (SSH) connections occurring in a corporate network. [0019] Fig. 2b depicts traditional IDSs process network traffic represented as plan relational tables. [0020] Fig.2c depicts the detection fraudulent connections by means of clustering in the embedding space. [0021] Fig. 3 depicts the proposed model divided into a first of two main components. [0022] Fig. 4 provides a graphical representation of how the interaction history of each node may be preserved and propagated. [0023] Fig.5 provides an illustration of a closed boundary around the training data as a hypersphere [0024] Fig. 6 illustrates an exemplary process 600 for detecting anomaly behavior in interactive networks. [0025] Fig.7 provides a depiction of three different settings on which the model is trained and tested. [0026] Fig. 8 is a block diagram of an exemplary computing system on which the implementation of anomaly behavior detection in interactive networks may be performed. [0027] Fig. 9 is a block diagram of an exemplary computer system suitable for implementing one or more devices of the computing system in Fig.8. DETAILED DESCRIPTION [0028] Recent research has shown that leveraging graph embedding techniques to preserve the interactive structure of a problem provide significant performance boost in traditionally challenging application such as recommendation systems, protein interaction, and image processing. By modeling the anomaly detection problem as an attributed interactive bipartite graph, a novel graph convolutional neural network that’s able to automatically learn a meaningful problem representation that produce state-of- the-art results is proposed. [0029] Traditionally, anomaly detection has been viewed as an unsupervised learning task, since supervised models are unable to detect unknown attacks. Supervised models, however, cannot fully leverage the massive amount of data generated because a massive amount of labelled dataset is required. For example, it’s difficult for a human to determine what interactions are legitimate and what are attacks. In the context of the attributed network, anomaly detection has received recent attention since it is not yet well understood how two different sources of information, namely the graph structure and the attribute relative to a node/edge, are to be combined. Autoencoders have received substantial attention due to their ability to learn low- dimensional representations from high-dimensional inputs. Nevertheless, autoencoders struggle when processing sparse network structures. [0030] Randomly generated paths have been contemplated to overcome this problem, but the embedding provided is neither specifically optimized for anomaly detection purposes, nor for preserving attributed edge information. Moreover, randomly generated paths have been shown to yield suboptimal results without completely preserving the graph structure. Factorization machines and non-negative matrix factorization have been extensively used to obtain a low-dimensional representation from non-relational datasets, but they allow only positive interactions and are subject to multiple degenerated solutions, and thus, are difficult to optimize. Similarly, singular value decomposition (SVD) and residual theory have been jointly used to detect anomalies on attributed networks. Such methodology, however, is known to be expensive to compute as the running time increases exponentially with respect to the number of nodes in a graph. [0031] Other works have formulated the fraud impression detection in e-commerce as a Markovian Decision Process (MDP), and as a reinforcement learning problem. However, such a formulation lacks a well-defined value function of the actors involved. With interest focused on an edge representation rather than node ranking, the use of a single value instead of vectoral representation limits the expressive power of the model. Proposed models, for example, lack fine-gradient view of the problem. Even when the same concept is extended to dynamic graphs, the proposed methods lack a formal representation of the graph structure or require a substantial computational complexity. [0032] This specification includes references to “one embodiment,” “some embodiments,” or “an embodiment.” The appearances of these phrases do not necessarily refer to the same embodiment. Particular features, structures, or characteristics may be combined in any suitable manner consistent with this disclosure. [0033] “First,” “Second,” etc. As used herein, these terms are used as labels for nouns that they precede, and do not necessarily imply any type of ordering (e.g., spatial, temporal, logical, cardinal, etc.). Furthermore, various components may be described or claimed as “configured to” perform a task or tasks. In such contexts, “configured to” is used to connote structure by indicating that the components include structure (e.g., stored logic) that performs the task or tasks during operation. As such, the component can be said to be configured to perform the task even when the component is not currently operational (e.g., is not on). Reciting that a component is “configured to” perform one or more tasks is expressly intended not to invoke 35 U.S.C. § 112(f) for that component. [0034] The present invention contemplates the formulation of the anomaly detection problem under the interactive graph framework. The development of a graph convolutional memory network enables the preservation of the interactions that happen among different nodes over time. From the graph convolutional memory network interaction patterns between different components can be learned. Furthermore, the advancement of a robust loss function makes it suitable for unsupervised learning. [0035] Executing complex analytical tasks over a variegated structure such as graphs is challenging for modern computers. However, to overcome such computational