Open Access Open Access  Restricted Access Subscription Access

Outlier Analysis

T. Meera

Abstract


The colossal headway and expansion in use of web have expanded the quantity of gatecrashers and programmers throughout the long term. With the developing complexity of digital assaults, it has become important to consolidate the procedures of information mining into network protection. Information mining is one of the new innovations reasonably applied to interruption recognition to distinguish the organization assaults, to decrease the intricacies and to get typical personal conduct standard. In this paper, an exception examination model is presented as a uniform system, which gives the essential plan to understanding and execution of the anomaly recognition approach. This paper proposes an area based strategy for exception recognition, where the Degree of Outlierness (LON) of organization dataset is estimated to distinguish the anomalies, if any. 


Full Text:

PDF

References


Singh, D.K. and Swaroop, V., 2013. Data security and privacy in data mining: research issues & preparation. International Journal of Computer Trends and Technology, 4(2), pp.194-200.

Hawkins, D.M., 1980. Identification of outliers (Vol. 11). London: Chapman and Hall.

Chen, Y., Miao, D. and Zhang, H., 2010. Neighborhood outlier detection. Expert Systems with Applications, 37(12), pp.8745-8749.

Thuraisingham, B., Khan, L., Masud, M.M. and Hamlen, K.W., 2008, December. Data mining for security applications. In 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (Vol. 2, pp. 585-589). IEEE.

Gadal, S.M.A.M. and Mokhtar, R.A., 2017, January. Anomaly detection approach using hybrid algorithm of data mining technique. In 2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE) (pp. 1-6). IEEE.

Vinutha, H.P. and Poornima, 2015, July. A Survey- Comparative Study on Intrusion Detection System. International Journal of Advanced Research in Computer and Communication Engineering (Vol. 4, pp. 410-414).

Qing, Y., Xiaoping, W. and Gaofeng, H., 2010, May. An intrusion detection approach based on data mining. In 2010 2nd International Conference on Future Computer and Communication (Vol. 1, pp. V1-695). IEEE.

Subaira, A.S. and Anitha, P., 2014, January. Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey. In 2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) (pp. 274-280). IEEE.

Kshirsagar, S and Yadav S. R., July 2014. A Survey in different Intrusion Techniques and approaches. International Journal of Scientific Research Engineering & Technology (IJSRET) (Vol 3, pp. 742-747)

Nayak, B.S., 2013. Research on application of intrusion detection system in data mining.


Refbacks

  • There are currently no refbacks.