A Multi Model Approach A Data Engineering Driven Pipeline Model For Detecting Anomaly in Sensor Data Using Stacked LSTM
A Multi Model Approach A Data Engineering Driven Pipeline Model For Detecting Anomaly in Sensor Data Using Stacked LSTM
A Multi Model Approach A Data Engineering Driven Pipeline Model For Detecting Anomaly in Sensor Data Using Stacked LSTM
https://doi.org/10.22214/ijraset.2023.52084
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
Abstract: This study uses a self-supervised learning technique based on auto encoders to find anomalous nodes. Only temporal
variables have been taken into account and researched so far for use in identifying anomalies in wireless sensor networks
(WSNs). This method fully utilises the geographic and temporal information of the WSN for anomaly identification by
incorporating the extraction of geographic location features, intermodal WSN correlation features, and temporal WSN data flow
characteristics into the design of the autoencoder. First, by focusing on a single mode from a local spatial perspective, a fully
connected network is used to temporal nodes. Second, the spatial and temporal characteristics of the data flows of the nodes and
their neighbours are retrieved by concentrating on a specific mode and seeing the WSN topology from a global spatial
perspective for anomaly identification. The adaptive fusion method's weighted summation step is then used to extract the
relevant features from the various models. An LSTM is used in this study to solve the problem of long-term dependence in the
temporal dimension. The decoder's reconstructed output and the hidden layer representation of the are used to calculate the
anomaly probability of the current system utilising a fully linked network.
Keywords: Anomely Detection (AD), stacked (LSTM)
I. INTRODUCTION
In unsupervised environments where WSNs are regularly used, node assaults are common. These attacks interfere with wireless
media, intercept transmission messages, and degrade the deployment environment, among other things, preventing WSNs from
operating normally. Anomalies happen when the WS Ns' energy memory bandwidth and communication limitations are violated.
Contextual anomalies, point anomalies, and collective anomalies, to mention a few, are data flows that differ from the typical data
distribution when an event occurs in a WSN. Particularly abnormal data points are those that differ in some way from the rest of the
data. Data points that are contextual anomalies are out of the ordinary when contrasted to the regular data they are related with.
Anomalies can be grouped together.. A single data point could seem to be normal, but if there are many of them at once, a larger
anomaly is produced. In conclusion, anomalies might arise in a WSN at any time, so it's critical to spot them as soon as is practical
and to halt degradation. The safe and dependable operation of WSN systems is implied to require anomaly detection. Sensor-based
remote health monitoring is increasingly being used in a variety of urban, industrial, and healthcare situations. Knowledge derived
from sensor-based data enables the analysis of temporal trends and the cheapest, most invasive diagnosis of serious diseases.
Seniors' health and condition can be tracked using sensor data on things like movement, physiology, behaviour, and sleep. Seniors
are able to maintain their independence for longer, and quick intervention is made possible. However, real-world sensor-based
health monitoring presents unique challenges. Its distinguishing features include multivariate data, erroneous labelling brought on
by resource-intensive annotation, data drift noise, and a lack of periodicity. lightweight self-supervised anomaly detection method
that is robust against tagging and noisy data that are typical of sensor-based remote health monitoring. Our adaptive anomaly
detection system for the healthcare sector uses specialist baseline data. Applying the Matrix Principle(MP) -a more adaptive,
contemporary variation of the distance-based anomaly detection method, the Contextual Matrix Prole (CMP), which is modern,
accurate, and remarkably quick. The CMP concept's intuitive representation of patterns and anomalies is its cornerstone. The CMP
facilitates the distinction between normal and abnormal data by organising noisy multivariate sensor observations into time intervals
or contexts.Cross-sensor correlations and high dimensions are currently unaddressed by existing work based on the CMP. These
drawbacks are overcome by our method by utilising graph-based machine learning. We explicitly build time context graphs using
CMP distance techniques, and we apply self-supervised graph models to assess each graph in relation to the prior graphs.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2800
2
8
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
Then, each graph embedding is subjected to the sliding window method to look for spatiotemporal anomalies. The usage of MP,
which internally uses the Fast Fourier Transform for distance computation, and one-hop graphs, which benefit from graph
representation learning but with few parameters and low computational complexity, both increase the speed of our method. Our
research extends past work that demonstrates the potency of the CMP-based approach for unsupervised anomaly discovery.
Additionally, downstream algorithms are able to comprehend and distinguish between particular anomaly conditions using the
generated embeddings by layering graph models on top of the CMP.Cyber Physical Systems (CPS) are like a certain kind of car.
