scholarly journals Adaptive Real-Time Method for Anomaly Detection Using Machine Learning

Proceedings ◽  
2020 ◽  
Vol 54 (1) ◽  
pp. 38
Author(s):  
David Novoa-Paradela ◽  
Óscar Fontenla-Romero ◽  
Bertha Guijarro-Berdiñas

Anomaly detection is a sub-area of machine learning that deals with the development of methods to distinguish among normal and anomalous data. Due to the frequent use of anomaly-detection systems in monitoring and the lack of methods capable of learning in real time, this research presents a new method that provides such online adaptability. The method bases its operation on the properties of scaled convex hulls. It begins building a convex hull, using a minimum set of data, that is adapted and subdivided along time to accurately fit the boundary of the normal class data. The model has online learning ability and its execution can be carried out in a distributed and parallel way, all of them interesting advantages when dealing with big datasets. The method has been compared to other state-of-the-art algorithms demonstrating its effectiveness.

Author(s):  
Severin Sadjina ◽  
Stian Skjong ◽  
Armin Pobitzer ◽  
Lars T. Kyllingstad ◽  
Roy-Jostein Fiskerstrand ◽  
...  

Abstract Here, we present the R&D project Real-Time Digital Twin for Boosting Performance of Seismic Operations, which aims at increasing the overall operational efficiency of seismic vessels through digitisation and automation. The cornerstone in this project is the development of a real-time digital twin (RTDT) — a sophisticated mathematical model and state estimator of all the in-sea seismic equipment, augmented with real-time measurements from the actual equipment. This provides users and systems on-board the vessel with a live digital representation of the state of the equipment during operations. By combining the RTDT with state-of-the-art methods in machine learning and control theory, the project will develop new advisory and automation systems that improve the efficiency of seismic survey operations, reduce the risk of equipment damage, improve health monitoring and fault detection systems, and improve the quality of the seismic data. This will lead to less unproductive time, reduced costs, reduced fuel consumption and reduced emissions for a given operational scope. The main focus in this paper is the presentation of today’s challenges in offshore seismic surveys, and how state-of-the-art technology can be adopted to improve various operations. We discuss how simulation technology, machine learning and live sensor measurements can be integrated in on-board decision support and automation systems, and highlight the importance of such systems for designing the complex, autonomous offshore vessels of the future. Finally, we present some early results from the project in the form of two brief case studies.


Proceedings ◽  
2020 ◽  
Vol 59 (1) ◽  
pp. 9
Author(s):  
Antoine Chevrot ◽  
Alexandre Vernotte ◽  
Pierre Bernabe ◽  
Aymeric Cretin ◽  
Fabien Peureux ◽  
...  

Major transportation surveillance protocols have not been specified with cyber security in mind and therefore provide no encryption nor identification. These issues expose air and sea transport to false data injection attacks (FDIAs), in which an attacker modifies, blocks or emits fake surveillance messages to dupe controllers and surveillance systems. There has been growing interest in conducting research on machine learning-based anomaly detection systems that address these new threats. However, significant amounts of data are needed to achieve meaningful results with this type of model. Raw, genuine data can be obtained from existing databases but need to be preprocessed before being fed to a model. Acquiring anomalous data is another challenge: such data is much too scarce for both the Automatic Dependent Surveillance–Broadcast (ADS-B) and the Automatic Identification System (AIS). Crafting anomalous data by hand, which has been the sole method applied to date, is hardly suitable for broad detection model testing. This paper proposes an approach built upon existing libraries and ideas that offers ML researchers the necessary tools to facilitate the access and processing of genuine data as well as to automatically generate synthetic anomalous surveillance data to constitute broad, elaborated test datasets. We demonstrate the usability of the approach by discussing work in progress that includes the reproduction of related work, creation of relevant datasets and design of advanced anomaly detection models for both domains of application.


This research discloses how to utilize machine learning methods for anomaly detection in real-time on a computer network. While utilizing machine learning for this task is definitely not a novel idea, little literature is about the matter of doing it in real-time. Most machine learning research in PC network anomaly detection depends on the KDD '99 data set and means to demonstrate the proficiency of the algorithms introduced. The emphasis on this data set has caused a lack of scientific papers disclosing how to assemble network data, remove features, and train algorithms for use inreal-time networks. It has been contended that utilizing the KDD '99 dataset for anomaly detection is not appropriate for real-time network systems. This research proposes how the data gathering procedure will be possible utilizing a dummy network and generating synthetic network traffic by analyzing the importance of One-class SVM. As the efficiency of k-means clustering and LTSM neural networks is lower than one-class SVM, that is why this research uses the results of existing research of LSTM and k-means clustering for the comparison with reported outcomes of a similar algorithm on the KDD '99 dataset. Precisely, without engaging KDD ’99 data set by using synthetic network traffic, this research achieved the higher accuracy as compared to the previous researches.


Sensors ◽  
2020 ◽  
Vol 20 (14) ◽  
pp. 3987 ◽  
Author(s):  
Toshitaka Yamakawa ◽  
Miho Miyajima ◽  
Koichi Fujiwara ◽  
Manabu Kano ◽  
Yoko Suzuki ◽  
...  

A warning prior to seizure onset can help improve the quality of life for epilepsy patients. The feasibility of a wearable system for predicting epileptic seizures using anomaly detection based on machine learning is evaluated. An original telemeter is developed for continuous measurement of R-R intervals derived from an electrocardiogram. A bespoke smartphone app calculates the indices of heart rate variability in real time from the R-R intervals, and the indices are monitored using multivariate statistical process control by the smartphone app. The proposed system was evaluated on seven epilepsy patients. The accuracy and reliability of the R-R interval measurement, which was examined in comparison with the reference electrocardiogram, showed sufficient performance for heart rate variability analysis. The results obtained using the proposed system were compared with those obtained using the existing video and electroencephalogram assessments; it was noted that the proposed method has a sensitivity of 85.7% in detecting heart rate variability change prior to seizures. The false positive rate of 0.62 times/h was not significantly different from the healthy controls. The prediction performance and practical advantages of portability and real-time operation are demonstrated in this study.


Author(s):  
Harshada Kanade ◽  
Gauri Uttarwar ◽  
Shweta Borse ◽  
Archana. K

Fingerprint is widely used in biometrics, for identification of individual’s identity. Biometric recognition is a leading technology for identification and security systems. It has unique identification among all other biometric modalities. Most anomaly detection systems rely upon machine learning. Calculations are performed to identify suspicious occasion. The primary purpose of this system is to ensure a reliable and accurate user authentication; this study addresses the problem of developing accurate, generalizable, and efficient algorithms for detecting fingerprint spoof attacks. The approach is to utilize local patches centered and aligned using fingerprint details. That proposed approach is to provide accuracies in fingerprint spoof detection for intra-sensor, cross material, crosssensor, as well as cross-dataset testing scenarios. The principle used is similar to the working of some cryptographic primitives, in particular to present the key into the plan so that a couple of operations are infeasible without knowing it.


Sign in / Sign up

Export Citation Format

Share Document