limitations, an alternative solution known as graph embedding has been proposed recently. According to the general embedding definition, graph embedding seeks a vectorial representation that is able to preserve as much as possible of the original information contained in the input graph. Eventually, the vectorial representation obtained is used to solve complex task such as anomaly detection. To better understand the graph embedding process, Fig. 1 provides an example where an input graph, Fig.1a, is represented under different granularities as a set of 2D vectors. The most common case is to generate a vector for each node as shown in Fig.1b, where “similar” nodes are associated to similar vectors. It is also possible to have edge embedding as shown in Fig. 1c, where similar edges are associated to similar vectors, subgraph embedding as shown in Fig. 1d or whole graph embedding as shown in Fig. 1e. [0036] Intrusion Detection Systems (IDSs) monitor the network traffic to detect anomalous events and provide a certain level of security. Fig. 2b depicts traditional IDSs process network traffic represented as plan relational tables. In so doing, they lose the semantics contained in the interaction structure shown in Fig. 2a, which depicts a bipartite graph used to represent secure shell (SSH) connections 205 happening in a corporate network. That is, they mostly discharge the knowledge of who is communicating with whom. Note that the interaction between client 210 and server 215 is naturally encoded in the graph structure. Finally, Fig. 2c demonstrates how it is possible to detect fraudulent connections by means of clustering (e.g., cluster 220) in the embedding space. As described above, this is a graph convolutional neural network trained end-to-end in a fully unsupervised settings for anomaly detection. PROBLEM FORMULATION [0037] Traditional anomaly detection models required a set of manually crafted features to detect some anomalies. Such an approach is generally expensive (i.e., time consuming and labor intensive) because it is difficult to manually define a comprehensive set of features that’s capable of representing all the different real-world patterns. Moreover, the manually crafted features are generally encoded by a sparse vector containing information not directly understandable by an algorithm, thus causing a dimensionality issue. Formulating the problem under a graph embedding framework, however, provides an ability to automatically learn a dense embedding that’s representative of the underlying interactive structure that underpins problem. Such a data-driven approach avoids any human bias, and thus is capable of providing state-of- the-art results in multiple fields such as computer vision and natural language processing. Since it’s difficult to know in advance all the possible types of abnormal behaviors (e.g., attacks) that can occur in a computer network, abnormal behaviors a fully unsupervised model is preferred [0038] While most of the previous graph embedding techniques focus on static graphs, the current system formulates the anomaly detection problem as an attributed interaction graph. Under such data structure, edges represent the interactions between two heterogeneous nodes. For example, as shown in Fig.2b, in the context of detecting anomalous internet connections, an edge represents an attempt of connection between a user device225, identified by its username or its IP address 230, and a hosting server 235. Thus, we model each example as a triple (source id, SSH information, bastion id), where the SSH information field represents connection specific attributes as the connection type or the time and duration of the link. The following definitions provide some context with respect to understanding the present invention: Definitions [0039] 1. Attributed Interactive Graph: The attributed interactive graphs is a special form of a heterogeneous bipartite graph represented by G = (X, Y, E), where X and Y are two disjointed sets of nodes, and E represent the edge’s set. Similar to a knowledge graph, each edge et Î E can be represented by a triple (xt, at, yt), where xt Î X and yt Î Y are the source and destination nodes, respectively, while a t = [a t,1 , ..., a t,n ] is the attribute vector of the interacting edge at time t. Note that the source nodes will be referred to as the nodes belonging to set X and the target nodes as the nodes belonging to set Y. The use of an attributed interactive graph provides for a low dimensional embedding of each edge, which has to be representative of both the edge and the incident nodes information. Furthermore, in unsupervised settings, prior information regarding which are the normal or abnormal behavior is not known. Abnormal behavior is figured out by the end of the process. In other words, everything is considered normal until determined to be anomalous. [0040] 2. Edge Embedding in Attributed Interaction Graph: Given an attributed interaction graph G = (X, Y, E), an edge embedding is a function ¡: (E) ® R d . Since each edge is represented by a triple, ¡ naturally assumes a representation composed of the current edge attribute, the source node behavior, and the target node behavior. On the one hand, having a compact characterization of the current interaction enables a model to discriminate between standard and abnormal behavior. Thus, y(at) Î R is denoted as the dense embedding of the attribute of an edge e t . On the other hand, being able to characterize the nodes’ behavior in a vectoral format can enhance the ability to identify fraudulent activity. Thus, source and target node embedding may be denoted as f: X ® R d¢¢ and f¢: Y ® R , respectively, to capture such behavioral schemes. For notational simplicity, f(xt) and f¢(yt) will be denoted as the embedding of the source and target nodes of edge e t . PROPOSED MODEL [0041] Traditionally, graph