On the Identification of Decision Boundaries for Anomaly Detection in CPPS

被引:3
|
作者
Li, Peng [1 ]
Niggemann, Oliver [1 ,2 ]
Hammer, Barbara [3 ]
机构
[1] OWL Univ Appl Sci, InIT Inst Ind IT, Lemgo, Germany
[2] Fraunhofer IOSB INA, Lemgo, Germany
[3] Bielefeld Univ, CITEC Ctr Excellence, Bielefeld, Germany
来源
2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT) | 2019年
关键词
ALGORITHM;
D O I
10.1109/ICIT.2019.8754997
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work, a new data-driven approach to anomaly detection in Cyber-Physical-Production-Systems (CPPS) is developed, which uses the geometric structure non-convex hull to build a decision boundary for the classification of new observations. A novel algorithm based on Mixture-of-Experts model is presented to estimate n-dimensional non-convex hulls. Furthermore, a new method is proposed to solve the point in non-convex hull problem. With these two methods in hand, a novel algorithm for anomaly detection is developed. Compared with convex hulls based anomaly detection methods, our approach can handle data sets with arbitrary shapes. Since the presented geometric approach does not make any assumption about either the probability density or the structure of given data, it can be combined with different machine learning algorithms. The effectiveness of this approach is evaluated with real world data collected from wind turbines.
引用
收藏
页码:1311 / 1316
页数:6
相关论文
共 50 条
  • [41] Dynamic Clustering for Event Detection and Anomaly Identification in Video Surveillance
    Rupasinghe, R. A. A.
    Padmasiri, D. A.
    Senanayake, S. G. M. P.
    Godaliyadda, G. M. R. I.
    Ekanayake, M. P. B.
    Wijayakulasooriya, J. V.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2017, : 396 - 401
  • [42] Structural Feature Based Anomaly Detection for Packed Executable Identification
    Ugarte-Pedrero, Xabier
    Santos, Igor
    Bringas, Pablo G.
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2011, 6694 : 230 - 237
  • [43] Viterbi algorithm for intrusion type identification in anomaly detection system
    Koo, JM
    Cho, SB
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 97 - 110
  • [44] Identification of outliers in pollution concentration levels using anomaly detection
    Anandharajan, T. R. V.
    Vignajeth, K. K.
    Hariharan, G. Abhishek
    Jijendiran, R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [45] Symbolic Identification for Anomaly Detection in Aircraft Gas Turbine Engines
    Chakraborty, Subhadeep
    Sarkar, Soumik
    Ray, Asok
    Phoha, Shashi
    2010 AMERICAN CONTROL CONFERENCE, 2010, : 5954 - 5959
  • [46] Anomaly Detection with Attribute Conflict Identification in Bank Customer Data
    Wang, Yuan
    Ng, Vincent
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 445 - 450
  • [47] Research on anomaly identification imaging with continuous advanced detection of excavation
    Xu S.
    Lu W.
    Wang C.
    Lin J.
    Xing F.
    Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2023, 44 (11): : 159 - 175
  • [48] Identification of Shill Bidding for Online Auctions Using Anomaly Detection
    Kolaczek, Grzegorz
    Balcerzak, Slawomir
    NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 111 - 120
  • [49] Language identification of controlled systems: Modeling, control, and anomaly detection
    Martins, JF
    Dente, JA
    Pires, AJ
    Mendes, RV
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2001, 31 (02): : 234 - 242
  • [50] ANOMALY DETECTION AND IDENTIFICATION USING VISUAL TECHNIQUES IN STREAMING VIDEO
    Wanigaaratchi, T. A.
    Vidanagama, V. G. T. N.
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 45 - 51