Isaac Scientific Publishing

Frontiers in Signal Processing

Anomaly Detection of Vehicle Data Based on LOF Algorithm

Download PDF (278 KB) PP. 43 - 49 Pub. Date: January 5, 2020

DOI: 10.22606/fsp.2020.41007


  • Mengjia Yang
    College of Electrical & Information Engineering, Southwest Minzu University, Chengdu 610041, China
  • Daji Ergu*
    College of Electrical & Information Engineering, Southwest Minzu University, Chengdu 610041, China


The official vehicle audit is an important issue in the government management, and it is very difficult to detect the potential doubts data in the collected data of official vehicles since most of them are unlabeled data. In this paper, a combination of DBSACN and Local Outlier Factor (LOF) algorithm is proposed for the official vehicle anomaly behavior detection by detecting the abnormal use data of the official vehicle under the same conditions. The detected data is regarded as a doubt data and submitted to the audit department for verification. Since the discrete features of the data set are too much and could not conform to the input type of the algorithm, the features are coded by One-Hot encoding, and a series of operations such as data cleaning and feature calculation are performed, and then compared with DBSCAN, LOF, and isolation forest anomaly detection algorithms. The experimental results show that the proposed algorithm outperforms the isolation forest, LOF and other machine learning algorithms in the anomaly detection of unmarked official vehicle data.


DBSCAN, LOF, anomaly detection, audit of official vehicles


[1] Jiang Ma. Analysis of the current situation and countermeasures of the reform of public institutions’ official vehicles in China [J]. Times finance,2019,(9): 85-86, 90

[2] Deron Lianga; Fengyi Lin and Soushan Wuc. Electronically auditing EDP systems With the support of emerging information technologies[J]. International Journal of Accounting Information Systems, 2001,Vol.2: 130- 147

[3] Jinwei Shao; Jun Lin; Yating Liu; Jia-li Xiao. Discovery of potential audit doubts based on improved Leaders operators [J]. Computer and modernization, 2018,(4): 79-83

[4] Yanna Tan. Study on cluster outlier detection in the field of auditing [D]. Harbin engineering university,2011

[5] Nan Wang; Zizhao Zhang; Xibin Zhao; Quan Miao; Rongrong Ji; Yue Gao. Exploring High-Order Correlations for Industry Anomaly Detection[J].IEEE Transactions on Industrial Electronics,2019,Vol.66(12): 9682-9691

[6] Yang, Jun; Zhou, Chunjie; Yang, Shuanghua; Xu, Haizhou; Hu, Bowen. Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems.[J].IEEE Transactions on Industrial Electronics, 2018,Vol.65(5): 4257-4267

[7] Yingfu Huang; Qiurong Zhang. Identification of Anomaly Behavior of Ships Based on KNN and LOF Combination Algorithm.[J]. AIP Conference Proceedings, 2019,Vol.2073(1): 020090(1-8)

[8] Boddy, Aaron J.; Hurst, William; Mackay, Michael; El Rhalibi, Abdennour. Density-Based Outlier Detection for Safeguarding Electronic patient Record Systems[J]. IEEE ACCESS, 2019,Vol.7: 40285-40294

[9] Ide, T (Ide, Tsuyoshi); Khandelwal, A (Khandelwal, Ankush); Kalagnanam, J (Kalagnanam, Jayant). Sparse Gaussian Markov Random Field Mixtures for Anomaly Detection[J]. 2016 IEEE 16TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2016,: 955-960

[10] Ya-Lin Zhang; Longfei Li; Jun Zhou; Xiaolong Li; Zhi-Hua Zhou. Anomaly Detection with Partially Observed Anomalies[A]. WWW ’18: Companion Proceedings of the Web Conference 2018[C], 2018

[11] Sun, J.; Li, H.. Data mining method for listed companies’ financial distress prediction (Article)[J]. Knowledge- Based Systems, 2008,Vol.21(1): 1-5

[12] Kirkos, E.; Spathis, C.; Manolopoulos, Y.. Data Mining techniques for the detection of fraudulent financial statements (Article)[J]. Expert Systems with Applications, 2007,Vol.32(4): 995-1003

[13] Khattab M. Ali Alheeti; Klaus McDonald-Maier. Intelligent intrusion detection in external communication systems for autonomous vehicles[J]. Systems Science & Control Engineering, 2018,Vol.6(1): 48-56

[14] Chandola, V.; Banerjee, A.; Kumar, V.. Anomaly detection: A survey (Review)[J]. ACM Computing Surveys, 2009,Vol.41(3)

[15] Lin, Chi-Chen; Chiu, An-An; Huang, Shaio Yan; Yen, David C.. Detecting the financial statement fraud: The analysis of the differences between data mining techniques and experts’ judgments[J]. KNOWLEDGE-BASED SYSTEMS, 2015,Vol.89: 459-470

[16] Omid Pourheydari; Hossein Nezamabadi-pour and Zeinab Aazami. Identifying qualified audit opinions by artificial neural networks[J]. African Journal of Business Management,2012,Vol.6(44): 11077-11087

[17] Jiaqi Zhong. Application research of data mining technology in computer audit [D]. Nanjing university of posts and telecommunications, 2017

[18] Cheng Zhang. Research and application of data mining technology in financial audit [D]. Anhui university, 2014

[19] Xiaowei Zhang. Audit evidence acquisition system based on data matching and outlier detection technology [D]. Nanjing university of aeronautics and astronautics, 2009

[20] Renyu Liu. Network anomaly detection algorithm based on outlier detection [D]. Chongqing university, 2018