A Deep Similarity Metric Method Based on Incomplete Data for Traffic Anomaly Detection in IoT

被引:16
作者
Kang, Xu [1 ]
Song, Bin [1 ]
Sun, Fengyao [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 01期
基金
中国国家自然科学基金;
关键词
anomaly detection; incomplete data; similarity metric; transfer learning; background modeling; NETWORKS;
D O I
10.3390/app9010135
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In recent years, with the development of the Internet of Things (IoT) technology, a large amount of data can be captured from sensors for real-time analysis. By monitoring the traffic video data from the IoT, we can detect the anomalies that may occur and evaluate the security. However, the number of traffic anomalies is extremely limited, so there is a severe over-fitting problem when using traditional deep learning methods. In order to solve the problem above, we propose a similarity metric Convolutional Neural Network (CNN) based on a channel attention model for traffic anomaly detection task. The method mainly includes (1) A Siamese network with a hierarchical attention model by word embedding so that it can selectively measure similarities between anomalies and the templates. (2) A deep transfer learning method can automatically annotate an unlabeled set while fine-tuning the network. (3) A background modeling method combining spatial and temporal information for anomaly extraction. Experiments show that the proposed method is three percentage points higher than deep convolutional generative adversarial network (DCGAN) and five percentage points higher than AutoEncoder on the accuracy. No more time consumption is needed for the annotation process. The extracted candidates can be classified correctly through the proposed method.
引用
收藏
页数:18
相关论文
共 33 条
  • [1] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [2] Fully-Convolutional Siamese Networks for Object Tracking
    Bertinetto, Luca
    Valmadre, Jack
    Henriques, Joao F.
    Vedaldi, Andrea
    Torr, Philip H. S.
    [J]. COMPUTER VISION - ECCV 2016 WORKSHOPS, PT II, 2016, 9914 : 850 - 865
  • [3] Unsupervised Pixel-Level Domain Adaptation with Generative Adversarial Networks
    Bousmalis, Konstantinos
    Silberman, Nathan
    Dohan, David
    Erhan, Dumitru
    Krishnan, Dilip
    [J]. 30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 95 - 104
  • [4] Carrera D, 2015, IEEE IJCNN
  • [5] Abnormal Event Detection in Videos Using Spatiotemporal Autoencoder
    Chong, Yong Shean
    Tay, Yong Haur
    [J]. ADVANCES IN NEURAL NETWORKS, PT II, 2017, 10262 : 189 - 196
  • [6] A Two Stream Siamese Convolutional Neural Network For Person Re-Identification
    Chung, Dahjung
    Tahboub, Khalid
    Delp, Edward J.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, : 1992 - 2000
  • [7] Dan Wang, 2018, IEEE Communications Magazine, V56, P114, DOI 10.1109/MCOM.2018.1701310
  • [8] Hoang DH, 2018, INT CONF ADV COMMUN, P381, DOI 10.23919/ICACT.2018.8323766
  • [9] High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning
    Erfani, Sarah M.
    Rajasegarar, Sutharshan
    Karunasekera, Shanika
    Leckie, Christopher
    [J]. PATTERN RECOGNITION, 2016, 58 : 121 - 134
  • [10] Fan Y, 2018, ARXIV180511223