embedding is associated with unsupervised learning methods that are used to preserve a well-defined graph structure. However, to solve the anomaly detection problem, an embedding network that provides the capability of natively preserving the interactive structure of the problem while being finely tunable is preferred. As shown in Fig. 3, the proposed model is divided into two main components: 1) the memory embedding network 305 that automatically learns y, f and f¢, and 2) the hypersphere clustering (shown in Fig. 5) for determining the partition between normal and anomalous interactions. Accordingly, the embedding network may generate a meaningful embedding representative of the actor’s behavior, while the hypersphere clustering may detect anomalous behavior based on the distance from the sphere’s centroid in the embedded space. MEMORY EMBEDDING NETWORK [0042] Graph convolutional neural networks (GCN) have demonstrated state-of- the-art performances by being scalable to real-world dataset. However, to correctly solve the anomaly detection problem, a meaningful representation of each edge must be determined. Furthermore, transactions recently performed by the source and target nodes must be tracked. To address such issue, a novel convolutional memory embedding network, as shown in Fig.3, may be used. [0043] Given at time t, a new edge e t Î E is detected. The attribute embedding is gt defined as: y(a t ) = f(W e a t ) (1)

In this instance, f() is an activation function, and W e is a weighting matrix automatically learned by the system.

[0044] Subsequently, a node embedding representation of the previous interactions may be determined by a node. The rationale behind this is that the current node behavior depends on its previous actions as well as the current interaction. Thus, the node embedding process can be defined as: f t (xt) = f (Wat + USf t-1 (xt)) (2) f ¢ t (y t ) = f (Wa t + U T t-1 (y t )) (3)

Once again, f() is an activation function, and W, U S and U T are weight matrices used to transform the respective edge attribute at and the previous memory representation.

[0045] Lastly, a comprehensive representation of each interaction may be obtained as: z t = tanh(W Z [f t (x t ), f¢ t (y t ), y(a t )]) (4) where [. , .] stands for the concatenation operation, and W Z is a linear transformation. Note that z t contains information regarding the current interaction as well as a memory factor for the source and target node.

[0046] To better understand the embedding method, Fig. 4 provides a graphical representation of how the interaction history of each node may be preserved and propagated. Specifically, in the proposed example, host V 405 is shown as being subject to some malicious communication with client C 410 (represented by the edges ( C , 2, W), ( C , a t-1 , V ' )) before interacting with client D 415. According to Eq. 3, f' t (V) is a linear combination between the current interaction’s attribute, represented by at, and the previous behavior of V. represented by f' t-1 (V). However, by its recursive definition, f' t-1 (V) information of the malicious interaction

(C, a t-1 , V). Unrolling this process through time demonstrates how the embedding f' t (V) can be interpreted as a behavioral memory of host V [0047] With respect to other problem settings, defining a learning formulation comprehensive of all the different source of information contained in Z i is not trivial. On the on hand, given that an edge is represented by a triple, it is possible to leverage an energy-based framework to define the loss function as: where E' is a set of artificially generated corrupted triples and d .) is a distance metric such as the L1 or L2-norm. However, generating corrupted triples in such settings is not as straightforward as generating corrupted triples for knowledge graph embeddings. For example, having no connection between two different nodes does not mean that such interaction would be anomalous a-priori. Moreover, Eq. 5 does not directly optimize Z i , but only geometrically relates f t , y and t . While a max-margin loss may be used, such an approach is not easily extendable to learning edge representations. [0048] Instead, anomaly detection can be interpreted as a one-class classification problem where it is possible to determine some conditions exemplar of good system behavior. Moreover, anomaly detection can be categorized as an unbalanced task, where standard behavior is considerably more prevalent than the abnormal behaviors. Thus, it is possible to utilize such disequilibrium to learn a single prototypical case representative of the normal behaviors. The following we are going to describe how a hypersphere clustering model is used to identify anomalies present in a dataset. HYPERSPHERE CLUSTERING [0049] Hyperspheres may be leveraged to partition the edge representation Z i as normal (laying inside the sphere) or anomalous (laying outside the sphere). That is, we define a closed boundary around the training data as a hypersphere, shown in Fig.5. By minimizing the volume of the hypersphere 505, we enforce all the training data to be more similar to the sphere’s center c. In so doing, the normal connections 510 would naturally fall inside the sphere, while the rare anomalous cases 515 would be outside the sphere, since, by definition, the anomalous cases do not follow a normal patterns. Defining the distance from the center of the hypersphere to the embedded example as stands for the L2-norm and ^^ represents the centroid of the hypersphere. The loss function can then be formulated as:

Adding an additional bias variable to enable a certain amount of outliers in the training set provides the following equation: where and g is a tunable parameter. By doing so, Eq. 7 can be interpreted as a partial triplet loss with only an anchor (c) and a positive example (Z i ).

