通信学报 ›› 2020, Vol. 41 ›› Issue (8): 130-140.doi: 10.11959/j.issn.1000-436x.2020119
杨晓晖,刘晓明
修回日期:
2020-04-30
出版日期:
2020-08-25
发布日期:
2020-09-05
作者简介:
杨晓晖(1975- ),男,河北巨鹿人,博士,河北大学教授、硕士生导师,主要研究方向为分布计算、信息安全与可信计算|刘晓明(1993- ),男,河北望都人,河北大学硕士生,主要研究方向为分布式计算与信息安全
基金资助:
Xiaohui YANG,Xiaoming LIU
Revised:
2020-04-30
Online:
2020-08-25
Published:
2020-09-05
Supported by:
摘要:
针对现有离群点检测算法存在参数选取困难、效率差和精度低等问题,提出了基于双向邻居修正的局部异常因子算法。为了解决所提问题,首先提出了基于双向邻居的搜索算法,降低邻居搜索占用时间,然后使用双向邻居的修剪算法减少参数输入以及不必要的异常值计算。同时提出了基于双向邻居的修正因子,并利用反向邻居进一步提高计算精度。实验结果表明,所提算法减少了参数选取,提高了时间效率,同时基于双向邻居的修正因子使算法在合成数据集和UCI数据集上的准确率更高。
中图分类号:
杨晓晖,刘晓明. 基于双向邻居修正的局部异常因子算法[J]. 通信学报, 2020, 41(8): 130-140.
Xiaohui YANG,Xiaoming LIU. Local outlier factor algorithm based on correction of bidirectional neighbor[J]. Journal on Communications, 2020, 41(8): 130-140.
[1] | MALINI N , PUSHPA M . Analysis on credit card fraud identification techniques based on KNN and outlier detection[C]// Third International Conference on Advances in Electrical. Piscataway:IEEE Press, 2017, 255-258. |
[2] | 杨加, 李笑难, 张扬 ,等. 基于大数据分析的校园电子邮件异常行为检测技术研究[J]. 通信学报, 2018,39(z1): 116-123. |
YANG J , LI X N , ZHANG Y ,et al. Abnormal behavior detection for campus email systems based on big data analysis[J]. Journal on Communications, 2018,39(z1): 116-123. | |
[3] | GUO J , HUANG W , WILLIAMS B M . Real time traffic flow outlier detection using short-term traffic conditional variance prediction[J]. Transportation Research Part C:Emerging Technologies, 2015,(50): 160-172. |
[4] | SCHUBERT E , ZIMEK A , KRIEGEL H P . Local outlier detection reconsidered:a generalized view on locality with applications to spatial video,and network outlier detection[J]. Data Mining and Knowledge Discovery, 2014,28(1): 190-237. |
[5] | 琚安康, 郭渊博, 李涛 ,等. 基于网络通信异常识别的多步攻击检测方法[J]. 通信学报, 2019,40(7): 57-66. |
JU A K , GUO Y B , LI T ,et al. Multi-step attack detection method based on network communication anomaly recognition[J]. Journal on Communications, 2019,40(7): 57-66. | |
[6] | KIM G , LEE S , KIM S . A novel hybrid intrusion detection method integrating anomaly detection with misuse detection[J]. Expert Systems with Applications, 2014,41(4): 1690-1700. |
[7] | 丁兆云, 周斌, 贾焰 ,等. 微博中基于统计特征与双向投票的垃圾用户发现[J]. 计算机研究与发展, 2013,50(11): 2336-2348. |
DING Z Y , ZHOU B , JIA Y ,et al. Detecting spammers with a bidirectional vote algorithm based on statistical features in microblogs[J]. Journal of Computer Research and Development, 2013,50(11): 2336-2348. | |
[8] | KONTAKI M , GOUNARIS A , PAPADOPOULOS A N ,et al. Efficient and flexible algorithms for monitoring distance-based outliers over data streams[J]. Information Systems, 2016,55: 37-53. |
[9] | CHEN H , FU Y , ZHENG Y . Survey on big data analysis algorithms for network security measurement[J]. Network and System Security,2017, 1039,4: 128-142. |
[10] | DU H , ZHAO S , ZHANG D ,et al. Novel clustering-based approach for local outlier detection[C]// IEEE International Conference on Computer Communications Workshops. Piscataway:IEEE Press, 2016: 802-811. |
[11] | PEROZZI B , AKOGLU L , IGLESIAS SáNCHEZ P ,et al. Focused clustering and outlier detection in large attributed graphs[C]// Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. New York:ACM Press, 2014: 1346-1355. |
[12] | LIU F T , TING K M , ZHOU Z H . Isolation-based anomaly detection[J]. ACM Transactions on Knowledge Discovery from Data, 2012,6(1): 1-39. |
[13] | WANG P , LI W , GAO Z ,et al. Action recognition from depth maps using deep convolutional neural networks[J]. IEEE Transactions on Human-Machine Systems, 2016,46(4): 498-509. |
[14] | HOULE M E , SCHUBERT E , ZIMEK A . On the correlation between local intrinsic dimensionality and outlierness[J]. International Conference on Similarity Search and Applications, 2018,11223: 177-191. |
