Abnormal Detection Research Based on Outlier Mining

被引:4
|
作者
Zhang, Lei [1 ]
Liu, Changjiang [2 ]
Chen, Yong [3 ]
Lao, Shaowen [4 ]
机构
[1] Hexi Univ, Informat Technol Ctr, Zhangye 734000, Gansu, Peoples R China
[2] Troops 32153 PLA, XuanHua 075100, Hebei, Peoples R China
[3] Army Artillery Training base, XuanHua 075100, Hebei, Peoples R China
[4] Hexi Univ, Informat Technol & Media Inst, Zhangye 734000, Gansu, Peoples R China
关键词
Data mining; Abnormal detection; Outlier Mining;
D O I
10.1109/ICICTA.2018.00009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces the latest development of intrusion detection based on data mining, and studies the key technologies of network intrusion detection based on data mining, especially outlier mining. A anomaly detection model based on outlier mining is proposed. The model firstly preprocesses the data and sets the normal sample set, calculates the outlier score of each sample in the normal sample set, and combines it with the specified outlier value threshold. The normal behavior profile is formed, which can be used as the basis for detection.
引用
收藏
页码:5 / 7
页数:3
相关论文
共 50 条
  • [31] An Abnormal Login Detection Method Based on Local Outlier Factor and Gaussian Mixture Model
    Guo, Wei
    He, Yue
    Chen, He-Xiong
    Hang, Fei-Lu
    Li, Yun-Jie
    International Journal of Network Security, 2023, 25 (02) : 297 - 305
  • [32] Abnormal trajectory detection method based on enhanced density clustering and abnormal information mining
    He M.
    Qiu G.-D.
    Zhou B.
    Liu Q.
    Cao Y.-T.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (12): : 21 - 33
  • [33] Using Distance-Based Outlier Detection Method to Handle the Abnormal Gateway in WSN
    Su, Wei
    Fu, Jingqi
    Wang, Haikuan
    ASIASIM 2012, PT II, 2012, 324 : 151 - 159
  • [34] RETRACTED: Survey of Clustering and Outlier Detection Techniques in Data Mining: A Research Perspective (Retracted Article)
    Devi, R. Delshi Howsalya
    Devi, M. Indra
    ADVANCEMENTS IN AUTOMATION AND CONTROL TECHNOLOGIES, 2014, 573 : 511 - +
  • [35] Outlier detection with data mining techniques and statistical methods
    Orellana, Marcos
    Cedillo, Priscila
    ENFOQUE UTE, 2020, 11 (01): : 56 - 67
  • [36] A Survey for Different Approaches of Outlier Detection in Data Mining
    Chandarana, Dhaval R.
    Dhamecha, Maulik V.
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [37] A comparative study of RNN for outlier detection in data mining
    Williams, G
    Baxter, R
    He, HX
    Hawkins, S
    Gu, LF
    2002 IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2002, : 709 - 712
  • [38] Research on Outlier Mining Algorithm Oriented to Traffic Information
    Xie, Wenge
    Wang, Haihong
    Gu, Xincai
    Guo, Yanfeng
    MATERIALS AND MANUFACTURING, PTS 1 AND 2, 2011, 299-300 : 1312 - 1315
  • [39] A comparative study for outlier detection techniques in data mining
    Abu Bakar, Zuriana
    Mohemad, Rosmayati
    Ahmad, Akbar
    Deris, Mustafa Mat
    2006 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2006, : 360 - +
  • [40] Frequent Pattern Outlier Detection Without Exhaustive Mining
    Giacometti, Arnaud
    Soulet, Arnaud
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2016, PT II, 2016, 9652 : 196 - 207