Link Mining Applications: Progress and Challenges

Link Mining Applications: Progress and Challenges

Link Mining Applications: Progress and Challenges Ted E. Senator* DARPA/IPTO 3701 N. Fairfax Drive Arlington, VA 22203 [email protected] ABSTRACT This article is organized as follows. After this introduction, This article reviews a decade of progress in the area of link section 2 describes characteristics of domains and the associated mining, focusing on application requirements and how they have tasks that require link mining techniques. Section 3 reviews the and have not yet been addressed, especially in the area of complex state of techniques for analyzing linked data as of about 10 years event detection. It discusses some ongoing challenges and ago. Section 4 overviews progress in the past decade. Section 5 suggests ideas that could be opportunities for solutions. The most discusses some unmet needs and suggests some possible important conclusion of this article is that while there are many approaches for research to address them. Section 6 concludes. link mining techniques that work well for individual link mining 2. PROBLEM DOMAIN & TASK tasks, there is not yet a comprehensive framework that can support a combination of link mining tasks as needed for many real CHARACTERISTICS applications. Many domains of interest are inherently relational. In fact, they are not just relational, but highly structured. By highly structured, Keywords we mean not only that there are semantically meaningful Link mining, link analysis, link discovery, pattern discovery, connections† between entities of the same and different types, but pattern analysis, pattern matching, structured data, complex event also 1) that there are grouped entities that have as members other detection, data mining applications. entities (of single or multiple types) and 2) that there are multiple abstraction hierarchies on these entities and their relationships. 1. INTRODUCTION (Note that these two types of hierarchies correspond to the usual Link mining is a fairly new research area that lies at the part-of and is-a predicates in many knowledge representation intersection of link analysis, hypertext and web mining, relational systems; the distinction between these two types of hierarchies is learning and inductive logic programming, and graph mining [10]. sometimes ignored in many link mining techniques, but is as However, and perhaps more important, it also represents an important for learning and inference in link mining as it is in important and essential set of techniques for constructing useful knowledge representation and reasoning.) At a high level of applications of data mining in a wide variety of real and important abstraction the application needs may be to correct inaccuracies domains, especially those involving complex event detection from and resolve uncertainties in the data, infer the existence of missing highly structured data. This article provides examples of entities and links, identify higher-order entities that are not problems and domains that require link mining techniques and explicitly represented in the data, classify or score entities discusses the technical requirements of these problems and according to some attributes of interest, detect interesting domains. It reviews progress in developing link mining subgraphs, detect changes or anomalies, and/or learn significant techniques that can meet some of these requirements and outlines patterns. some needs that are not yet met and, therefore, are both open These rich domain structures provide a wide choice of research challenges and potential opportunities for new representations; selecting an appropriate representation that application construction. enables all aspects of an application to be solved is a major challenge because the distinct techniques needed for particular A central claim of this article is that link mining presents both aspects of an application often depend on different challenges and opportunities. It presents challenges because data representational choices. Typically a database or set of databases mining techniques for non-linked data are inadequate for similar is available. The databases may use incompatible data models, problems with linked data and because the combinatorics of any or none of which may be appropriate for the link mining linked domains typically far exceed those of domains techniques. The combined databases may be thought of as a large characterized by non-linked data. It presents opportunities heterogeneous graph; however, translating from a particular because the structure of linked data provides both constraints on schema to a graphical data model is a one-to-many process. Often what can be inferred and additional information for inference than the data models are sparsely populated, contain uncertain and can be obtained from non-linked data. incorrect information, require inference to specify entities of interest – which may occur very rarely – from those that are * The views and conclusions expressed in this paper are solely those of the author and should not be interpreted as representing the official † Sometimes link analysis techniques are applied to the far weaker type of policies, either expressed or implied, of DARPA, the Department of connections resulting from co-occurrence of terms in text or to concepts Defense, or the US Government. such as “topics,” with correspondingly weaker results. SIGKDD Explorations Volume 7, Issue 2 Page 76 Figure 1: Example of Stock Fraud Case Showing Characteristics of Highly Structured Domains directly observed, contain heterogeneous observations from which often are focused at less heterogeneous data. There are multiple sources, are not clearly and unambiguously identifiable, quasi-static role relationships (e.g., drilling contractor) and depend on consolidation of individual transactions, are not transactional events (e.g., bankruptcy occurs). This example is, of amenable to sampling, and exhibit high degrees of relational course, the end result of a complex analysis. In reality, it should autocorrelation. be thought of as an interesting and relatively complete, but also 2.1 Domain Examples very small portion of a large database, that was determined to represent an interesting set of entities, relationships, and events. Examples of complex structured application domains in which Figure 2 provides another example. It depicts a nuclear material link mining techniques are needed include counterterrorism theft that occurred in 1992. A key aspect of figure 2 is the detection, counterdrug and other law enforcement, money depiction of both a data model and a domain model, clearly laundering, stock fraud, and many others. Figure 1 is an example showing how these two concepts are distinct. The circled of a portion of a stock fraud domain that illustrates many of the numbers indicate the correspondence between specific items in key features of real domains that must be addressed by link the data and domain representations. Many of the other mining techniques. (It depicts a well-known stock fraud case that characteristics of figure 1 are also present in figure 2. was discovered in 1997, involving the falsification of core samples by a geologist and an executive, that resulted in a loss to 2.2 Task Examples investors of over $3B.) The boxes around the sets of people show The application goal of link mining in highly structured domains the group hierarchy, with individuals being part of geographically may generally be described as learning or inferring as much as distinct operations of the same company. The labels on the links possible about the domain. Applications can include learning show semantically meaningful connections between entities and models of the domain as well as inferring information about the between events. The rich iconography and color is used to entities, relationships, their attributes, and the connectivity indicate many is-a relationships. The mixing of entities (people, structure of the domain. One important application task in such organizations, countries, etc.), relationships, and events on a domain typically consists of classifying inferred entities over time. single diagram is typical of many domains, and represents a key Another key task is detecting activities of interest. These two tasks challenge for successful applications of link mining techniques, are, of course, closely related. Typically the former task is based SIGKDD Explorations Volume 7, Issue 2 Page 77 LOCATION table THEFT table 1 “the non-trivial process LOCATION_ID: 10 THEFT_ID: 50 NAME: Chepetsk Mech 2 LOCATION: Chepetsk of identifying valid, Factory Mech Factory novel, potentially useful, TYPE: Nuclear MATERIAL: U-238 and ultimately COUNTRY: Russia THIEVES: Yevseev, PRODUCTS: U-238 Nikifirov understandable patterns EMPLOYEES: … MATERIAL table in data” [9]. Data mining MAT_CLASS: Nuclear 3 MAT_TYPE: U-238 is considered to be a PERSON table particular step in this PERSON_ID: 01 NAME: Yevseev 4 process, albeit the AGE: 33 significant automated GENDER: Male OCCUPATION: Technical one in which algorithms Specialist are applied to extract the ORGANIZATION: 5 Chepetsk Mech 4 patterns. However, there Factory PERSON 2 2 is an inherent ambiguity 5 in the use of the term PERSON table “pattern” that is PERSON_ID: 02 NAME: Nikifirov PERSON particularly important AGE: 45 when one considers link GENDER: Male 4 5 OCCUPATION: Foreman mining applications. The ORGANIZATION: patterns that are Chepetsk Mech Portion of Nuclear Theft Factory discovered are typically 1 link diagram, Chepetsk templates, or class-based. THEFT 3 Mechanical

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us