Anomaly classification in industrial Internet of things: A review

被引:9
作者
Rodriguez, Martha [1 ]
Tobon, Diana P. [2 ]
Munera, Danny [1 ]
机构
[1] Univ Antioquia, Medellin, Colombia
[2] Univ Medellin, Medellin, Colombia
来源
INTELLIGENT SYSTEMS WITH APPLICATIONS | 2023年 / 18卷
关键词
Industrial Internet of things; IIoT; Anomaly detection; Anomaly classification; Context-awareness; Context-information; IOT; CONTEXT; PREDICTION;
D O I
10.1016/j.iswa.2023.200232
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The fourth industrial revolution (Industry 4.0) has the potential to provide real-time, secure, and autonomous manufacturing environments. The Industrial Internet of Things (IIoT) is a powerful tool to make this promise a reality because it can provide enhanced wireless connectivity for data collection and processing in interconnected plants. Implementing IIoT systems entails using heterogeneous technologies, which collect incomplete, unstructured, redundant, and noisy data. This condition raises security flaws and data collection issues that affect the data quality of the systems. One effective way to identify poor-quality data is through anomaly detection systems, which provide specific information that helps to decide whether a device is malfunctioning, a critical event is occurring, or the system's security is being breached. Using early anomaly detection mechanisms prevents the IIoT system from being influenced by anomalies in decision-making. Identifying the origin of the anomaly (e.g., event, failure, or attack) supports the user in making effective decisions about handling the data or identifying the device that exhibits abnormal behavior. However, implementing anomaly detection systems is not easy since various factors must be defined, such as what method to use for the best performance. What information must we process to detect and classify anomalies? Which devices have to be monitored to detect anomalies? Which device of the IIoT system will be in charge of executing the anomaly detection algorithm? Hence, in this paper, we performed a state-of-the-art review, including 99 different articles aiming to identify the answer of various authors to these questions. We also highlighted works on IIoT anomaly detection and classification, used methods, and open challenges. We found that automatic anomaly classification in IIoT is an open research topic, and additional information from the context of the application is rarely used to facilitate anomaly detection.
引用
收藏
页数:13
相关论文
共 132 条
[61]  
Huang Zeyu, 2020, 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), P96, DOI 10.1109/ICBAIE49996.2020.00027
[62]   Detecting cyberattacks using anomaly detection in industrial control systems: A Federated Learning approach [J].
Huong, Truong Thu ;
Bac, Ta Phuong ;
Long, Dao Minh ;
Luong, Tran Duc ;
Dan, Nguyen Minh ;
Quang, Le Anh ;
Cong, Le Thanh ;
Thang, Bui Doan ;
Tran, Kim Phuc .
COMPUTERS IN INDUSTRY, 2021, 132 (132)
[63]   Data quality in internet of things: A state-of-the-art survey [J].
Karkouch, Aimad ;
Mousannif, Hajar ;
Al Moatassime, Hassan ;
Noel, Thomas .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 73 :57-81
[64]   Anomaly Detection for Injection Molding Using Probabilistic Deep Learning [J].
Ketonen, Vili ;
Blech, Jan Olaf .
2021 4TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS, 2021, :70-77
[65]   A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks [J].
Khan, Izhar Ahmed ;
Moustafa, Nour ;
Pi, Dechang ;
Sallam, Karam M. ;
Zomaya, Albert Y. ;
Li, Bentian .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) :11604-11613
[66]  
Kim D, 2018, CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), P67, DOI 10.1109/INFOCT.2018.8356842
[67]   Time-series anomaly detection with stacked Transformer representations and 1D convolutional network [J].
Kim, Jina ;
Kang, Hyeongwon ;
Kang, Pilsung .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 120
[68]   Integrated Generative Model for Industrial Anomaly Detection via Bidirectional LSTM and Attention Mechanism [J].
Kong, Fanhui ;
Li, Jiandiang ;
Jiang, Bin ;
Wang, Huihui ;
Song, Houbing .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :541-550
[69]   A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment [J].
Kozik, Rafal ;
Pawlicki, Marek ;
Choras, Michal .
PATTERN ANALYSIS AND APPLICATIONS, 2021, 24 (04) :1441-1449
[70]   Hybrid neural network framework for detection of cyber attacks at smart infrastructures [J].
Krundyshev, Vasiliy ;
Kalinin, Maxim .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,