Gaussian Distribution-Based Machine Learning Scheme for Anomaly Detection in Healthcare Sensor Cloud

被引:22
作者
Dwivedi, Rajendra Kumar [1 ]
Kumar, Rakesh [2 ]
Buyya, Rajkumar [3 ]
机构
[1] Madan Mohan Malaviya Univ Technol, Dept Informat Technol & Comp Applicat, Gorakhpur, Uttar Pradesh, India
[2] Madan Mohan Malaviya Univ Technol, Dept Comp Sci & Engn, Gorakhpur, Uttar Pradesh, India
[3] Univ Melbourne, Cloud Comp & Distributed Syst CLOUDS Lab, Melbourne, Vic, Australia
关键词
Anomaly Detection; Gaussian Distribution Approach; Machine Learning; Outlier; Self-Organizing Map (SOM); Supervised Learning; Support Vector Machine (SVM); Wireless Sensor Network (WSN); COMPUTATIONAL INTELLIGENCE; OUTLIERS DETECTION; NETWORKS; FRAMEWORK;
D O I
10.4018/IJCAC.2021010103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smart information systems are based on sensors that generate a huge amount of data. This data can be stored in cloud for further processing and efficient utilization. Anomalous data might be present within the sensor data due to various reasons (e.g., malicious activities by intruders, low quality sensors, and node deployment in harsh environments). Anomaly detection is crucial in some applications such as healthcare monitoring systems, forest fire information systems, and other internet of things (IoT) systems. This paper proposes a Gaussian distribution-based supervised machine learning scheme of anomaly detection (GDA) for healthcare monitoring sensor cloud, which is an integration of various body sensors of different patients and cloud. This work is implemented in Python. Use of Gaussian statistical model in the proposed scheme improves precision, throughput, and efficiency. GDA provides 98% efficiency with 3% and 4% improvements as compared to the other supervised learning-based anomaly detection schemes (e.g., support vector machine [SVM] and self-organizing map [SOM], respectively).
引用
收藏
页码:52 / 72
页数:21
相关论文
共 40 条
  • [1] Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
    Abu Alsheikh, Mohammad
    Lin, Shaowei
    Niyato, Dusit
    Tan, Hwee-Pink
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04): : 1996 - 2018
  • [2] Ahmed E., 2016, J BASIC APPL SCI RES, P21
  • [3] Aleksandrova E., 2019, NEXT GENERATION WIRE, P255, DOI [10.4018/978-1-5225-7458-3.ch011, DOI 10.4018/978-1-5225-7458-3.CH011]
  • [4] [Anonymous], 2006, 2006 1 INT C COMM SY
  • [5] [Anonymous], 2015, 10 ASIAN CONTROL C A
  • [6] Avram T, 2007, CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, P166
  • [7] Ayadi A, 2017, INT WIREL COMMUN, P687, DOI 10.1109/IWCMC.2017.7986368
  • [8] Ayadi H, 2015, I C SCI TECH AUTO CO, P722, DOI 10.1109/STA.2015.7505190
  • [9] A next generation emerging technologies roadmap for enabling collective computational intelligence in disaster management
    Bessis, Nik
    Asimakopoulou, Eleana
    Xhafa, Fatos
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (01) : 76 - 85
  • [10] Spatial anomaly detection in sensor networks using neighborhood information
    Bosman, Hedde H. W. J.
    Iacca, Giovanni
    Tejada, Arturo
    Wortche, Heinrich J.
    Liotta, Antonio
    [J]. INFORMATION FUSION, 2017, 33 : 41 - 56