Outlier Recognition in Clustering
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014

Outlier Recognition in Clustering

Balaram Krishna Chavali, Sudheer Kumar Kotha

Outlier detection is a fundamental issue in data mining, specifically it has been used to detect and remove anomalous objects from data. Outliers arise due to mechanical faults, changes in system behaviour, fraudulent behaviour, network intrusions or human errors. Firstly, this thesis presents a theoretical overview of outlier detection approaches. A novel outlier detection method is proposed and analyzed, it is called Clustering Outlier Removal (COR) algorithm. It provides efficient outlier detection and data clustering capabilities in the presence of outliers, and based on filtering of the data after clustering process. The algorithm of our outlier detection method is divided into two stages. The first stage provides k-means process. The main objective of the second stage is an iterative removal of objects, which are far away from their cluster centroids. The removal occurs according to a chosen threshold. Finally, we provide experimental results from the application of our algorithm on a KDD Cup1999 datasets to show its effectiveness and usefulness. The empirical results indicate that the proposed method was successful in detecting intrusions and promising in practice. We also compare COR algorithm with other available methods to show its important advantage against existing algorithms in outlier detection.

Keywords: outlier detection, clustering, intrusions

Edition: Volume 3 Issue 4, April 2014

Pages: 253 - 257

Share this Article

How to Cite this Article?

Balaram Krishna Chavali, Sudheer Kumar Kotha, "Outlier Recognition in Clustering", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131369, Volume 3 Issue 4, April 2014, 253 - 257

63 PDF Views | 45 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'outlier detection'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 253 - 257

Outlier Recognition in Clustering

Balaram Krishna Chavali, Sudheer Kumar Kotha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1850 - 1856

A Review on Detection of Outliers Over High Dimensional Streaming Data Using Cluster Based Hybrid Approach

Abhishek B. Mankar, Namrata Ghuse

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2016 - 2019

A Survey on Outlier Detection Methods

Rajani S Kadam, Prakash R Devale

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1787 - 1791

Document Clustering Approach for Forensic Analysis: A Survey

Prachi K. Khairkar, D. A. Phalke

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1285 - 1288

Online Anomaly Detection under Over-sampling PCA

Y Srilakshmi, D Ratna Kishore

Share this Article

Similar Articles with Keyword 'clustering'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patient's DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 872 - 877

Ranking and Clustering of Software Cost Estimation Models

Vijaya Wable, S. M. Shinde

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2461 - 2466

A Review of Text Mining Techniques Associated with Various Application Areas

Dr. Shilpa Dang, Peerzada Hamid Ahmad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1569 - 1573

Survey on Parallel Comparison of Text Document with Input Data Mining and VizSFP

Priyanka P. Palsaniya, D. C. Dhanwani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1063 - 1066

A Survey on Automatic Fault Detection Framework for Cloud based Application

Kshitija Nandgaonkar, Swarupa Kamble

Share this Article

Similar Articles with Keyword 'intrusions'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1215 - 1218

Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique

Swati Sonawale, Roshani Ade

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 253 - 257

Outlier Recognition in Clustering

Balaram Krishna Chavali, Sudheer Kumar Kotha

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2631 - 2633

Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan, Ashwini Meshram

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 419 - 427

Construction of an Intrusion Relieved Communication Channel using a Hybrid Optimized Algorithm

R. Reshma, S.K. Srivatsa

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article
Top