Application of Maximum Entropy Fuzzy Clustering Algorithm with Soft computing in Migration Anomaly Detection
Abstract
With the continuous growth of data volume, anomaly detection has become an important link in the data processing process. In view of the maximum entropy Fuzzy clustering algorithm, an anomaly detection method combining Soft computing is proposed. During the process, the K-means algorithm was used to construct the algorithm foundation, followed by the establishment of an objective function for maximum entropy calculation and the introduction of the Hilbert Schmidt independence criterion for variable extraction; Then it conducts Data migration and calculates the exception score. The experiment illustrates that the research method can ultimately decrease to 113 in the Iris dataset when conducting convergence curve testing; When conducting accuracy and purity tests, the accuracy and purity of the research method in the MR dataset were 87.7% and 87.6% respectively; The research methods In the Leaf dataset, the standardized Mutual information index reached 0.6837, and the FM index reached 0.3903; The lowest Davies-Bouldin index of the research method in applied analysis is 0.71; The receiver of the research method operates on the characteristic curve with the largest area enclosed by the abscissa. The results indicate that the research method has high accuracy and computational efficiency in data anomaly detection, and can provide effective technical references for anomaly detection.DOI:
https://doi.org/10.31449/inf.v48i17.6537Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







