Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/986537.986634acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

Network flow for outlier detection

Published: 02 April 2004 Publication History

Abstract

Detecting outliers is an important topic in data mining. Sometimes the outliers are more interesting than the rest of the data. Outlier identification has lots of applications, such as intrusion detection, and unusual usage of credit cards or telecommunication services. In this paper, we propose a novel method for outlier identification which is based on network flow. We use the well known Maximum Flow Minimum Cut theorem from graph theory to find the outliers and strong outlier groups. Especially, it works on high dimensional data. This outlier detection occurs in a novel setting: to repair poor quality clusters generated by a clustering algorithm.

References

[1]
J. Han and M. Kamber. Data Mining Concepts and Techniques. Morgan Kaufmann Publishers, 2000.
[2]
W. Jin, A. Tung, and J. Han. Mining Top-n Local Outliers in Large Databases. KDD 2001 San Franciso, CA.
[3]
G. Karypis, R. Aggarwal, V. Kumar, and S. Shekhar. Multilevel Hypergraph Partitioning: Application in VLSI Domain. In Proceedings ACM/IEEE Design Automation Conference, 1997.
[4]
S. Guha, R. Rostogi, and K. Shim. ROCK: A Robust Clustering Algorithms for Categorical Attributes. Information Systems Vol. 25, No. 5, pp. 345--366, 2000.
[5]
S. Even. Graph Algorithms. Computer Science Press, 1979.
[6]
E. Knorr and R. Ng. A Unified Notion of Outliers: Properties and Computation. American Association for Artificial Intelligence.
[7]
G. Flake, S. Lawrence, and C. Giles. Efficient Identification of Web Communities. ACM SIGKDD-2000, pp. 150--160, Boston, MA.

Cited By

View all
  • (2015)Design and development of a prototype application for intrusion detection using data mining2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)10.1109/ICRITO.2015.7359266(1-6)Online publication date: Sep-2015
  • (2004)Outlier detection and evaluation by network flow2004 International Conference on Machine Learning and Applications, 2004. Proceedings.10.1109/ICMLA.2004.1383547(436-442)Online publication date: 2004

Index Terms

  1. Network flow for outlier detection

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ACMSE '04: Proceedings of the 42nd annual ACM Southeast Conference
      April 2004
      485 pages
      ISBN:1581138709
      DOI:10.1145/986537
      • General Chair:
      • Seong-Moo Yoo,
      • Program Chair:
      • Letha Hughes Etzkorn
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 April 2004

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Maximum Flow Minimum Cut
      2. data mining
      3. graph theory
      4. network flow
      5. outlier detection

      Qualifiers

      • Article

      Conference

      ACM SE04
      Sponsor:
      ACM SE04: ACM Southeast Regional Conference 2004
      April 2 - 3, 2004
      Alabama, Huntsville

      Acceptance Rates

      Overall Acceptance Rate 502 of 1,023 submissions, 49%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 22 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)Design and development of a prototype application for intrusion detection using data mining2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)10.1109/ICRITO.2015.7359266(1-6)Online publication date: Sep-2015
      • (2004)Outlier detection and evaluation by network flow2004 International Conference on Machine Learning and Applications, 2004. Proceedings.10.1109/ICMLA.2004.1383547(436-442)Online publication date: 2004

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media