{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:46:54Z","timestamp":1777704414533,"version":"3.51.4"},"reference-count":17,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T00:00:00Z","timestamp":1532563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,10,27]]},"abstract":"<jats:p>At present, network abnormal data detection algorithm has low efficiency and accuracy, and the false negative rate is very high. Therefore, the location accuracy of abnormal data is not ideal. An intelligent detection method of network abnormal data based on space-time nearest neighbor and likelihood ratio test was proposed. The time interval adjustment algorithm based on the change smoothness judgement strategy and the adaptive data change rule was used to adaptively adjust data acquisition time interval according to network performance parameters and achieve network data acquisition. The grid partition was used to convert source data points into appropriate granularity to complete the data preprocessing. Based on the maximum a posteriori probability, we selected the measured values of data to be detected at several moments as the time nearest neighbor points. The abnormal degree of data was quantified. Meanwhile, the likelihood ratio test was used to determine whether the data was abnormal. The abnormal alarm information was aggregated. All alarm information was arranged according to the size. The two alarm times with maximum difference value are used as the boundary, and the multi-point dislocation combined abnormal location method was used to locate the detection result. Experiment results show that the average detection time of proposed algorithm is 0.21 s. The average false negative rate is 2.8%. The accuracy of abnormal data detection and the positioning accuracy are high. The proposed algorithm can detect network abnormal data efficiently, which lays a foundation for the development of this field.<\/jats:p>","DOI":"10.3233\/jifs-169756","type":"journal-article","created":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T19:26:34Z","timestamp":1532719594000},"page":"4361-4371","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["An algorithm for intelligent detection of network abnormal data in dynamic data environment"],"prefix":"10.1177","volume":"35","author":[{"given":"Li","family":"Ran","sequence":"first","affiliation":[{"name":"Network and Educational Technology Center, Jinan University, Guangzhou, China"}]},{"given":"Yizhou","family":"He","sequence":"additional","affiliation":[{"name":"School of Management, Jinan University, Guangzhou, China"}]},{"given":"P.A.","family":"Ludwig","sequence":"additional","affiliation":[{"name":"University Southampton, Southampton, Hants, England"}]}],"member":"179","published-online":{"date-parts":[[2018,7,26]]},"reference":[{"issue":"1","key":"e_1_3_2_2_2","first-page":"434","article-title":"Abnormal data mining algorithm in complex network data flow simulation","volume":"33","author":"Dong B.Q.","year":"2016","unstructured":"DongB.Q. and PengJ.J., Abnormal data mining algorithm in complex network data flow simulation, Computer Simulation33(1) (2016),434\u2013437.","journal-title":"Computer Simulation"},{"issue":"12","key":"e_1_3_2_3_2","first-page":"69","article-title":"Network anomaly detection model based on intrusion feature selection","volume":"40","author":"Mi H.","year":"2017","unstructured":"MiH. and YangX.B., Network anomaly detection model based on intrusion feature selection, Modern Electronics Technique40(12) (2017),69\u201371.","journal-title":"Modern Electronics Technique"},{"issue":"7","key":"e_1_3_2_4_2","first-page":"163","article-title":"Optical fiber network abnormal data detection based on improved genetic algorithm","volume":"32","author":"Xu P.","year":"2016","unstructured":"XuP. and ZhangJ.D., Optical fiber network abnormal data detection based on improved genetic algorithm, Bulletin of Science and Technology32(7) (2016),163\u2013166.","journal-title":"Bulletin of Science and Technology"},{"issue":"4","key":"e_1_3_2_5_2","first-page":"1137","article-title":"New network anomaly detection using transfer learning and D-S theory","volume":"33","author":"Zhao X.J.","year":"2016","unstructured":"ZhaoX.J., LiuY. and SunJ., New network anomaly detection using transfer learning and D-S theory, Application Research of Computers33(4) (2016),1137\u20131140.","journal-title":"Application Research of Computers"},{"issue":"2","key":"e_1_3_2_6_2","first-page":"49","article-title":"Network anomaly detection model based on information gain feature selection","volume":"36","author":"Liu R.J.","year":"2016","unstructured":"LiuR.J., JiaB. and XinY., Network anomaly detection model based on information gain feature selection, Journal of Computer Applications36(s2) (2016),49\u201353.","journal-title":"Journal of Computer Applications"},{"issue":"5","key":"e_1_3_2_7_2","first-page":"1269","article-title":"Anomaly detection of network state based on data mining","volume":"55","author":"Zhou P.","year":"2017","unstructured":"ZhouP. and XiongY.Y., Anomaly detection of network state based on data mining, Journal of Jilin University(Science Edition)55(5) (2017),1269\u20131273.","journal-title":"Journal of Jilin University(Science Edition)"},{"issue":"8","key":"e_1_3_2_8_2","first-page":"1829","article-title":"An anomaly detection method of wireless sensor network based on multi-modals data stream","volume":"40","author":"Fei H.","year":"2017","unstructured":"FeiH., XiaoF., LiG.H., et al., An anomaly detection method of wireless sensor network based on multi-modals data stream, Chinese Journal of Computers40(8) (2017),1829\u20131842.","journal-title":"Chinese Journal of Computers"},{"issue":"3","key":"e_1_3_2_9_2","first-page":"611","article-title":"Recognition of abnormal behor based on data of public opinion on the web","volume":"53","author":"Hao Y.Z.","year":"2016","unstructured":"HaoY.Z., ZhengQ.H., ChenY.P., et al., Recognition of abnormal behor based on data of public opinion on the web, Journal of Computer Research and Development53(3) (2016),611\u2013620.","journal-title":"Journal of Computer Research and Development"},{"issue":"9","key":"e_1_3_2_10_2","first-page":"136","article-title":"Network anomaly detection model based on time-varying weighted markov chain","volume":"44","author":"Wang X.","year":"2017","unstructured":"WangX., XiY. and LiQ.M., Network anomaly detection model based on time-varying weighted markov chain, Computer Science44(9) (2017),136\u2013141.","journal-title":"Computer Science"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1515\/pomr-2017-0110"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sjbs.2016.09.005"},{"issue":"1","key":"e_1_3_2_13_2","first-page":"54","article-title":"A novel image retrieval based on rectangular spatial histograms of visual words","volume":"45","author":"Mehmood Z.","year":"2018","unstructured":"MehmoodZ., AnwarS.M. and AltafM., A novel image retrieval based on rectangular spatial histograms of visual words, Kuwait Journal of Scienc45(1) (2018),54\u201369.","journal-title":"Kuwait Journal of Scienc"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720502.2015.1026463"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2016.1183314"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.3934\/dcdss.2018042"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2016.1.00001"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2016.1.00012"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169756","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169756","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:09Z","timestamp":1777455669000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,26]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10,27]]}},"alternative-id":["10.3233\/JIFS-169756"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169756","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,26]]}}}