Skip to main content

Determining Stock Market Anomalies by Using Optimized z-Score Technique on Clusters Obtained from K-Means

  • Conference paper
  • First Online:
Recent Advances in Artificial Intelligence and Data Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1386))

  • 298 Accesses

Abstract

K-means has always been the most efficient technique to detect anomalies on any kind of dataset. It would be interesting to explore whether the algorithm could do marvels when used on a stock market dataset. Given the state-of-the-art methodologies, stock market data is prevailingly the most challenging data to work on, since the data values increase at a fast pace. Additionally, data analysis performed on time series data, taken from stock markets, has gained lot of popularity in recent past. Identification of any kind of anomaly in such dataset could be compelling; since this information can pave the way of growth for companies and investors hoping for higher returns and higher profits at lower risk. The manuscript aims to facilitate detection of such volatility by ascertaining outliers in the stock market data, without any prior knowledge of possible abnormalities. Though, z-score has been used extensively for determining deviations associated with data values for a given distribution, we strive to formulate a similar scoring formula, dev-score, that computes deviation for two-dimensional data (can be extended for more than 2D data as well), after generating clusters using K-means. The manuscript plots clusters for stock market data and identifies those stocks that deviate from their normal value on a particular trading day. It is important to note that the deviations are computed only for specific features of stock market data (volume and fluctuations), and this model can be easily extended on large number of features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M.S. Mahdavinejad, M. Rezvan, M. Barekatain, Machine Learning for Internet of Things Data Analysis: A Survey, vol. 4 (University of Isfahan, Iran Kno.e.sis—Wright State University, USA)

    Google Scholar 

  2. S. Thudumu, P. Branch, J. Jin et al., A comprehensive survey of anomaly detection techniques for high dimensional big data. J Big Data 7, 42 (2020). https://doi.org/10.1186/s40537-020-00320-x

    Article  Google Scholar 

  3. V. Kotu, B. Deshpande, Data Science: Concepts and Practice Published in Cambridge (Morgan Kaufmann Publishers, MA, 2019)

    Google Scholar 

  4. P. Lei, A framework for anomaly detection in maritime trajectory behavior. Knowl Inf Syst 47, 189–214 (2016). https://doi.org/10.1007/s10115-015-0845-4

    Article  Google Scholar 

  5. L. Duan, L. Xu, Y. Liu, J. Lee, Cluster-based outlier detection. Annals Oper. Res. 168, 151–168 (2009). https://doi.org/10.1007/s10479-008-0371-9

    Article  MathSciNet  MATH  Google Scholar 

  6. E.D. Knapp, J.T. Langill, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, Scada, and Other Industrial Control Systems (Waltham, MA: Elsevier, 2015)

    Google Scholar 

  7. A.A. Cárdenas, R. Safavi-Naini, Handbook on Securing Cyber-Physical Critical Infrastructure (2012). https://doi.org/10.1016/B978-0-12-415815-3.00025-X

  8. V. Jyothsna, R.V.V. Prasad, A review of anomaly based intrusion detection systems. Int. J. Comput. Appl. 28(7), 26–35 (August 2011)

    Google Scholar 

  9. D.E. Denning, An intrusion-detection model, in IEEE Transactions on Software Engineering (vol. SE-13, issue no. 2, pp. 222–232) (1987). https://doi.org/10.1109/TSE.1987.232894

  10. S. Misra, O. Osogba, M. Powers, Unsupervised outlier detection techniques for well logs and geophysical data, in Machine learning for surface characterization (Texas A&M University, College Station, TX, United States, 2020). https://doi.org/10.1016/B978-0-12-817736-5.00001-6

  11. U. Habib, G. Zucker, M. Blochle, F. Judex, J. Haase, Outliers detection method using clustering in buildings data, in IECON 2015—41st Annual Conference of the IEEE Industrial Electronics Society, Yokohama (2015, pp. 000694-000700). https://doi.org/10.1109/IECON.2015.7392181

  12. S. Katipamula, M.R. Brambley, Review article: methods for fault detection diagnostics and prognostics for building systems—a review Part I. HVACR Res. 11(1), 3–25 (2005)

    Article  Google Scholar 

  13. S. S. Yadav, V. Vijayakumar, J. Athanesious, Detection of anomalies in traffic scene surveillance, in 2018 Tenth International Conference on Advanced Computing (ICoAC) (Chennai, India, 2018, pp. 286–291). https://doi.org/10.1109/ICoAC44903.2018.8939111

  14. P.M. Ashok Kumar, V. Sathya, V. Vaidehi, Traffic rule violation detection in traffic video surveillance. Int. J. Comput. Sci. Electron. Eng. (IJCSEE) 3(4) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sardar, B.K., Pavithra, S., Sanjay, H.A., Gogoi, P. (2022). Determining Stock Market Anomalies by Using Optimized z-Score Technique on Clusters Obtained from K-Means. In: Shetty D., P., Shetty, S. (eds) Recent Advances in Artificial Intelligence and Data Engineering. Advances in Intelligent Systems and Computing, vol 1386. Springer, Singapore. https://doi.org/10.1007/978-981-16-3342-3_32

Download citation

Publish with us

Policies and ethics