Outlier detection algorithms in data mining systems

被引:46
|
作者
Petrovskiy, MI [1 ]
机构
[1] Moscow MV Lomonosov State Univ, Dept Computat Math & Cybernet, Moscow 119992, Russia
基金
俄罗斯基础研究基金会;
关键词
Algorithms - Computer operating systems - Fuzzy sets - Numerical methods - Problem solving - Protection;
D O I
10.1023/A:1024974810270
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper discusses outlier detection algorithms used in data mining systems. Basic approaches currently used for solving this problem are considered, and their advantages and disadvantages are discussed. A new outlier detection algorithm is suggested. It is based on methods of fuzzy set theory and the use of kernel functions and possesses a number ofadvantages compared to the existing methods. The performance of' the algorithm suggested is studied by the example of the applied problem of anomaly detection arising in computer protection systems, the so-called intrusion detection systems.
引用
收藏
页码:228 / 237
页数:10
相关论文
共 50 条
  • [31] Outlier Detection Algorithms Over Fuzzy Data with Weighted Least Squares
    Nikolova, Natalia
    Rodriguez, Rosa M.
    Symes, Mark
    Toneva, Daniela
    Kolev, Krasimir
    Tenekedjiev, Kiril
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2021, 23 (05) : 1234 - 1256
  • [32] On eigenfunction approach to data mining: outlier detection in high-dimensional data sets
    Nagar, AK
    Muyeba, MK
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTING TECHNIQUES, 2004, : 251 - 256
  • [33] Combined data mining techniques based patient data outlier detection for healthcare safety
    Gebremeskel, Gebeyehu Belay
    Yi, Chai
    He, Zhongshi
    Haile, Dawit
    INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2016, 9 (01) : 42 - 68
  • [34] Applying Sequence Mining for Outlier Detection in Process Mining
    Sani, Mohammadreza Fani
    Van Zelst, Sebastiaan J.
    Van der Aalst, Wil M. P.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS (OTM 2018), PT II, 2018, 11230 : 98 - 116
  • [35] Outlier Detection Algorithms for Open Environments
    Kou A.
    Huang X.
    Sun W.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [36] A Comparative Study of Outlier Detection Algorithms
    Isaksson, Charlie
    Dunham, Margaret H.
    MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, 2009, 5632 : 440 - 453
  • [37] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [38] Detection of Phishing Emails using Data Mining Algorithms
    Smadi, Sami
    Aslam, Nauman
    Zhang, Li
    Alasem, Rafe
    Hossain, M. A.
    2015 9TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2015,
  • [39] The Optimal Application of the Algorithms of Detection and Data Mining in Honeynet
    Dong Nanping
    Zhou Guanling
    Wang Yuping
    2009 IITA INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING, PROCEEDINGS, 2009, : 13 - 16
  • [40] Designing a Streaming Algorithm for Outlier Detection in Data Mining-An Incremental Approach
    Yu, Kangqing
    Shi, Wei
    Santoro, Nicola
    SENSORS, 2020, 20 (05)