Pipeline Rupture Detection Based on Machine Learning and Pattern Recognition

Author(s):  
Martin Di Blasi ◽  
Zhan Li

Pipeline ruptures have the potential to cause significant economic and environmental impact in a short period of time, therefore it is critical for pipeline operators to be able to promptly detect and respond to them. Public stakeholder expectations are high and an evolving expectation is that the response to such events be automated by initiating an automatic pipeline shutdown upon receipt of rupture alarm. These types of performance expectations are challenging to achieve with conventional, model-based, leak-detection systems (i.e. CPM–RTTMs) as the reliability measured in terms of the false alarm rate is typically too low. The company has actively participated on a pipeline-industry task force chaired by the API Cybernetics committee, focused on the development of best practices in the area of Rupture Recognition and Response. After API’s release of the first version of a Rupture Recognition and Response guidance document in 2014, the company has initiated development of its own internal Rupture Recognition Program (RRP). The RRP considers several rupture recognition approaches simultaneously, ranging from improvements to existing CPM leak detection to the development of new SCADA based rupture detection system (RDS). This paper will provide an overview of a specific approach to rupture detection based on the use of machine learning and pattern recognition techniques applied to SCADA data.

Author(s):  
Nicole Gailey ◽  
Noman Rasool

Canada and the United States have vast energy resources, supported by thousands of kilometers (miles) of pipeline infrastructure built and maintained each year. Whether the pipeline runs through remote territory or passing through local city centers, keeping commodities flowing safely is a critical part of day-to-day operation for any pipeline. Real-time leak detection systems have become a critical system that companies require in order to provide safe operations, protection of the environment and compliance with regulations. The function of a leak detection system is the ability to identify and confirm a leak event in a timely and precise manner. Flow measurement devices are a critical input into many leak detection systems and in order to ensure flow measurement accuracy, custody transfer grade liquid ultrasonic meters (as defined in API MPMS chapter 5.8) can be utilized to provide superior accuracy, performance and diagnostics. This paper presents a sample of real-time data collected from a field install base of over 245 custody transfer grade liquid ultrasonic meters currently being utilized in pipeline leak detection applications. The data helps to identify upstream instrumentation anomalies and illustrate the abilities of the utilization of diagnostics within the liquid ultrasonic meters to further improve current leak detection real time transient models (RTTM) and pipeline operational procedures. The paper discusses considerations addressed while evaluating data and understanding the importance of accuracy within the metering equipment utilized. It also elaborates on significant benefits associated with the utilization of the ultrasonic meter’s capabilities and the importance of diagnosing other pipeline issues and uncertainties outside of measurement errors.


Author(s):  
Renan Martins Baptista

This paper describes procedures developed by PETROBRAS Research & Development Center to assess a software-based leak detection system (LDS) for short pipelines. These so-called “Low Complexity Pipelines” are short pipeline segments with single-phase liquid flow. Detection solutions offered by service companies are frequently designed for large pipeline networks, with batches and multiple injections and deliveries. Such solutions are sometimes impractical for short pipelines, due to high cost, long tuning procedures, complex instrumentation and substantial computing requirements. The approach outlined here is a corporate approach that optimizes a LDS for shorter lines. The two most popular implemented techniques are the Compensated Volume Balance (CVB), and the Real Time Transient Model (RTTM). The first approach is less accurate, reliable and robust when compared to the second. However, it can be cheaper, simpler, faster to install and very effective, being marginally behind the second one, and very cost-efective. This paper describes a procedure to determine whether one can use a CVB in a short pipeline.


Author(s):  
Yogita Hande ◽  
Akkalashmi Muddana

Presently, the advances of the internet towards a wide-spread growth and the static nature of traditional networks has limited capacity to cope with organizational business needs. The new network architecture software defined networking (SDN) appeared to address these challenges and provides distinctive features. However, these programmable and centralized approaches of SDN face new security challenges which demand innovative security mechanisms like intrusion detection systems (IDS's). The IDS of SDN are designed currently with a machine learning approach; however, a deep learning approach is also being explored to achieve better efficiency and accuracy. In this article, an overview of the SDN with its security concern and IDS as a security solution is explained. A survey of existing security solutions designed to secure the SDN, and a comparative study of various IDS approaches based on a deep learning model and machine learning methods are discussed in the article. Finally, we describe future directions for SDN security.


Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2559 ◽  
Author(s):  
Celestine Iwendi ◽  
Suleman Khan ◽  
Joseph Henry Anajemba ◽  
Mohit Mittal ◽  
Mamdouh Alenezi ◽  
...  

The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides many researchers have applied machine learning around this area. Obviously, a single classifier alone in the classifications seems impossible to control network intruders. This limitation is what led us to perform dimensionality reduction by means of correlation-based feature selection approach (CFS approach) in addition to a refined ensemble model. The paper aims to improve the Intrusion Detection System (IDS) by proposing a CFS + Ensemble Classifiers (Bagging and Adaboost) which has high accuracy, high packet detection rate, and low false alarm rate. Machine Learning Ensemble Models with base classifiers (J48, Random Forest, and Reptree) were built. Binary classification, as well as Multiclass classification for KDD99 and NSLKDD datasets, was done while all the attacks were named as an anomaly and normal traffic. Class labels consisted of five major attacks, namely Denial of Service (DoS), Probe, User-to-Root (U2R), Root to Local attacks (R2L), and Normal class attacks. Results from the experiment showed that our proposed model produces 0 false alarm rate (FAR) and 99.90% detection rate (DR) for the KDD99 dataset, and 0.5% FAR and 98.60% DR for NSLKDD dataset when working with 6 and 13 selected features.