[0050] While Eq. 7 has been demonstrated to be able to discount for a few outliers at the training phase, Eq. 7 is unstable due to the contrastive gradient yield by factor d i and x ί . In order to avoid such scenarios, an additional weighting scheme for parameter di is proposed. Specifically, each example may be weighted based on its closeness with the centroid c, as shown in the equation below:

Where w i is defined as: where s(. ) stands for the sigmoid function, t is a temperature hyper-parameter to tune and e is a small constant value. Note that W j is interpreted as a weight factor, so its gradient is stopped during the learning process, i.e.,

[0051] Finally, at inference time, the anomalies are detected based on the distance from the centroid c. That is, given a new example z j , if: where , and z j is labeled as an anomalous example. It is to be noted that a confidence interval is added to Eq. 10 in order to make the labelling process more robust: where µ is a parameter that can be hand-tune, and is defined as a percentage of the radius. [0052] Fig. 6 illustrates an exemplary process 600 for detecting anomaly behavior in interactive networks. In step 610, an attributed bipartite graph related problem is generated. That is, the anomaly detection problem is modeled as an attributed interactive bipartite graph. Once the problem has been generated, a graph convolutional memory network is developed in step 620. The development of the graph convolutional memory network enables the preservation of the interactions that happen among different nodes over time. [0053] In step 630, a loss function is developed. The advancement of a robust loss function makes it suitable for unsupervised learning. Once the loss function has been developed, the graph convolutional memory network is trained to learn the interaction patterns between different components in step 650. From the trained convolutional memory network, anomalies may be detected in step 650. [0054] EXPERIMENTS [0055] The Graph Convolution Memory Network (GCMN) defined above has been evaluated using two real-world datasets containing network traffic information with ground truth (i.e., explicitly labeled to indicate if the packet is normal or anomalous). Comparing the performances against models that combine deep learning with clustering methods, and against traditional models, provides an indication of the difficulty of the task. For the experiments described below, the baselines as well as the proposed model, were fine-tuned, and results of five different executions were averaged. EVALUATION METRICS [0056] Anomaly detection is presented as a clustering problem since the different types of abnormalities are usually unknown at the time of training. In principle, for evaluation purposes, traditional clustering metrics such as the normalized mutual information or Rand index may be used. However, recent studies have suggested evaluating the anomaly detection as a one-class classification task problem where the positive class reflect the anomalous cases. Thus, for comparison purposes, the performances of all the models are evaluated via traditional classification metrics such as: accuracy, precision, recall and F1-score. Note that while the detection of uncommon behavior in traffic network is the main objective, the F1-score is computed only against the anomalous class. BASELINES [0057] The GCMN model is compared with the following baselines: [0058] DeepSphere proposes an autoencoder architecture based on the well-known Long-Short Term Memory (LSTM) neural network optimized using the hypersphere clustering process. The main difference between this and the proposed model is the embedding generative process. Instead of a traditional autoencoder architecture, a graph convolutional network that natively preserve the interactive structure of a graph is used in the proposed model. [0059] Deep Autoencoding Gaussian Mixture Model (DAGMM) merges an autoencoder architecture with an estimation network to jointly learn a deep learning model with a traditional clustering algorithm such as the gaussian mixture model. While the proposed clustering architecture is easily integrable with the proposed graph embedding process, certain preliminary experiments have shown that such formulation is likely to degenerate to trivial solutions where all the datapoints belong to a single cluster. Thus, to avoid the computational complexity and the numerical instability, a simpler and more traditional approach is proposed. [0060] K-means clustering is a method of vector quantization. A traditional K- means algorithm can thus fit the raw feature extracted from each dataset. DATASETS [0061] To demonstrate the superior ability of the proposed GCMN model in detecting uncommon behavior inside a network traffic, two realistic datasets are applied. CTU-13, which is a dataset of botnet traffic that was captured in the CTU University, Czech Republic, in 2011, is a well-known dataset containing labeled traffic data. The dataset is divided into 13 different scenarios where different malware is executed inside a university network. The traffic is captured following the NetFlows standard, and each communication is tagged as normal, background or botnet (anomaly). For evaluation purposes, all the reported experiments discharge the connections labeled as background. Moreover, a single dataset combining the remaining examples of each scenario is generated. A summary of the dataset used is shown int Table 1 below. Table 1: Dataset used for evaluation. [0062] The testing dataset is then split into validation and test sets. Coburg Intrusion Detection Data Sets (CIDDS) is a carefully generated dataset to evaluate an intrusion detection system. CIDDS was generated to mimic a small business network inside an OpenStack environment. Note that to evaluate the performances of the different models better, the suspicious and unknown flows present in the external server dataset are eliminated. Finally, only