Skip to main content

Research and Implementation of Anomaly Detection Algorithm in Data Mining

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12737))

Included in the following conference series:

Abstract

When data mining, there will be a lot of abnormal data, abnormal data refers to data in the data set that is inconsistent with most data or deviates from the normal behavior pattern. In this paper, the KNN (k-Nearest Neighbor) algorithm, the Local Outlier Factor algorithm, and the Isolation Forest algorithm will be used to process the MIT-BIH arrhythmia data set. The KNN algorithm is an Anomaly detection algorithm based on distance but may divide normal data into abnormal data due to the deviation of parameter selection. The improvement proposed in this paper is to add weight to the distance to reduce the probability of division error. The Isolation Forest algorithm divides the data according to the characteristics of the data and then predicts the data to be abnormal or normal data. The improvement proposed in this paper is to first select the features of the data, so that the algorithm can be more accurate when dividing the data, thereby improving the detection. Effect. In terms of visual display of test results, this article selects the Receiver Operating Characteristic Curve graph, which can intuitively show the detection effect of the algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gong, C., Lin, F., Gong, X., Lu, Y.: Intelligent cooperative edge computing in the internet of things. IEEE Internet Things J. 7(10), 9372–9382 (2020)

    Article  Google Scholar 

  2. Lu, W., Meng, F., Wang, S., Zhang, G., Zhang, X., et al.: Graph-based Chinese word sense disambiguation with multi-knowledge integration. Comput. Mater. Continua 61(1), 197–212 (2019)

    Article  Google Scholar 

  3. Zhang, C.K., Yin, A.: Anomaly detection algorithm based on subspace local density estimation. Int. J. Web Serv. Res. 16(3), 1 (2019)

    Article  Google Scholar 

  4. Shi, I., Ammar, G.A., et al.: Predictability of postoperative recurrence on hepatocellular carcinoma through data mining method. Mol. Clin. Oncol. 13(5), 1 (2020)

    Google Scholar 

  5. Lu, Y., Wu, Z.W., Wang, Y., Yu, Y.: Research on abnormal behavior detection method based on KNN algorithm. Comput. Eng. 2007(07), 133–134+138 (2007)

    Google Scholar 

  6. Shi, Y.G., Mei, Y.J., Shi, F.: Application of data mining technology in alarm analysis of communication network. Microcomput. Inf. 2008(18), 159–160+232 (2008)

    Google Scholar 

  7. Zhou, Y.B., He, X.H., Zhang, S.J., Qing, L.B.: A new abnormal behavior detection algorithm. Comput. Eng. Appl. 48(03), 192–194+220 (2012)

    Google Scholar 

  8. Ren, W.W., Zhang, J.F., Di, X.Q.: Anomaly detection algorithm based on CFSFDP. J. Adv. Comput. Intell. Intell. Inform. 24(4), 453–460 (2020)

    Article  Google Scholar 

  9. Song, X.G., Deng, Q.K.: Reading and application of MIT-BIH arrhythmia database. Chin. J. Med. Phys. 2004(04), 230–232 (2004)

    Google Scholar 

  10. Hui, H., Zhou, C., Xu, S., Lin, F.: A novel secure data transmission scheme in the industrial internet of things. China Commun. 17(1), 73–88 (2020)

    Article  Google Scholar 

  11. Xu, D., Wang, Y.J., Meng, Y.L., Zhang, Z.Y.: Improved data anomaly detection method based on Isolation Forest. Comput. Sci. 45(10), 155–159 (2018)

    Google Scholar 

  12. Feng, G.L., Zhou, W.G.: Parallel KNN anomaly detection algorithm based on the Spark platform. Comput. Sci. 45(S2), 349–352+366 (2018)

    Google Scholar 

  13. Zhao, Y.J.: Analysis of common methods of data dimension reduction. Sci. Technol. Innov. Herald 16(32), 118–119 (2019)

    Google Scholar 

Download references

Funding

This work is supported by the Higher Education Department of the Ministry of Education Industry-university Cooperative Education Project.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, Y., Liu, F., Li, S., Guo, C. (2021). Research and Implementation of Anomaly Detection Algorithm in Data Mining. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78612-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78611-3

  • Online ISBN: 978-3-030-78612-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics