Skip to main content

Two-Step Anomaly Detection Approach Using Clustering Algorithm

  • Conference paper
  • First Online:
International Conference on Advanced Computing Networking and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 870))

Abstract

The goal of anomaly detection is to find out the new feature that is different to others. In this paper, we are finding anomalies using a two-step approach. In the first step, the modified k-mean algorithm is used for dividing the data patterns/objects or points into clusters. Data points in the same cluster will be mostly anomalies or all non-anomalies. In second step, constructing a max heap is based on the number of points in the clusters. Points are present in the cluster at the leaf level; they all are distant from the other clusters regarded as anomalies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. V. Chandola, A. Banerjee, V. Kumar, Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)

    Article  Google Scholar 

  2. I. Foster, C. Kesselman, J. Nick, S. Tuecke, The physiology of the grid: an open grid services architecture for distributed systems integration. Technical report, Global Grid Forum (2002)

    Google Scholar 

  3. P. May, H.C. Ehrlich, T. Steinke, ZIB structure prediction pipeline: composing a complex biological workflow through web services, in Euro-Par 2006, vol. 4128, LNCS, ed. by W.E. Nagel, W.V. Walter, W. Lehner (Springer, Heidelberg, 2006), pp. 1148–1158

    Google Scholar 

  4. I. Foster, C. Kesselman, The Grid: Blueprint for a New Computing Infrastructure (Morgan Kaufmann, San Francisco, 1999)

    Google Scholar 

  5. K. Czajkowski, S. Fitzgerald, I. Foster, C. Kesselman, Grid information services for distributed resource sharing, in 10th IEEE International Symposium on High-Performance Distributed Computing (IEEE Press, New York, 2001), pp. 181–184

    Google Scholar 

  6. C.C. Aggarwal, Outlier Analysis (Springer Science and Business Media, 2013)

    Google Scholar 

  7. C.C. Aggarwal, P.S. Yu, Outlier detection for high dimensional data. ACM Sigmoid Record 30(2)

    Article  Google Scholar 

  8. M.-F. Jiang, S.-S. Tseng, C.-M. Su, Two-phase clustering process for outliers detection. Pattern Recogn. Lett. 22(6), 691–700 (2001)

    Article  Google Scholar 

  9. J. Han, J. Pei, M. Kamber, Data Mining Concepts, and Techniques (Elsevier, 2011)

    Google Scholar 

  10. V. Barnett, T. Lewis, Outliers in statistical data (Wiley, Chichester, 1995, 1964), 584 p.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Praphula Kumar Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jain, P.K., Pamula, R. (2019). Two-Step Anomaly Detection Approach Using Clustering Algorithm. In: Kamal, R., Henshaw, M., Nair, P. (eds) International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol 870. Springer, Singapore. https://doi.org/10.1007/978-981-13-2673-8_54

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2673-8_54

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2672-1

  • Online ISBN: 978-981-13-2673-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics