Ellipsoidal neighbourhood outlier factor for distributed anomaly detection in resource constrained networks

被引:29
作者
Rajasegarar, Sutharshan [1 ]
Gluhak, Alexander [3 ]
Imran, Muhammad Ali [3 ]
Nati, Michele [3 ]
Moshtaghi, Masud [2 ]
Leckie, Christopher [2 ]
Palaniswami, Marimuthu [1 ]
机构
[1] Univ Melbourne, Dept Elect & Elect Engn, Melbourne, Vic 3010, Australia
[2] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
[3] Univ Surrey, Ctr Commun Syst Res, Guildford GU2 5XH, Surrey, England
基金
英国工程与自然科学研究理事会; 澳大利亚研究理事会;
关键词
Anomaly detection; Outlier factor; Hyperellipsoidal model; Distributed detection; Sensor networks;
D O I
10.1016/j.patcog.2014.04.006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2867 / 2879
页数:13
相关论文
共 32 条
[11]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[12]  
Han J., 2001, Data Mining: Concepts and Techniques
[13]   Intrusion detection for routing attacks in sensor networks [J].
Loo, Chong Eik ;
Ng, Mun Yong ;
Leckie, Christopher ;
Palaniswami, Marimuthu .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2006, 2 (04) :313-332
[14]   An efficient hyperellipsoidal clustering algorithm for resource-constrained environments [J].
Moshtaghi, Masud ;
Rajasegarar, Sutharshan ;
Leckie, Christopher ;
Karunasekera, Shanika .
PATTERN RECOGNITION, 2011, 44 (09) :2197-2209
[15]   Clustering ellipses for anomaly detection [J].
Moshtaghi, Masud ;
Havens, Timothy C. ;
Bezdek, James C. ;
Park, Laurence ;
Leckie, Christopher ;
Rajasegarar, Sutharshan ;
Keller, James M. ;
Palaniswami, Marimuthu .
PATTERN RECOGNITION, 2011, 44 (01) :55-69
[16]  
Nati M, 2013, INT SYMP WIREL
[17]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[18]  
Rajasegarar Sutharshan, 2007, 2007 International Conference on Sensor Technologies and Applications - SensorComm 2007, P158, DOI 10.1109/SENSORCOMM.2007.4394914
[19]  
Rajasegarar S., 2009, DETECTING DATA ANOMA, P231
[20]  
Rajasegarar S., 2014, P IEEE ISSNIP SING