Advertisement

Assessing Data Anomaly Detection Algorithms in Power Internet of Things

  • Zixiang Wang
  • Zhoubin Liu
  • Xiaolu Yuan
  • Yueshen Xu
  • Rui LiEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 268)

Abstract

At present, the data related to the Internet of Things has shown explosive growth, and the importance of data has been greatly improved. Data collection and analysis are becoming more and more valuable. However, a large number of abnormal data will bring great trouble to our research, and even lead people into misunderstandings. Therefore, anomaly detection is particularly necessary and important. The purpose of this paper is to find an efficient and accurate outlier detection algorithm. Our work also analyzes their advantages and disadvantages theoretically. At the same time, the effects of the data set size, number of proximity points, and data dimension on CPU time and precision are discussed. The performance, advantages and disadvantages of each algorithm in dealing with high-dimensional data are compared and analyzed. Finally, the algorithm is used to analyze the actual anomaly data collected from the Internet of Things and analyze the results. The results show that the LOF algorithm can find the abnormal data in the data set in a shorter time and with higher accuracy.

Keywords

Anomaly detection Internet of Things LOF 

Notes

Acknowledgement

This work is partially supported by Project No. 5211DS16001R of State Grid Zhejiang Electric Power Co., Ltd. This work is also supported by the National Natural Science Foundation of China (NSFC) under Grant No. 61502374.

References

  1. 1.
    Lyu, L., Jin, J., Rajasegarar, S., et al.: Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering. IEEE Internet of Things J. 4(5), 1174–1184 (2017)CrossRefGoogle Scholar
  2. 2.
    Kriegel, H.-P., Schubert, M., Zimek, A.: Angle-based outlier detection in high-dimensional data. In: KDD, Las Vegas, Nevada, USA (2008)Google Scholar
  3. 3.
    Breunig, M.M., Kriegel, H.-P., Ng, R.T., et al.: LOF: identifying density-based local outliers. In: ACM MOD, Dallas, TX USA (2000)Google Scholar
  4. 4.
    Taghizadeh, M.J., Parhizkar, R., Garner, P.N., Bourlard, H., Asaei, A.: Ad hoc microphone array calibration: euclidean distance matrix completion algorithm and theoretical guarantees. Sig. Process. 170, 123–140 (2014)Google Scholar
  5. 5.
    Zarpelão, B.B., Miani, R.S., Kawakani, C.T., et al.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017)CrossRefGoogle Scholar
  6. 6.
    Trihinas, D., Pallis, G., Dikaiakos, M.D.: ADMin: adaptive monitoring dissemination for the internet of things. In: IEEE Conference on Computer Communications, INFOCOM 2017, pp. 1–9. IEEE (2017)Google Scholar
  7. 7.
    Gregg, D., David, U.: Parameterizing dose-response models to estimate relative potency functions directly. Toxicol. Sci. 129, 447–455 (2012)CrossRefGoogle Scholar
  8. 8.
    Liu, C.-S.: Reconcile the perfectly elastoplastic model to simulate the cyclic behavior and ratcheting. Int. J. Solids Struct. 43(2), 222–253 (2005)CrossRefGoogle Scholar
  9. 9.
    Kriegel, H.P., Zimek, A.: Angle-based outlier detection in high-dimensional data. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 444–452. ACM (2008)Google Scholar
  10. 10.
    Lu, Y., Qin, X.S.: Multisite rainfall downscaling and disaggregation in a tropical urban area. J. Hydrol. 509, 55–65 (2014)CrossRefGoogle Scholar
  11. 11.
    Le Grand, S., Götz, A.W., Walker, R.C.: SPFP: speed without compromise—a mixed precision model for GPU accelerated molecular dynamics simulations. Comput. Phys. Commun. 184(2), 374–380 (2013)CrossRefGoogle Scholar
  12. 12.
    Polišenská, K., Chiat, S., Comer, A., McKenzie, K.: Semantic effects in sentence recall: the contribution of immediate vs delayed recall in language assessment. J. Commun. Disord. 52, 65–77 (2014)CrossRefGoogle Scholar
  13. 13.
    Feng, D.-C., Chen, F., Xu, W.-L.: Detecting local manifold structure for unsupervised feature selection. Acta Automatica Sinica 40, 2253–2261 (2014)CrossRefGoogle Scholar
  14. 14.
    Zhou, M., Wang, Y., Srivastava, A.K., et al.: Ensemble based algorithm for synchrophasor data anomaly detection. IEEE Trans. Smart Grid (2018)Google Scholar
  15. 15.
    Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18–32 (2014)CrossRefGoogle Scholar
  16. 16.
    Erfani, S.M., Rajasegarar, S., Karunasekera, S., et al.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121–134 (2016)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Zixiang Wang
    • 1
  • Zhoubin Liu
    • 1
  • Xiaolu Yuan
    • 2
  • Yueshen Xu
    • 3
  • Rui Li
    • 3
    Email author
  1. 1.State Grid Zhejiang Electric Power Research InstituteHangzhouChina
  2. 2.RUN CorporationWuxiChina
  3. 3.Xidian UniversityXi’anChina

Personalised recommendations