Abnormal Detection Research Based on Outlier Mining

被引:4
作者
Zhang, Lei [1 ]
Liu, Changjiang [2 ]
Chen, Yong [3 ]
Lao, Shaowen [4 ]
机构
[1] Hexi Univ, Informat Technol Ctr, Zhangye 734000, Gansu, Peoples R China
[2] Troops 32153 PLA, XuanHua 075100, Hebei, Peoples R China
[3] Army Artillery Training base, XuanHua 075100, Hebei, Peoples R China
[4] Hexi Univ, Informat Technol & Media Inst, Zhangye 734000, Gansu, Peoples R China
来源
2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018) | 2018年
关键词
Data mining; Abnormal detection; Outlier Mining;
D O I
10.1109/ICICTA.2018.00009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces the latest development of intrusion detection based on data mining, and studies the key technologies of network intrusion detection based on data mining, especially outlier mining. A anomaly detection model based on outlier mining is proposed. The model firstly preprocesses the data and sets the normal sample set, calculates the outlier score of each sample in the normal sample set, and combines it with the specified outlier value threshold. The normal behavior profile is formed, which can be used as the basis for detection.
引用
收藏
页码:5 / 7
页数:3
相关论文
共 50 条
  • [21] Research on Abnormal Data Mining Algorithm
    Dong Anfa
    Zhang Chunhai
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 1477 - 1480
  • [22] Research on intrusion detection based on data mining
    Tong, Xiaojun
    Cui, Minggen
    Wang, Jie
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 444 - 447
  • [23] An Outlier Mining Algorithm Based on Attribute Entropy
    Zhou, Ming-Jian
    Tao, Jun-cai
    2011 2ND INTERNATIONAL CONFERENCE ON CHALLENGES IN ENVIRONMENTAL SCIENCE AND COMPUTER ENGINEERING (CESCE 2011), VOL 11, PT A, 2011, 11 : 132 - 138
  • [24] The Review of Outlier Mining Based on Granular Computing
    Liu, Shuang
    Wang, Jiyi
    Xing, Guolin
    2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 462 - 465
  • [25] Combined data mining techniques based patient data outlier detection for healthcare safety
    Gebremeskel, Gebeyehu Belay
    Yi, Chai
    He, Zhongshi
    Haile, Dawit
    INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2016, 9 (01) : 42 - 68
  • [26] Outlier mining based on principal component estimation
    Yang H.
    Yang T.
    Acta Mathematicae Applicatae Sinica, 2005, 21 (2) : 303 - 310
  • [27] Outlier Mining Based on Principal Component Estimation
    Hu Yang
    Acta Mathematicae Applicatae Sinica, 2005, (02) : 303 - 310
  • [28] Similarity detection method of abnormal data in network based on data mining
    Sun, Xiang
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (01) : 155 - 162
  • [29] ODFM: Abnormal Traffic Detection Based on Optimization of Data Feature and Mining
    Wu, Xianzong
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 1104 - 1109
  • [30] Outlier detection based on cluster outlier factor and mutual density
    Zhang Z.
    Qiu J.
    Liu C.
    Zhu M.
    Zhang D.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2314 - 2323