the first ten million connections are kept to train and test the model. TRAINING PROCESS & PARAMETERS TUNING [0063] As indicated above, the primary goal of the proposed model is to detect anomalous connections. That is, the proposed GCMN model is expected to learn, at training time, an embedding prototypical of all the regular transmissions (denoted as ^^ in the description on hyperspheres clustering). If a new connection deviates from the learned prototypical representation by more than a threshold value (r + µ), the connection is flagged as suspicious. As such, it is important to train the model on what is considered to be normal behavior. Otherwise, the learned archetypal embedding would be affected by noise. However, in a real-world environment, it is difficult to obtain a training set with only normal behavior. Thus, to evaluate such scenarios, the model is trained and tested in three different settings, as shown in Fig.7. The first setting 705 includes a training set that is composed of only normal examples. In the second setting 710, the training set contains 5% anomalous and 95% normal examples. And in the third setting 715, the training set includes 10% anomalous examples and 90% normal examples. PARAMETER TUNING [0064] The experiments described below are obtained using the following parameter tuning. In order to evaluate the k-means model in terms of accuracy and F1- Score, the model is trained using only two clusters: one that is expected to represent normal behavior, and one to represent anomalous cases. Table 2: Anomaly detection performance results. [0065] Table 2 provides anomaly detection performance results based on the CTU and CIDDS datasets. The table above reports the results when training the models with a trained dataset containing 0%, 5% and 10% of anomalous examples. [0066] While DAGMM appears to perform well with four mixture components on all the datasets, DAGMM is sensitive to the setting of the energy’s threshold used to detect the anomalies. The thresholds are defined in terms of the percentile of elements of the combined training and validation sets labeled as anomalous. Following the same approach, setting a threshold of 50% of the total energy on the CTU-0% dataset, while setting a threshold of 40% of the total energy on the CTU-5% and CTU-10% produced the best results. Additionally, 80% was the best performer on all the CIDDS datasets. [0067] The DeepSphere model also provides a few parameters for hand-tuning, namely g and µ. We found that g =0.005 works relatively well for CTU-0% and CIDDS-0%, while g = 0.01 is used for the remaining datasets. Moreover, a tolerance of µ = 10% on CTU-0% I used, but µ = 30% appeared to work better on the CIDDS- 0% dataset. Finally, µ = 7% is used on all the remaining experiments. [0068] The proposed GCMN model also presents the same parameter of the DeepSphere model. As for DeepSphere, we found that g = 0.005 works best on the clean datasets, while g = 0.01 works on all the remaining cases. But on CTU-10%, g = 0.05 was the best performer. Finally, µ = 30% was used on CIDDS-0% and µ = 80% on CTU-0%. On the remaining dataset, µ = 7% was used. RESULTS [0069] All the results reported above are the averages of five independent executions. Due to space limitation, results of the T-test conducted on the F1-score are not provided, but the results validate a significant improvement over almost all the results. [0070] As indicated above, a traditional approach such as the k-means is not able to learn any valuable pattern from the raw features. This validates the idea that a deep learning approach can automatically learn a meaningful embedding of the problem without leveraging carefully design input features. Also, the results on the datasets that do not contain any anomalies are inferior. Such behavior is expected because without any anomalies at the training phase, the k-means algorithm is not able to learn any valuable differentiation patterns. [0071] On the other hand, the DAGMM model appears to be subject to noise present in the different datasets, since it suffers for a huge drop in the performance when the noise is added at training time. Such behavior, as discussed above, is the consequence of strong overfitting. [0072] The DeepSphere algorithm shares a similar loss function to the proposed model. DeepSphere shows significantly lower performances on the CTU datasets as well as the CIDDS-0% and CIDDS-5%. This validates the idea of representing the problem under the graph embedding framework. DeepSphere is the best performer on the CIDDS-10% dataset. This indicates that its learning phase is less affected by the noise introduced in such experiments and we suppose it is due to its reconstruction factor present in the autoencoder loss. However, it also uses more parameters with respect to the GCMN model, thus it requires more time for training and testing. [0073] Finally, the proposed GCMN was the best performing model on almost all of the experiments, and achieved a relative improvement ranging from 5.9% to 2%, but is comparable to the best performing method on the CIDDS10%. Such results indicate that using a graph embedding model to do anomaly detection better represent the problem settings and can provide fascinating insight on the studied problem. [0074] Fig. 8 is a block diagram of an exemplary computing system on which the detection of anomalous behavior in interactive networks may be performed. As shown, a computing system 800 may comprise or implement a plurality of servers, devices, and/or software components that operate to perform various methodologies in accordance with the described embodiments. Exemplary servers, devices, and/or software components may include, for example, stand-alone and enterprise-class servers running an operating system (OS) such as a MICROSOFT® OS, a UNIX® OS, a LINUX® OS, or other suitable OS. It may be appreciated that the servers illustrated in Fig. 8 may be deployed in other ways and that the