International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014

Outlier Recognition in Clustering

Balaram Krishna Chavali, Sudheer Kumar Kotha

Outlier detection is a fundamental issue in data mining, specifically it has been used to detect and remove anomalous objects from data. Outliers arise due to mechanical faults, changes in system behaviour, fraudulent behaviour, network intrusions or human errors. Firstly, this thesis presents a theoretical overview of outlier detection approaches. A novel outlier detection method is proposed and analyzed, it is called Clustering Outlier Removal (COR) algorithm. It provides efficient outlier detection and data clustering capabilities in the presence of outliers, and based on filtering of the data after clustering process. The algorithm of our outlier detection method is divided into two stages. The first stage provides k-means process. The main objective of the second stage is an iterative removal of objects, which are far away from their cluster centroids. The removal occurs according to a chosen threshold. Finally, we provide experimental results from the application of our algorithm on a KDD Cup1999 datasets to show its effectiveness and usefulness. The empirical results indicate that the proposed method was successful in detecting intrusions and promising in practice. We also compare COR algorithm with other available methods to show its important advantage against existing algorithms in outlier detection.

Keywords: outlier detection, clustering, intrusions

Edition: Volume 3 Issue 4, April 2014

Pages: 253 - 257


How to Cite this Article?

Balaram Krishna Chavali, Sudheer Kumar Kotha, "Outlier Recognition in Clustering", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131369, Volume 3 Issue 4, April 2014, 253 - 257

40 PDF Views | 31 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'outlier detection'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2016 - 2019

A Survey on Outlier Detection Methods

Rajani S Kadam, Prakash R Devale

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1850 - 1856

A Review on Detection of Outliers Over High Dimensional Streaming Data Using Cluster Based Hybrid Approach

Abhishek B. Mankar, Namrata Ghuse

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1188 - 1192

Outlier Detection Based on Surfeit Entropy for Large Scale Categorical Data Set

Neha L. Bagal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1852 - 1856

Survey on Outlier Pattern Detection Techniques for Time-Series Data

Archana N., S. S. Pawar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1787 - 1791

Document Clustering Approach for Forensic Analysis: A Survey

Prachi K. Khairkar, D. A. Phalke

Share this article



Similar Articles with Keyword 'clustering'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 962 - 966

Survey on Various Clustering Techniques in Data Mining

Lavanya.N, N. Deepika

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1660 - 1664

Text Mining: Survey on Techniques and Applications

M. Uma Maheswari, Dr. J. G. R. Sathiaseelan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1598 - 1602

Search Result Optimization using Annotators

Vishal A. Kamble, Amit B. Chougule

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1980 - 1983

A Review on Clustering of Uncertain Data

Manisha Padole, Sonali Bodkhe

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this article



Similar Articles with Keyword 'intrusions'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1215 - 1218

Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique

Swati Sonawale, Roshani Ade

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2631 - 2633

Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan, Ashwini Meshram

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 253 - 257

Outlier Recognition in Clustering

Balaram Krishna Chavali, Sudheer Kumar Kotha

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1209 - 1212

NICE-D: A Modified Approach for Cloud Security

Nikita T. Ramteke, Dr. Yashwant V. Chavan

Share this article
Top