[15] | TANG B , HE H . A local density-based approach for local outlier detection[J]. Pattern Recognition Letters, 2017,241: 171-180. |
[16] | BREUNIG M M , KRIEGEL H P , NG R T ,et al. LOF:identifying density-based local outliers[C]// Proceedings of the 2000 ACM SIGMOD international conference on Management of data. New York:ACM Press, 2000: 93-104. |
[17] | HA J , SEOK S , LEE J S . Robust outlier detection using the instability factor[J]. Knowledge-Based Systems, 2014,63: 15-23. |
[18] | JIN W , TUNG A K H , HAN J ,et al. Ranking outliers using symmetric neighborhood relationship[J]. Lecture Notes in Computer Science, 2007,3918: 577-593. |
[19] | ZHU Q , FENG J , HUANG J . Natural neighbor:a self-adaptive neighborhood method without parameter K[J]. Pattern Recognition Letters, 2016,80: 30-36. |
[20] | CHENG D , ZHU Q , HUANG J ,et al. Natural neighbor-based clustering algorithm with local representatives[J]. Knowledge-Based Systems, 2017,123: 238-253. |
[21] | HUANG J , ZHU Q , YANG L ,et al. A non-parameter outlier detection algorithm based on natural neighbor[J]. Knowledge-Based Systems, 2016,92(C): 71-77. |
[22] | YANG L , ZHU Q , HUANG J ,et al. Adaptive edited natural neighbor algorithm[J]. Neurocomputing, 2017,230: 427-433. |
[23] | NING J , CHEN L , ZHOU C ,et al. Parameter k search strategy in outlier detection[J]. Pattern Recognition Letters, 2018,112: 56-62. |
[24] | AUSKALNIS J , PAULAUSKAS N , BASKYS A . Application of local outlier factor algorithm to detect anomalies in computer network[J]. Elektronika Ir Elektrotechnika, 2018,24(3): 96-99. |
[25] | NA G S , KIM D , YU H . DILOF:Effective and memory efficient local outlier detection in data streams[C]// Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. New York:ACM Press, 2018: 1993-2002. |
[26] | YAO H , FU X , YANG Y ,et al. An incremental local outlier detection method in the data stream[J]. Applied Sciences, 2018,8(8): 1248-1256 |
[27] | YANG P , WANG D , WEI Z ,et al. An outlier detection approach based on improved self-organizing feature map clustering algorithm[J]. IEEE Access, 2019,7: 115914-115925. |
[28] | GAO J , JI W , ZHANG L ,et al. Cube-based incremental outlier detection for streaming computing[J]. Information Sciences, 2020,517: 361-376 |
[29] | ZHAO Y , HRYNIEWICKI M K . XGBOD:improving supervised outlier detection with unsupervised representation learning[C]// 2018 International Joint Conference on Neural Networks (IJCNN). Piscataway:IEEE Press, 2018: 1-8. |
[1] | 钱榕, 许建婷, 张克君, 董宏宇, 邢方远. 隐马尔可夫模型的异质网络链接预测方法研究[J]. 通信学报, 2022, 43(5): 214-225. |
[2] | 顾亦然, 姚朱鹏, 杨海根. 融合注意力胶囊的深度因子分解机模型[J]. 通信学报, 2021, 42(10): 130-139. |
[3] | 顾秋阳, 吴宝, 孙兆洋, 池仁勇. 基于改进灰狼优化的复杂网络重要节点识别算法[J]. 通信学报, 2021, 42(6): 72-83. |
[4] | 徐丰力,李勇. 城市环境下的用户移动行为建模概述[J]. 通信学报, 2020, 41(7): 18-28. |
[5] | 顾纯祥,吴伟森,石雅男,李光松. 基于自编码器的未知协议分类方法[J]. 通信学报, 2020, 41(6): 88-97. |
[6] | 邱飞岳,陈博文,陈铁明,章国道. 稀疏诱导流形正则化凸非负矩阵分解算法[J]. 通信学报, 2020, 41(5): 84-95. |
[7] | 闫光辉, 张萌, 罗浩, 李世魁, 刘婷. 融合高阶信息的社交网络重要节点识别算法[J]. 通信学报, 2019, 40(10): 109-118. |
[8] | 吴宾,陈允,孙中川,叶阳东. 联合成对排序的物品推荐模型[J]. 通信学报, 2019, 40(9): 193-206. |
[9] | 杨晓晖,张圣昌. 基于多粒度级联孤立森林算法的异常检测模型[J]. 通信学报, 2019, 40(8): 133-142. |
[10] | 殷晓玲,陈晓江,夏启寿,何娟,张鹏艳,陈峰. 基于智能手机内置传感器的人体运动状态识别[J]. 通信学报, 2019, 40(3): 157-169. |
[11] | 刘浩然,丁攀,郭长江,常金凤,崔静闯. 基于贝叶斯算法的中文垃圾邮件过滤系统研究[J]. 通信学报, 2018, 39(12): 151-159. |
[12] | 张俐,王枞. 基于最大相关最小冗余联合互信息的多标签特征选择算法[J]. 通信学报, 2018, 39(5): 111-122. |
[13] | 李幼军,黄佳进,王海渊,钟宁. 基于SAE和LSTM RNN的多模态生理信号融合和情感识别研究[J]. 通信学报, 2017, 38(12): 109-120. |
[14] | 康岚兰,董文永,宋婉娟,李康顺. 无惯性自适应精英变异反向粒子群忧化算法[J]. 通信学报, 2017, 38(8): 66-78. |
[15] | 章鹏,刘全,钟珊,翟建伟,钱炜晟. 增量式双自然策略梯度的行动者评论家算法[J]. 通信学报, 2017, 38(4): 166-177. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|