operations performed and/or the services provided by such servers may be combined, distributed, and/or separated for a given implementation and may be performed by a greater number or fewer number of servers. One or more servers may be operated and/or maintained by the same or different entities. [0075] Computing system 800 may include, among various devices, servers, databases and other elements, one or more clients 802 comprising or employing one or more client devices 804, such as a laptop, a mobile computing device, a tablet, a personal computer, a wearable device, and/or any other computing device having computing and/or communications capabilities in accordance with the described embodiments. Client devices 804 may also include a cellular telephone, smart phone, electronic wearable device (e.g., smart watch, virtual reality headset), or other similar mobile devices that a user may carry on or about his or her person and access readily. [0076] Client devices 804 generally may provide one or more client programs 806, such as system programs and application programs to perform various computing and/or communications operations. Exemplary system programs may include, without limitation, an operating system (e.g., MICROSOFT® OS, UNIX® OS, LINUX® OS, Symbian OS™, iOS, Android, Embedix OS, Binary Run-time Environment for Wireless (BREW) OS, JavaOS, a Wireless Application Protocol (WAP) OS, and others), device drivers, programming tools, utility programs, software libraries, application programming interfaces (APIs), and so forth. Exemplary application programs may include, without limitation, a payment system application, a web browser application, messaging application, contacts application, calendar application, electronic document application, database application, media application (e.g., music, video, television), location-based services (LBS) application (e.g., GPS, mapping, directions, positioning systems, geolocation, point-of-interest, locator) that may utilize hardware components such as an antenna, and so forth. One or more of client programs 806 may display various graphical user interfaces (GUIs) to present information to and/or receive information from one or more users of client devices 804. In some embodiments, client programs 806 may include one or more applications configured to conduct some or all of the functionalities and/or processes discussed below. [0077] As shown, client devices 804 may be communicatively coupled via one or more networks 808 to a network-based system 810. Network-based system 810 may be structured, arranged, and/or configured to allow client 802 to establish one or more communications sessions between network-based system 810 and various client devices 804 and/or client programs 806. Accordingly, a communications session between client devices 804 and network-based system 810 may involve the unidirectional and/or bidirectional exchange of information and may occur over one or more types of networks 808 depending on the mode of communication. While the embodiment of Fig. 8 illustrates a computing system 800 deployed in a client-server operating environment, it is to be understood that other suitable operating environments and/or architectures may be used in accordance with the described embodiments. [0078] Data communications between client devices 804 and the network-based system 810 may be sent and received over one or more networks 808 such as the Internet, a WAN, a WWAN, a WLAN, a mobile telephone network, a landline telephone network, personal area network, as well as other suitable networks. For example, client devices 804 may communicate with network-based system 810 over the Internet or other suitable WAN by sending and or receiving information via interaction with a website, e-mail, IM session, and/or video messaging session. Any of a wide variety of suitable communication types between client devices 804 and system 810 may take place, as will be readily appreciated. In particular, wireless communications of any suitable form (e.g., Bluetooth, near-field communication, etc.) may take place between client device 804 and system 810, such as that which often occurs in the case of mobile phones or other personal and/or mobile devices. [0079] Network-based system 810 may comprise one or more communications servers 820 to provide suitable interfaces that enable communication using various modes of communication and/or via one or more networks 808. Communications servers 820 may include a web server 822, an API server 824, and/or a messaging server 826 to provide interfaces to one or more application servers 830. Application servers 830 of network-based system 810 may be structured, arranged, and/or configured to provide various online services to client devices that communicate with network-based system 810. In various embodiments, client devices 804 may communicate with application servers 830 of network-based system 810 via one or more of a web interface provided by web server 822, a programmatic interface provided by API server 824, and/or a messaging interface provided by messaging server 826. It may be appreciated that web server 822, API server 824, and messaging server 826 may be structured, arranged, and/or configured to communicate with various types of client devices 804, and/or client programs 806 and may interoperate with each other in some implementations. [0080] Web server 822 may be arranged to communicate with web clients and/or applications such as a web browser, web browser toolbar, desktop widget, mobile widget, web-based application, web-based interpreter, virtual machine, mobile applications, and so forth. API server 824 may be arranged to communicate with various client programs 806 comprising an implementation of API for network-based system 810. Messaging server 826 may be arranged to communicate with various messaging clients and/or applications such as e-mail, IM, SMS, MMS, telephone, VoIP, video messaging, IRC, and so forth, and