Anomaly Detection in Multivariate Time Series Using Fuzzy AdaBoost and Dynamic Naive Bayesian Classifier

被引:0
作者
Tripathi, Achyut Mani [1 ]
Baruah, Rashmi Dutta [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Comp Sci & Engn, Gauhati 781039, India
来源
2019 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC) | 2019年
关键词
HIDDEN MARKOV-MODELS; FAULT-DETECTION; RECOGNITION; ALGORITHM; NETWORKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a novel method to detect anomaly using Fuzzy AdaBoost and Dynamic Naive Bayesian classifier. Dynamic Naive Bayesian Classifier (DNBC) is an extension of Hidden Markov Models (HMM) that is used here to model multivariate observation sequences typically generated from multiple sensors associated to monitoring processes. The Fuzzy AdaBoost (FAB) method is used for ensembling multiple DNBCs to classify an instance as an anomaly. FAB needs Footprint of Uncertainty (FOU) of error that is further used to figure out the misclassification error and update weights of the data samples required during the boosting process. Here, we introduce an approach to initialize the intervals of FOU using the statistical assets of data that belongs to the normal class. The efficacy of the proposed method is demonstrated through a case study on a stuck pipe problem that occurs during oil well drilling process.
引用
收藏
页码:1938 / 1944
页数:7
相关论文
共 33 条
[1]   Unsupervised real-time anomaly detection for streaming data [J].
Ahmad, Subutai ;
Lavin, Alexander ;
Purdy, Scott ;
Agha, Zuha .
NEUROCOMPUTING, 2017, 262 :134-147
[2]  
Avilés-Arriaga HH, 2011, J APPL RES TECHNOL, V9, P81
[3]  
Avilés-Arriaga HH, 2002, J INTELL FUZZY SYST, V12, P243
[4]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[5]  
Burduk Robert, 2012, Intelligent Data Engineering and Automated Learning - IDEAL 2012. Proceedings 13th International Conference, P794, DOI 10.1007/978-3-642-32639-4_94
[6]  
Caithness N., 2018, ARXIV180402998
[7]  
Chamkalani A., 2013, SPE UNC GAS C EXH
[8]  
Chen Y.S., 2009, CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, P3, DOI DOI 10.1145/1599272.1599276
[9]  
Cho SJ, 2003, PROC INT CONF DOC, P207
[10]  
Esmael B, 2012, LECT NOTES COMPUT SC, V7336, P392, DOI 10.1007/978-3-642-31128-4_29