Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/986537.986634acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

Network flow for outlier detection

Published: 02 April 2004 Publication History

Abstract

Detecting outliers is an important topic in data mining. Sometimes the outliers are more interesting than the rest of the data. Outlier identification has lots of applications, such as intrusion detection, and unusual usage of credit cards or telecommunication services. In this paper, we propose a novel method for outlier identification which is based on network flow. We use the well known Maximum Flow Minimum Cut theorem from graph theory to find the outliers and strong outlier groups. Especially, it works on high dimensional data. This outlier detection occurs in a novel setting: to repair poor quality clusters generated by a clustering algorithm.

References

[1]
J. Han and M. Kamber. Data Mining Concepts and Techniques. Morgan Kaufmann Publishers, 2000.
[2]
W. Jin, A. Tung, and J. Han. Mining Top-n Local Outliers in Large Databases. KDD 2001 San Franciso, CA.
[3]
G. Karypis, R. Aggarwal, V. Kumar, and S. Shekhar. Multilevel Hypergraph Partitioning: Application in VLSI Domain. In Proceedings ACM/IEEE Design Automation Conference, 1997.
[4]
S. Guha, R. Rostogi, and K. Shim. ROCK: A Robust Clustering Algorithms for Categorical Attributes. Information Systems Vol. 25, No. 5, pp. 345--366, 2000.
[5]
S. Even. Graph Algorithms. Computer Science Press, 1979.
[6]
E. Knorr and R. Ng. A Unified Notion of Outliers: Properties and Computation. American Association for Artificial Intelligence.
[7]
G. Flake, S. Lawrence, and C. Giles. Efficient Identification of Web Communities. ACM SIGKDD-2000, pp. 150--160, Boston, MA.

Cited By

View all
  • (2015)Design and development of a prototype application for intrusion detection using data mining2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)10.1109/ICRITO.2015.7359266(1-6)Online publication date: Sep-2015
  • (2004)Outlier detection and evaluation by network flow2004 International Conference on Machine Learning and Applications, 2004. Proceedings.10.1109/ICMLA.2004.1383547(436-442)Online publication date: 2004

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ACMSE '04: Proceedings of the 42nd annual ACM Southeast Conference
April 2004
485 pages
ISBN:1581138709
DOI:10.1145/986537
  • General Chair:
  • Seong-Moo Yoo,
  • Program Chair:
  • Letha Hughes Etzkorn
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Maximum Flow Minimum Cut
  2. data mining
  3. graph theory
  4. network flow
  5. outlier detection

Qualifiers

  • Article

Conference

ACM SE04
Sponsor:
ACM SE04: ACM Southeast Regional Conference 2004
April 2 - 3, 2004
Alabama, Huntsville

Acceptance Rates

Overall Acceptance Rate 502 of 1,023 submissions, 49%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Design and development of a prototype application for intrusion detection using data mining2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)10.1109/ICRITO.2015.7359266(1-6)Online publication date: Sep-2015
  • (2004)Outlier detection and evaluation by network flow2004 International Conference on Machine Learning and Applications, 2004. Proceedings.10.1109/ICMLA.2004.1383547(436-442)Online publication date: 2004

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media