Author(s):  
Yogita Hande ◽  
Akkalashmi Muddana

Presently, the advances of the internet towards a wide-spread growth and the static nature of traditional networks has limited capacity to cope with organizational business needs. The new network architecture software defined networking (SDN) appeared to address these challenges and provides distinctive features. However, these programmable and centralized approaches of SDN face new security challenges which demand innovative security mechanisms like intrusion detection systems (IDS's). The IDS of SDN are designed currently with a machine learning approach; however, a deep learning approach is also being explored to achieve better efficiency and accuracy. In this article, an overview of the SDN with its security concern and IDS as a security solution is explained. A survey of existing security solutions designed to secure the SDN, and a comparative study of various IDS approaches based on a deep learning model and machine learning methods are discussed in the article. Finally, we describe future directions for SDN security.


Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4372 ◽  
Author(s):  
Yan Naung Soe ◽  
Yaokai Feng ◽  
Paulus Insap Santosa ◽  
Rudy Hartanto ◽  
Kouichi Sakurai

With the rapid development and popularization of Internet of Things (IoT) devices, an increasing number of cyber-attacks are targeting such devices. It was said that most of the attacks in IoT environments are botnet-based attacks. Many security weaknesses still exist on the IoT devices because most of them have not enough memory and computational resource for robust security mechanisms. Moreover, many existing rule-based detection systems can be circumvented by attackers. In this study, we proposed a machine learning (ML)-based botnet attack detection framework with sequential detection architecture. An efficient feature selection approach is adopted to implement a lightweight detection system with a high performance. The overall detection performance achieves around 99% for the botnet attack detection using three different ML algorithms, including artificial neural network (ANN), J48 decision tree, and Naïve Bayes. The experiment result indicates that the proposed architecture can effectively detect botnet-based attacks, and also can be extended with corresponding sub-engines for new kinds of attacks.


2017 ◽  
Vol 2017 ◽  
pp. 1-6 ◽  
Author(s):  
Uma R. Salunkhe ◽  
Suresh N. Mali

In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.


2013 ◽  
Vol 353-356 ◽  
pp. 3067-3071
Author(s):  
Jiao Na Jiao ◽  
Jian Jun Yu

Researches on leak detection system of gas network are significant to fault pipelines diagnosis. In the daily operation of city gas pipeline network, pipeline leakage is the most risky failure type. This paper attempts to review and analyze the existing gas network leak detection systems, meanwhile, design a new kind of leak detection system for daily monitoring and leakage detection of gas network. The greatest advantage of this system is to be able to do all kinds of leak experimental research, especially has great reference value for the leak detection task in colleges and universities.


Author(s):  
Hanan A. R. Akkar ◽  
Wael A. H. Hadi ◽  
Ibraheem H. Al-Dosari ◽  
Saadi M. Saadi ◽  
Aseel Ismael Ali

The problem of leak detection in water pipeline network can be solved by utilizing a wireless sensor network based an intelligent algorithm. A new novel denoising process is proposed in this work. A comparison study is established to evaluate the novel denoising method using many performance indices. Hardyrectified thresholding with universal threshold selection rule shows the best obtained results among the utilized thresholding methods in the work with Enhanced signal to noise ratio (SNR) = 10.38 and normalized mean squared error (NMSE) = 0.1344. Machine learning methods are used to create models that simulate a pipeline leak detection system. A combined feature vector is utilized using wavelet and statistical factors to improve the proposed system performance.


Author(s):  
Ly Vu ◽  
Quang Uy Nguyen

Machine learning-based intrusion detection hasbecome more popular in the research community thanks to itscapability in discovering unknown attacks. To develop a gooddetection model for an intrusion detection system (IDS) usingmachine learning, a great number of attack and normal datasamples are required in the learning process. While normaldata can be relatively easy to collect, attack data is muchrarer and harder to gather. Subsequently, IDS datasets areoften dominated by normal data and machine learning modelstrained on those imbalanced datasets are ineffective in detect-ing attacks. In this paper, we propose a novel solution to thisproblem by using generative adversarial networks to generatesynthesized attack data for IDS. The synthesized attacks aremerged with the original data to form the augmented dataset.Three popular machine learning techniques are trained on theaugmented dataset. The experiments conducted on the threecommon IDS datasets and one our own dataset show thatmachine learning algorithms achieve better performance whentrained on the augmented dataset of the generative adversarialnetworks compared to those trained on the original datasetand other sampling techniques. The visualization techniquewas also used to analyze the properties of the synthesizeddata of the generative adversarial networks and the others.


Sign in / Sign up

Export Citation Format

Share Document