messaging server 826 may provide a messaging interface to enable access by client 802 to the various services and functions provided by application servers 830. [0081] Application servers 830 of network-based system 810 may be servers that provide various services such as tools for verifying URLs based on information collected about customers. Application servers 830 may include multiple servers and/or components. For example, application servers 830 may include a graphing engine 832, memory network engine 834, training engine 836, and/or anomaly detection engine 838. These servers and/or components, which may be in addition to other servers, may be structured and arranged to detect anomalous behavior in interactive networks. [0082] Application servers 830, in turn, may be coupled to and capable of accessing one or more databases 840 including system call database 842, application database 844, and/or table database 846. Databases 840 generally may store and maintain various types of information for use by application servers 830 and may comprise or be implemented by various types of computer storage devices (e.g., servers, memory) and/or database structures (e.g., relational, object-oriented, hierarchical, dimensional, network) in accordance with the described embodiments. [0083] Fig. 9 illustrates an exemplary computer system 900 in block diagram format suitable for implementing on one or more devices of the computing system in Fig. 8. In various implementations, a device that includes computer system 900 may comprise a personal computing device (e.g., a smart or mobile phone, a computing tablet, a personal computer, laptop, wearable device, PDA, etc.) that is capable of communicating with a network. A service provider and/or a content provider may utilize a network computing device (e.g., a network server) capable of communicating with the network. It should be appreciated that each of the devices utilized by users, service providers, and content providers may be implemented as computer system 900 in a manner as follows. Additionally, as more and more devices become communication capable, such as smart devices using wireless communication to report, track, message, relay information and so forth, these devices may be part of computer system 900. [0084] Computer system 900 may include a bus 902 or other communication mechanisms for communicating information data, signals, and information between various components of computer system 900. Components include an input/output (I/O) controller 904 that processes a user action, such as selecting keys from a keypad/keyboard, selecting one or more buttons, links, actuatable elements, etc., and sends a corresponding signal to bus 902. I/O controller 904 may also include an output component, such as a display 906 and a cursor control 908 (such as a keyboard, keypad, mouse, touchscreen, etc.). In some examples, I/O controller 904 may include an image sensor for capturing images and/or video, such as a complementary metal-oxide semiconductor (CMOS) image sensor, and/or the like. An audio I/O component 910 may also be included to allow a user to use voice for inputting information by converting audio signals. Audio I/O component 910 may allow the user to hear audio. [0085] A transceiver or network interface 912 transmits and receives signals between computer system 900 and other devices, such as another user device, a merchant server, an email server, application service provider, web server, a payment provider server, and/or other servers via a network. In various embodiments, such as for many cellular telephone and other mobile device embodiments, this transmission may be wireless, although other transmission mediums and methods may also be suitable. A processor 914, which may be a micro-controller, digital signal processor (DSP), or other processing component, processes these various signals, such as for display on computer system 900 or transmission to other devices over a network 916 via a communication link 918. Again, communication link 918 may be a wireless communication in some embodiments. Processor 914 may also control transmission of information, such as cookies, IP addresses, images, and/or the like to other devices. [0086] Components of computer system 900 also include a system memory 920 (e.g., RAM), a static storage component 922 (e.g., ROM), and/or a disk drive 924. Computer system 900 performs specific operations by processor 914 and other components by executing one or more sequences of instructions contained in system memory 920. Logic may be encoded in a computer-readable medium, which may refer to any medium that participates in providing instructions to processor 914 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and/or transmission media. In various implementations, non-volatile media includes optical or magnetic disks, volatile media includes dynamic memory such as system memory 920, and transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise bus 902. In one embodiment, the logic is encoded in a non-transitory machine-readable medium. In one example, transmission media may take the form of acoustic or light waves, such as those generated during radio wave, optical, and infrared data communications. [0087] Some common forms of computer readable media include, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD- ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, FLASH-EPROM, any other memory chip or cartridge, or any other medium from which a computer is adapted to read. [0088] In various embodiments of the present disclosure, execution of instruction sequences to practice the present disclosure may be performed by computer system 900. In various other embodiments of the present disclosure, a plurality of computer systems 900 coupled by communication link 918 to the network (e.g., such as a LAN, WLAN, PTSN, and/or various other wired or wireless networks, including telecommunications, mobile, and cellular phone networks) may