Abnormal Detection Research Based on Outlier Mining

被引:4
|
作者
Zhang, Lei [1 ]
Liu, Changjiang [2 ]
Chen, Yong [3 ]
Lao, Shaowen [4 ]
机构
[1] Hexi Univ, Informat Technol Ctr, Zhangye 734000, Gansu, Peoples R China
[2] Troops 32153 PLA, XuanHua 075100, Hebei, Peoples R China
[3] Army Artillery Training base, XuanHua 075100, Hebei, Peoples R China
[4] Hexi Univ, Informat Technol & Media Inst, Zhangye 734000, Gansu, Peoples R China
关键词
Data mining; Abnormal detection; Outlier Mining;
D O I
10.1109/ICICTA.2018.00009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces the latest development of intrusion detection based on data mining, and studies the key technologies of network intrusion detection based on data mining, especially outlier mining. A anomaly detection model based on outlier mining is proposed. The model firstly preprocesses the data and sets the normal sample set, calculates the outlier score of each sample in the normal sample set, and combines it with the specified outlier value threshold. The normal behavior profile is formed, which can be used as the basis for detection.
引用
收藏
页码:5 / 7
页数:3
相关论文
共 50 条
  • [1] Outlier mining based abnormal machine detection in intelligent maintenance
    Zhang L.
    Cao Q.-X.
    Lee J.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 (06) : 695 - 700
  • [2] Outlier Mining Based Abnormal Machine Detection in Intelligent Maintenance
    张蕾
    曹其新
    李杰
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (06) : 695 - 700
  • [3] Research of Outlier Mining Based Adaptive Intrusion Detection Techniques
    Ke, Fang Yu
    Yan, Fu
    Lin, Zhou Jun
    THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 552 - 555
  • [4] Distributed Intrusion Detection Based on Outlier Mining
    Da, Wei
    Ting, Han Shao
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 343 - 348
  • [5] Research of Local Outlier Mining Algorithm Based on Spark
    Chen, Haipeng
    Zhao, Siqi
    Bao, Han
    Kang, Hui
    PROCEEDINGS FIRST INTERNATIONAL CONFERENCE ON ELECTRONICS INSTRUMENTATION & INFORMATION SYSTEMS (EIIS 2017), 2017, : 73 - 76
  • [6] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [7] An Outlier mining-based method for anomaly detection
    Wu, Nannan
    Shi, Liang
    Jiang, Qingshan
    Weng, Fangfei
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 152 - +
  • [8] Outlier Detection Data Mining of Tax Based on Cluster
    Liu, Bin
    Xu, Guang
    Xu, Qian
    Zhang, Nan
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 1689 - 1694
  • [9] ABNORMAL CROWD EVENT DETECTION BASED ON OUTLIER IN TIME SERIES
    Hsu, Wei-Lieh
    Wang, Yu-Cheng
    Lin, Chih-Lung
    PROCEEDINGS OF 2014 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2014, : 359 - 363
  • [10] Research on Mining and Detection Method of Abnormal Learning Behavior
    Cheng, Yan
    Miao, Yong-chun
    Tan, Ping-fei
    Qu, Yan-wen
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI 2016), 2016, : 566 - 570