Abstract
When data mining, there will be a lot of abnormal data, abnormal data refers to data in the data set that is inconsistent with most data or deviates from the normal behavior pattern. In this paper, the KNN (k-Nearest Neighbor) algorithm, the Local Outlier Factor algorithm, and the Isolation Forest algorithm will be used to process the MIT-BIH arrhythmia data set. The KNN algorithm is an Anomaly detection algorithm based on distance but may divide normal data into abnormal data due to the deviation of parameter selection. The improvement proposed in this paper is to add weight to the distance to reduce the probability of division error. The Isolation Forest algorithm divides the data according to the characteristics of the data and then predicts the data to be abnormal or normal data. The improvement proposed in this paper is to first select the features of the data, so that the algorithm can be more accurate when dividing the data, thereby improving the detection. Effect. In terms of visual display of test results, this article selects the Receiver Operating Characteristic Curve graph, which can intuitively show the detection effect of the algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gong, C., Lin, F., Gong, X., Lu, Y.: Intelligent cooperative edge computing in the internet of things. IEEE Internet Things J. 7(10), 9372–9382 (2020)
Lu, W., Meng, F., Wang, S., Zhang, G., Zhang, X., et al.: Graph-based Chinese word sense disambiguation with multi-knowledge integration. Comput. Mater. Continua 61(1), 197–212 (2019)
Zhang, C.K., Yin, A.: Anomaly detection algorithm based on subspace local density estimation. Int. J. Web Serv. Res. 16(3), 1 (2019)
Shi, I., Ammar, G.A., et al.: Predictability of postoperative recurrence on hepatocellular carcinoma through data mining method. Mol. Clin. Oncol. 13(5), 1 (2020)
Lu, Y., Wu, Z.W., Wang, Y., Yu, Y.: Research on abnormal behavior detection method based on KNN algorithm. Comput. Eng. 2007(07), 133–134+138 (2007)
Shi, Y.G., Mei, Y.J., Shi, F.: Application of data mining technology in alarm analysis of communication network. Microcomput. Inf. 2008(18), 159–160+232 (2008)
Zhou, Y.B., He, X.H., Zhang, S.J., Qing, L.B.: A new abnormal behavior detection algorithm. Comput. Eng. Appl. 48(03), 192–194+220 (2012)
Ren, W.W., Zhang, J.F., Di, X.Q.: Anomaly detection algorithm based on CFSFDP. J. Adv. Comput. Intell. Intell. Inform. 24(4), 453–460 (2020)
Song, X.G., Deng, Q.K.: Reading and application of MIT-BIH arrhythmia database. Chin. J. Med. Phys. 2004(04), 230–232 (2004)
Hui, H., Zhou, C., Xu, S., Lin, F.: A novel secure data transmission scheme in the industrial internet of things. China Commun. 17(1), 73–88 (2020)
Xu, D., Wang, Y.J., Meng, Y.L., Zhang, Z.Y.: Improved data anomaly detection method based on Isolation Forest. Comput. Sci. 45(10), 155–159 (2018)
Feng, G.L., Zhou, W.G.: Parallel KNN anomaly detection algorithm based on the Spark platform. Comput. Sci. 45(S2), 349–352+366 (2018)
Zhao, Y.J.: Analysis of common methods of data dimension reduction. Sci. Technol. Innov. Herald 16(32), 118–119 (2019)
Funding
This work is supported by the Higher Education Department of the Ministry of Education Industry-university Cooperative Education Project.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, Y., Liu, F., Li, S., Guo, C. (2021). Research and Implementation of Anomaly Detection Algorithm in Data Mining. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-78612-0_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78611-3
Online ISBN: 978-3-030-78612-0
eBook Packages: Computer ScienceComputer Science (R0)