perform instruction sequences to practice the present disclosure in coordination with one another. Modules described herein may be embodied in one or more computer readable media or be in communication with one or more processors to execute or process the techniques and algorithms described herein. [0089] A computer system may transmit and receive messages, data, information and instructions, including one or more programs (i.e., application code) through a communication link and a communication interface. Received program code may be executed by a processor as received and/or stored in a disk drive component or some other non-volatile storage component for execution. [0090] Where applicable, various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software. Also, where applicable, the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the spirit of the present disclosure. Where applicable, the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the scope of the present disclosure. In addition, where applicable, it is contemplated that software components may be implemented as hardware components and vice-versa. [0091] Software, in accordance with the present disclosure, such as program code and/or data, may be stored on one or more computer-readable media. It is also contemplated that software identified herein may be implemented using one or more computers and/or computer systems, networked and/or otherwise. Such software may be stored and/or used at one or more locations along or throughout the system, at client 802, network-based system 810, or both. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein. [0092] The foregoing networks, systems, devices, and numerous variations thereof may be used to implement one or more services, such as the services discussed above and in more detail below. [0093] The user device (i.e., the computing device) described above may be one of a variety of devices including but not limited to a smartphone, a tablet, a laptop and a pair of augmented reality spectacles. Each of these devices embodies some processing capabilities and an ability to connect to a network (e.g., the internet, a LAN, a WAN, etc.). Each device also includes a display element for displaying a variety of information. The combination of these features (display element, processing capabilities and connectivity) on the mobile communications enables a user to perform a variety of essential and useful functions. [0094] The foregoing description is provided to enable a person skilled in the art to practice the various configurations described herein. While the subject technology has been particularly described with reference to the various figures and configurations, it should be understood that these are for illustration purposes only and should not be taken as limiting the scope of the subject technology. [0095] There may be many other ways to implement the subject technology. Various functions and elements described herein may be partitioned differently from those shown without departing from the scope of the subject technology. Various modifications to these configurations will be readily apparent to those skilled in the art, and generic principles defined herein may be applied to other configurations. Thus, many changes and modifications may be made to the subject technology, by one having ordinary skill in the art, without departing from the scope of the subject technology. [0096] It is understood that the specific order or hierarchy of steps in the processes disclosed is an illustration of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged. Some of the steps may be performed simultaneously. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented. [0097] A phrase such as "an aspect" does not imply that such aspect is essential to the subject technology or that such aspect applies to all configurations of the subject technology. A disclosure relating to an aspect may apply to all configurations, or one or more configurations. An aspect may provide one or more examples of the disclosure. A phrase such as an "aspect" may refer to one or more aspects and vice versa. A phrase such as an "implementation" does not imply that such implementation is essential to the subject technology or that such implementation applies to all configurations of the subject technology. A disclosure relating to an implementation may apply to all implementations, or one or more implementations. An implementation may provide one or more examples of the disclosure. A phrase such an "implementation" may refer to one or more implementations and vice versa. A phrase such as a "configuration" does not imply that such configuration is essential to the subject technology or that such configuration applies to all configurations of the subject technology. A disclosure relating to a configuration may apply to all configurations, or one or more configurations. A configuration may provide one or more examples of the disclosure. A phrase such as a "configuration" may refer to one or more configurations and vice versa. [0098] Furthermore, to the extent that the terms "include," "have," and "the like" are used in the description or the claims, such terms are intended to be inclusive in a manner similar to the term "comprise" as "comprise" is interpreted when employed as a transitional word in a claim. [0099] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any implementation described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other implementations. [00100] A reference to an element in the singular is not intended to mean "one and only one" unless specifically stated, but rather "one or more." The term "some" refers to one or more. All structural and functional equivalents to the elements of the various configurations described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and intended to be encompassed by the subject technology. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the above description.