Skip to main content
Log in

HaarAE: an unsupervised anomaly detection model for IOT devices based on Haar wavelet transform

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Given the shortcomings of the existing anomaly detection methods based on IoT devices, including insufficient feature extraction, poor model fitting effect and low accuracy, this paper proposes an unsupervised IoT device traffic anomaly detection model called HaarAE, which introduces Haar wavelet transform to enhance the feature expression of original data and improve the model’s ability to identify anomalies. The convolutional autoencoder was used to construct the network structure, the memory module is introduced to increase the reconstruction error, and the ConvLSTM layer was added to the encoder to extract the temporal characteristics of the data. The output of each layer of decoder is cascaded with the output of the corresponding ConvLSTM layer, so that the decoder can obtain more coding information of each layer to reconstruct the original data and enhance the fitting ability of the model. Experiments on public datasets and real traffic datasets indicate that compared to the mainstream unsupervised models, HaarAE improves the anomaly detection effect.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Kaur H, Singh G, Minhas J (2013) A review of machine learning based anomaly detection techniques. Int J Comput Appl Technol Res 2:185–187

    Google Scholar 

  2. Shon T, Moon J (2007) A hybrid machine learning approach to network anomaly detection. Inform Sci 177:3799–3821

    Article  Google Scholar 

  3. Shon T, Kim Y, Lee C, Moon J (2005) A machine learning framework for network anomaly detection using svm and ga. In: Information assurance workshop, IAW05. Proceedings from the sixth annual IEEE SMC, pp 176–183

  4. Kong L, Huang G, Wu K (2017) Identification of Abnormal Network Traffic Using Support Vector Machine. In: 2017 18th International conference on parallel and distributed computing, applications and technologies(PDCAT). IEEE Computer Society

  5. Shafiq M, Yu X, Wang D (2018) Network Traffic Classification Using Machine Learning Algorithms[J]. Adv Intell Syst Comput 686:621–627

    Google Scholar 

  6. Vu L, Hoang VT, Quang UN et al (2018) Time series analysis for encrypted traffic classification: a deep learning approach. In: 18th International symposium on communications and information technologies(ISCIT), pp 121—126

  7. Radford BJ et al (2018) Network traffic anomaly detection using recurrent neural networks

  8. Zou Z, Ge J, Zheng H et al (2018) Encrypted traffic classification with a convolutional lonG Shorterm memory neural network. IEEE 20th International Conference on High Performance Computing and Communications

  9. Bengio Y, Lamblin P, Popovici D, Larochelle H (2007) Greedy layer-wise training of deep networks. In: Advances in neural information processing systems, pp 153–160

  10. Nguyen QP, Lim KW, Divakaran DM, Low KH, Chan MC (2019) Gee: a gradient-based explainable variational autoencoder for network anomaly detection. IEEE

  11. Mirsky Y, Doitshman T, Elovici Y, Shabtai A (2018) Kitsune: an ensemble of autoencoders for online network intrusion detection

  12. Akcay S, Atapour-Abarghouei A, Breckon TP (2018) Ganomaly: Semisupervised anomaly detection via adversarial training. arXiv:1805.06725

  13. Zenati H, Foo CS, Lecouat B, Manek G, Chandrasekhar VR (2018) Efficient gan-based anomaly detection, arXiv:1802.06222

  14. Mikolov T, Karafiát M, Burget L, Černock‘y J, Khudanpur S (2010) Recurrent neural network based language model. In: Eleventh annual conference of the international speech communication association

  15. He Y, Zhao J (2019) Temporal convolutional networks for anomaly detection in time series. Journal of Physics: Conference Series

  16. Chen Y, Jiang H, Li C, Jia X, Ghamisi P (2016) Deep feature extraction and classification of hyperspectral images based on convolutional neural networks. IEEE Trans Geosci Remote Sens 54:6232–6251

    Article  Google Scholar 

  17. Fujieda S, Takayama K, Hachisuka T (2018) Wavelet Convolutional Neural Networks. arXiv:1805.08620

  18. Glafcos (2006) Fourier analysis. English. China Machine Press

  19. De Livera AM, Hyndman RJ, Snyder RD (2011) Snyder Forecasting time series with complex seasonal patterns using exponential smoothing. J Am Stat Assoc 106:1513–1527

    Article  MATH  Google Scholar 

  20. Wang Y (2015) Face recognition based on fractional Fourier transform. Doctoral discrimination, Zhengzhou University

  21. Li T, Li Q, Zhu S, Ogihara M (2002) A survey on wavelet applications in data mining. ACM SIGKDD Explorations Newsl 4:49–68

    Article  Google Scholar 

  22. Zhao Y, Shen Y, Zhu Y, Yao J (2018) Forecasting wavelet transformed time series with attentive neural networks. In: 2018 IEEE international conference on data mining (ICDM). IEEE pp 1452–1457

  23. Yuan B, Chen W, Fei J, Long M, Yuan L (2019) Waveletfcnn: a deep time series classification model for wind turbine blade icing detection. Machine Learning

  24. Ma B, Jia J, Dong G, Hong Z, Lu G (2021) Wagan: industrial control sensor data anomaly detection method based on wavelet transform and attention mechanism. Journal of Chinese Computer Systems

  25. Zhang X, Cheng Z, Zhang X, Liu H (2021) Posterior promoted GAN with Distribution discriminator for unsupervised image synthesis. IEEE Conference on Computer Vision and Pattern Recognition(CVPR)

  26. Hou J, Zhang Y, Zhong Q, et al. (2021) Divide-and-assemble: learning block-wise memory for unsupervised anomaly detection. IEEE International Conference on Computer Vision(ICCV)

  27. Liu C-L (2010) A tutorial of the wavelet transform. Taiwan, National Taiwan University(NTUEE) Press

  28. Gong D, Liu L, Le V, et al. (2020) Memorizing normality to detect anomaly: memory-augmented deep Autoencoder for unsupervised anomaly detection. In: 2019 IEEE/CVF international conference on computer vision (ICCV). IEEE

  29. Zhang C, Song D, Chen Y, Feng X, Lumezanu C (2018) A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. 10.48550/arXiv:1811.08055

  30. Chollet, Francois, et al. (2015) Keras, GitHub. https://github.com/keras-team/keras

  31. Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv:1412.6980

  32. Hamza A, Gharakheili HH, Benson TA, Sivaraman V (2019) Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity, the 2019. ACM Symposium, pp 36–48

  33. Song Q (2018) Deep Autoencoding gaussian mixture model for unsupervised anomaly detection. ICLR

  34. Li Z, Zhao Y, Han J, et al (2021) Multivariate time series anomaly detection and interpretation using hierarchical inter-metric and temporal embedding. KDD’21: proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining

  35. Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th international conference on machine learning (ICML-10), pp 807–814

  36. Zhou B, Khosla A, Lapedriza A, Oliva A, Torralba A (2016) Learning deep features for discriminative localization. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2921–2929

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China, under Grant No. 62162026, the Science and Technology Key Research and Development Program of Jiangxi Province, under Grant No. 20202BBEL53004 and Science and Technology Project supported by education department of Jiangxi Province, under Grant No. GJJ210611.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinlei Li.

Ethics declarations

Conflict of Interests

All the authors do not have any possible conflicts of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xie, X., Li, X., Xu, L. et al. HaarAE: an unsupervised anomaly detection model for IOT devices based on Haar wavelet transform. Appl Intell 53, 18125–18137 (2023). https://doi.org/10.1007/s10489-023-04449-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-023-04449-z

Keywords

Navigation