Anomaly Detection Using Maximum Entropy Fuzzy Clustering Algorithm Enhanced with Soft Computing Techniques

被引:0
|
作者
Liang, Chunhua [1 ,2 ]
机构
[1] Institute for History of Science and Technology, Shanxi University, Taiyuan,030006, China
[2] Information Institute, Shanxi Finance and Taxation College, Taiyuan,030024, China
来源
Informatica (Slovenia) | 2024年 / 48卷 / 17期
关键词
D O I
10.31449/inf.v48i17.6537
中图分类号
学科分类号
摘要
With the continuous growth of data volume, anomaly detection has become an important link in the data processing process. In view of the maximum entropy fuzzy clustering algorithm, an anomaly detection method combining soft computing is proposed. During the process, the K-means algorithm was used to construct the algorithm foundation, followed by the establishment of an objective function for maximum entropy calculation and the introduction of the Hilbert Schmidt independence criterion for variable extraction. Then it conducts data migration and calculates the exception score. The experimental results showed that the proposed method could be reduced to 113 in the Iris data set when the convergence curve was tested. When the calculation time was tested, the calculation time of the research method was only 2697ms when the sample size reached 10000. When the accuracy and purity tests were carried out, the accuracy and purity of the research method were 87.7% and 87.6% in the MR Dataset. In the Leaf dataset, the standardized mutual information index reached 0.6837 and the FM index reached 0.3903. The lowest Davies-Bouldin index was 0.71. The area enclosed by the receiver operation characteristic curve and the horizontal coordinate of the research method was the largest. The results indicate that the research method has high accuracy and computational efficiency in data anomaly detection and can provide effective technical references for anomaly detection. © 2024 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:171 / 182
相关论文
共 50 条
  • [1] Construction of Soft Computing Anomaly Detection Model Based on Independence Criteria and Maximum Entropy Clustering Algorithm
    Liang, Chunhua
    IEEE ACCESS, 2024, 12 : 111111 - 111125
  • [2] Action Recognition Based on Maximum Entropy Fuzzy Clustering Algorithm
    Tang, Xiaoqin
    Xiao, Guoqiang
    FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), 2014, 277 : 155 - 164
  • [3] Real-time anomaly detection using soft-computing techniques
    Copeland, JA
    Garcia, RC
    IEEE SOUTHEASTCON 2001: ENGINEERING THE FUTURE, PROCEEDINGS, 2001, : 105 - 108
  • [4] Data stream clustering algorithm based on the maximum entropy of data dimension and its applications for anomaly detection
    Geng Z.-Q.
    Ji W.
    Han Y.-M.
    Cao J.
    Geng, Zhi-Qiang (gengzhiqiang@mail.buct.edu.cn), 2016, Northeast University (31): : 343 - 348
  • [5] Network Anomaly Detection using Soft Computing
    Srinoy, Surat
    Kurutach, Werasak
    Chimphlee, Witcha
    Chimphlee, Siriporn
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 9, 2005, 9 : 140 - 144
  • [6] Soft Computing Techniques for Internet Backbone Traffic Anomaly Detection
    Azzini, Antonia
    De Felice, Matteo
    Meloni, Sandro
    Tettamanzi, Andrea G. B.
    APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2009, 5484 : 99 - +
  • [7] Density-sensitive fuzzy kernel maximum entropy clustering algorithm
    Li Y.-T.
    Guo J.
    Qi L.
    Liu X.
    Ruan P.-Y.
    Tao X.-M.
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2022, 39 (01): : 67 - 82
  • [8] Fast data association algorithm based on maximum entropy fuzzy clustering
    School of Electronic Engineering, Xidian Univ., Xi'an 710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 2006, 2 (251-256):
  • [9] JPDA algorithm based on maximum entropy fuzzy clustering in clutter environment
    Bi W.
    Zhou J.
    Zhang A.
    Liu L.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2023, 45 (07): : 1920 - 1927
  • [10] Density-sensitive fuzzy kernel maximum entropy clustering algorithm
    Tao, Xinmin
    Wang, Ruotong
    Chang, Rui
    Li, Chenxi
    KNOWLEDGE-BASED SYSTEMS, 2019, 166 : 42 - 57