Abstract
The main aim of this paper is to detect anomaly in the dataset using the technique Outlier Removal Clustering (ORC) on IRIS dataset. This ORC technique simultaneously performs both K-means clustering and outlier detection. We have also shown the working of ORC technique. The datapoints which is far away from the cluster centroid are considered as outliers. The outliers affect the overall performance and result so the focus is on to detect the outliers in the dataset. Here, we have adopted the preprocessing technique to handle the missing data and categorical variable to get the accurate output. To select the initial centroid we have used Silhouette Coefficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Razak, T.A.: A study on IDS for preventing denial of service attack using outliers techniques. In: Proceedings of the 2016 International Conference on Engineering and Technology (ICETECH), pp. 768–775 (2016)
Zhao, L., Wang, L.: Price trend prediction of stock market using outlier data mining algorithm. In: Proceedings of the Fifth International Conference on Big Data and Cloud Computing (BDCloud), pp. 93–98. IEEE (2015)
Marghny, M.H., Taloba, A.I.: Outlier detection using improved genetic k-means (2011)
Jiang, M.F., Tseng, S.S., Su, C.M.: Two-phase clustering process for outliers detection. Pattern Recogn. Lett. 22(6), 691–700 (2001)
Bansal, R., Gaur, N., Singh, S.N.: Outlier detection: applications and techniques in data mining. In: Proceedings of the 6th International Conference on Cloud System and Big Data Engineering (Confluence), pp. 373–377. IEEE (2016)
Chawla, S., Gionis, A.: k-means: a unified approach to clustering and outlier detection. In: Proceedings of the 2013 SIAM International Conference on Data Mining, Society for Industrial and Applied Mathematics, pp. 189–197 (2013)
Khan, M.A., Pradhan, S.K., Fatima, H.: Applying data mining techniques in cyber crimes. In: Proceedings of the 2nd International Conference on Anti-Cyber Crimes (ICACC), pp. 213–216. IEEE (2017)
Hautamäki, V., Cherednichenko, S., Kärkkäinen, I., Kinnunen, T., and Fränti, P.: Improving k-means by outlier removal. In: Proceedings of the Scandinavian Conference on Image Analysis, pp. 978–987. Springer, Berlin (2005)
Malini, N., Pushpa, M.: Analysis on credit card fraud identification techniques based on KNN and outlier detection. In: Proceedings of the Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 255–258. IEEE (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sarvani, A., Venugopal, B., Devarakonda, N. (2019). Anomaly Detection Using K-means Approach and Outliers Detection Technique. In: Ray, K., Sharma, T., Rawat, S., Saini, R., Bandyopadhyay, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 742. Springer, Singapore. https://doi.org/10.1007/978-981-13-0589-4_35
Download citation
DOI: https://doi.org/10.1007/978-981-13-0589-4_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0588-7
Online ISBN: 978-981-13-0589-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)