Outlier Recognition in Clustering
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 122 | Weekly Hits: ⮙5 | Monthly Hits: ⮙13

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014

Outlier Recognition in Clustering

Balaram Krishna Chavali, Sudheer Kumar Kotha

Outlier detection is a fundamental issue in data mining, specifically it has been used to detect and remove anomalous objects from data. Outliers arise due to mechanical faults, changes in system behaviour, fraudulent behaviour, network intrusions or human errors. Firstly, this thesis presents a theoretical overview of outlier detection approaches. A novel outlier detection method is proposed and analyzed, it is called Clustering Outlier Removal (COR) algorithm. It provides efficient outlier detection and data clustering capabilities in the presence of outliers, and based on filtering of the data after clustering process. The algorithm of our outlier detection method is divided into two stages. The first stage provides k-means process. The main objective of the second stage is an iterative removal of objects, which are far away from their cluster centroids. The removal occurs according to a chosen threshold. Finally, we provide experimental results from the application of our algorithm on a KDD Cup1999 datasets to show its effectiveness and usefulness. The empirical results indicate that the proposed method was successful in detecting intrusions and promising in practice. We also compare COR algorithm with other available methods to show its important advantage against existing algorithms in outlier detection.

Keywords: outlier detection, clustering, intrusions

Edition: Volume 3 Issue 4, April 2014

Pages: 253 - 257

Share this Article

How to Cite this Article?

Balaram Krishna Chavali, Sudheer Kumar Kotha, "Outlier Recognition in Clustering", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131369, Volume 3 Issue 4, April 2014, 253 - 257

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'outlier detection'

Downloads: 104 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1850 - 1856

A Review on Detection of Outliers Over High Dimensional Streaming Data Using Cluster Based Hybrid Approach

Abhishek B. Mankar, Namrata Ghuse

Share this Article

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2016 - 2019

A Survey on Outlier Detection Methods

Rajani S Kadam, Prakash R Devale

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1852 - 1856

Survey on Outlier Pattern Detection Techniques for Time-Series Data

Archana N., S. S. Pawar

Share this Article

Downloads: 109 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1787 - 1791

Document Clustering Approach for Forensic Analysis: A Survey

Prachi K. Khairkar, D. A. Phalke

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1207 - 1210

Out Lier Detection and Clustering Analysis in Data Stream Classification

Neethu S, Sajni Nirmal

Share this Article

Similar Articles with Keyword 'clustering'

Downloads: 74 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patients DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Downloads: 98 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2253 - 2256

Survey on Hubness - Based Clustering Algorithms

Nikita Dhamal, Antara Bhatttacharya

Share this Article

Downloads: 99 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2461 - 2466

A Review of Text Mining Techniques Associated with Various Application Areas

Dr. Shilpa Dang, Peerzada Hamid Ahmad

Share this Article

Downloads: 100 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1742 - 1745

Enhancement of Leach Protocol in Wireless Sensor Network

Bipin Patel, Hardik Kadiya

Share this Article

Downloads: 100 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, Egypt, Volume 3 Issue 11, November 2014

Pages: 1128 - 1132

Keyword Extraction using Clustering and Semantic Analysis

Dr. Mohamed H. Haggag, Dr.Amal Abutabl, Ahmed Basil

Share this Article

Similar Articles with Keyword 'intrusions'

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 955 - 959

A Hybrid Approach of Fuzzy C-mean Clustering and Genetic Algorithm (GA) to Improve Intrusion Detection Rate

Kamaldeep Kaur, Navjot Kaur

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Downloads: 108 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1612 - 1617

Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms

Amol S. Jadhav, Dhanashree Kulkarni

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1215 - 1218

Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique

Swati Sonawale, Roshani Ade

Share this Article

Downloads: 112 | Weekly Hits: ⮙5 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3054 - 3057

A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection

Arpitha J, Nagaraj Naik

Share this Article



Top