Swarm Intelligence and its Application in Abnormal Data Detection

This study addresses swarm intelligence-based approaches in data quality detection. First, three typical swarm intelligence models and their applications in abnormity detection are introduced, including Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Bee Colony Optimization (BCO). Then, it presents three approaches based on ACO, PSO and BCO for detection of attribute outliers in datasets. These approaches use different search strategies on the data items; however, they choose the same fitness function (i.e. the O-measure) to evaluate the solutions, and they make use of swarms of the fittest agents and random moving agents to obtain superior solutions by changing the searching paths or positions of agents. Three algorithms are described and explained, which are efficient by heuristic principles.

[1]  Dervis Karaboga,et al.  AN IDEA BASED ON HONEY BEE SWARM FOR NUMERICAL OPTIMIZATION , 2005 .

[2]  Xingquan Zhu,et al.  Class Noise vs. Attribute Noise: A Quantitative Study , 2003, Artificial Intelligence Review.

[3]  R. Sivakumar,et al.  Ant-based Clustering Algorithms: A Brief Survey , 2010 .

[4]  Christian Blum,et al.  Swarm Intelligence: Introduction and Applications , 2008, Swarm Intelligence.

[5]  S. Sharma,et al.  A New Technique to Increase the Working Performance of the Ant Colony Optimization Algorithm , 2013 .

[6]  Zhihua Cui,et al.  Bio-inspired computation: success and challenges of IJBIC , 2014, Int. J. Bio Inspired Comput..

[7]  Habiba Drias,et al.  Bees Swarm Optimization for Web Association Rule Mining , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[8]  Liang Zhang,et al.  Swarms of Metaheuristic Agents: A Model for Collective intelligence , 2010, 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[9]  Renée J. Miller,et al.  Discovering data quality rules , 2008, Proc. VLDB Endow..

[10]  Marco Dorigo,et al.  Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.

[11]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[12]  Gillian Dobbie,et al.  A swarm intelligence based clustering approach for outlier detection , 2010, IEEE Congress on Evolutionary Computation.

[13]  Janice I. Glasgow,et al.  Swarm Intelligence: Concepts, Models and Applications , 2012 .

[14]  D. Pham,et al.  THE BEES ALGORITHM, A NOVEL TOOL FOR COMPLEX OPTIMISATION PROBLEMS , 2006 .

[15]  Zulaiha Ali Othman,et al.  Bees algorithm for feature selection in network anomaly detection , 2012 .

[16]  Juan Luis Fernández-Martínez,et al.  A Brief Historical Review of Particle Swarm Optimization (PSO) , 2012 .

[17]  Mohammad Saniee Abadeh,et al.  A Boosting Ant-Colony Optimization Algorithm for Computer Intrusion Detection , 2022 .

[18]  Xin-She Yang,et al.  A framework for self-tuning optimization algorithm , 2013, Neural Computing and Applications.

[19]  Luca Maria Gambardella,et al.  Ant Algorithms for Discrete Optimization , 1999, Artificial Life.

[20]  Jing Wang,et al.  Swarm Intelligence in Cellular Robotic Systems , 1993 .

[21]  Yuhui Shi,et al.  Handbook of Swarm Intelligence , 2011 .

[22]  Vic Barnett,et al.  Outliers in Statistical Data , 1980 .

[23]  X S Yang Special Issue on Metaheuristics and swarm intelligence in engineering and industry (Editorial) , 2012 .

[24]  Lukasz Ciszak,et al.  Application of clustering and association methods in data cleaning , 2008, 2008 International Multiconference on Computer Science and Information Technology.

[25]  Baldo Faieta,et al.  Diversity and adaptation in populations of clustering ants , 1994 .

[26]  Ajith Abraham,et al.  ANTIDS: Self Orga nized Ant-Based C lustering Model for Intrusion Det ection System , 2004, WSTST.

[27]  Zhihua Cui,et al.  Bio-inspired Computation: Theory and Applications , 2014, J. Multiple Valued Log. Soft Comput..

[28]  Georgios Kambourakis,et al.  Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..

[29]  Bosheng Song,et al.  An Overview of Membrane Computing , 2012 .

[30]  Mong-Li Lee,et al.  Correlation-Based Detection of Attribute Outliers , 2007, DASFAA.

[31]  Chin-Chuan Han,et al.  Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis , 2009, 43rd Annual 2009 International Carnahan Conference on Security Technology.