An Outlier mining-based method for anomaly detection

被引:1
|
作者
Wu, Nannan [1 ]
Shi, Liang [1 ]
Jiang, Qingshan [1 ]
Weng, Fangfei [1 ]
机构
[1] Xiamen Univ, Software Sch, Xiamen 361005, Peoples R China
关键词
anomaly detection; outlier mining; index tree;
D O I
10.1109/IWASID.2007.373717
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a new technology is proposed to solve anomaly detection problems of the high false positive rate or hard to build the model of normal behavior, etc. What our technology based on is the similarity between outliers and intrusions. So we proposed a new outlier mining algorithm based on index tree to detect intrusions. The algorithm improves on the HilOut algorithm to avoid the complex generation of hilbert value. It calculates the upper and lower bound of the weight of each record with r-region and index tree to avoid unnecessary distance calculation. The algorithm is easy to implement, and more suitable to detect intrusions in the audit data. We have performed many experiments on the KDDCup99 dataset to validate the effect of TreeOut and obtain good results.
引用
收藏
页码:152 / +
页数:2
相关论文
共 50 条
  • [1] A Process Mining-based unsupervised Anomaly Detection technique for the Industrial Internet of Things
    Vitale, Francesco
    De Vita, Fabrizio
    Mazzocca, Nicola
    Bruneo, Dario
    [J]. INTERNET OF THINGS, 2023, 24
  • [2] Minimal weighted infrequent itemset mining-based outlier detection approach on uncertain data stream
    Saihua Cai
    Ruizhi Sun
    Shangbo Hao
    Sicong Li
    Gang Yuan
    [J]. Neural Computing and Applications, 2020, 32 : 6619 - 6639
  • [3] Minimal weighted infrequent itemset mining-based outlier detection approach on uncertain data stream
    Cai, Saihua
    Sun, Ruizhi
    Hao, Shangbo
    Li, Sicong
    Yuan, Gang
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (11): : 6619 - 6639
  • [4] An outlier mining-based malicious node detection model for hybrid P2P networks
    Meng, Xianfu
    Ren, Shuang
    [J]. COMPUTER NETWORKS, 2016, 108 : 29 - 39
  • [5] Triplet Mining-based Phishing Webpage Detection
    Abeywardena, Kalana
    Zhao, Jiawei
    Brent, Lexi
    Seneviratne, Suranga
    Holz, Ralph
    [J]. PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 377 - 380
  • [6] Data Mining-based Ethereum Fraud Detection
    Jung, Eunjin
    Le Tilly, Marion
    Gehani, Ashish
    Ge, Yunjie
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 266 - 273
  • [7] Data mining-based fault detection method for distributed power generation systems
    Wu H.
    [J]. Distributed Generation and Alternative Energy Journal, 2021, 36 (04): : 441 - 458
  • [8] Real time data mining-based intrusion detection
    Lee, W
    Stolf, SJ
    Chan, PK
    Eskin, E
    Fan, W
    Miller, M
    Hershkop, S
    Zhang, JX
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 89 - 100
  • [9] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
    Zhang, Jiong
    Zulkernine, Mohammad
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
  • [10] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299