Recent hardware innovations have enabled access to computational power at previously unheard-of levels through the usage of
modern processors and GPUs. Using the extensive automotive datasets that machine learning and artificial intelligence algorithms
have access to, intelligent solutions based on this technology can be developed. These techniques can be used to identify the causes
of both anomalous sensor activity and other sensor channel issues. Monitoring issues, predicting their occurrence, and providing
guidance for decision-making can all help with the creation of maintenance programmes.In both the academic and business realms,
predictive maintenance (PdM) is a notion that is gaining popularity.But PdM installation is costly and challenging. To breach the
PdM domain, robust anomaly detection is necessary. AI-driven anomaly detection systems are used to identify events or
observations that drastically deviate from the majority of the data and do not meet a predetermined description of typical
behaviour.The Internet of Things (IoT) is a rapidly expanding network that connects devices through complex linkages to enable
data collecting and exchange. As the number of IoT users and applications increases across multiple industries, new issues with
security and privacy of devices in the IoT network are presented. One of the research areas in current IoT data analytics is finding
aberrant data or outliers in data streams. Anomalies, often known as outliers, or unusual patterns or behaviours in data may indicate
a problem or a rare occurrence. .Anomalies may result from errors or strange discoveries. If weaknesses are not uncovered and
fixed, hostile attacks might bring down the entire Internet of Things network. When the IoT network is in use, rare observations are
uncommon occurrences that may happen and may need to be monitored or reported. For quickly recognising and responding to
issues, anomaly detection in the IoT is essential. Anomalies in sensor data can reveal faulty equipment, whereas anomalies in
network traffic could reveal a cyberattack. Anomaly detection can also find fraud or other strange behaviour in financial
transactions, as well as discover anomalous trends in business activity. The ability of machine learning algorithms to analyse huge
data sets has made them popular for anomaly detection.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2801
2
8
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
Using the MC dropout method, the following examples show how to assess epistemic uncertainty: Using the Uber dataset and a
confidence interval, [31] conducted research on a deep learning-based time-series prediction. AD was performed by triggering
70430 VOLUME 10, 2022 S. QAE When the observed value diverged from the 95% predicted range, Ryu et al.'s AA for AD of
Multivariate Sensor Data raised an alarm. The anomaly score was weighted by uncertainty rather than the variation in reconstruction
mistakes. In the field of medical imaging, uncertainty was used to identify diabetic retinopathy using fundus pictures.employing
pixel-level adjustments to the retinal optical coherence tomography images for segmentation. The uncertainty of aberrant pictures in
the MVTec-AD dataset was quantified by comparing the area under the receiver operating characteristic (AUROC) scores between
the residual-based and uncertainty-based detection results. In this study, aleatoric uncertainty is incorporated by QAE, and the
distribution of the sources used for anomaly scoring is done using the uncertainty term. Our method differs from the earlier ones in
how uncertainty is measured (aleatoric uncertainty with multiple quantile regression) and how anomaly scoring is done
(Mahalanobis distance-based anomaly score)
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2802
2
8
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
We also provide the AA method, which first uses Mahalanobis distance to determine anomaly score before accumulating errors over
numerous reconstructions. As the recursion increases the dimension of the errors, it is easier to distinguish between the anomaly
score distributions of normal and abnormal data. Several real-world datasets are used to assess the effectiveness of the proposed
QAE-AA. QAE-AA achieved the highest AUROC scores and, on average, % to % higher AUROC scores in four of the six datasets.
These test results show that the suggested methodology can improve AD performance. The proposed QAE-AA architecture can be
enhanced with a time series AD background and examples.
V. PROPOSED SYSTEM
In this paper, a hybrid anomaly detection technique for industrial sensor networks that combines cloud-based and edge-based sensor
data analysis models is proposed. The sensor data detection model can identify unusual sensor data and upload it.
ltering enormous amounts of typical sensor data and reducing traffic load, they are sent to the cloud for additional analysis. The
sensor data analysis approach can accurately identify the attack by efficiently extracting temporal and geographical information.
For sensor measurement corroboration, we first develop the spatial integrity test. The residual error-based approach makes use of
sensors to measure an object's distance from a number of different angles, along with the standard measurement error to guarantee
the readings are precise. Iterative, sequential training is used to train classifiers. Every iteration seeks to build upon and increase the
excellence attained in the preceding iteration. At the end of the iteration, a strong classier will be created..
We evaluated the effectiveness of the approach in comparison to statistic thresholding and without the dynamic thresholding, and
we discovered that it performed well in identifying anomalous data in a failure scenario while significantly reducing the time it took
to identify true anomalous behaviour. The developed method can be simply used to data with diverse specifications because it is not
limited to the subject of the dataset. Numerous tests are carried out with real-world data to confirm the superiority of our approach.
Experimental findings demonstrate the viability of our technique in addressing the issues with conventional anomaly detection while
preserving accuracy and efficacy. Dynamic thresholding and weighted loss can be implemented to a variety of deep learning
architectures with ease, and they may offer similar improvements to those observed in this study.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2803
2
8
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
IX. CONCLUSION
This study investigated the rapid detection of anomalies in networks of unlabeled samples. It is recommended in this paper to utilise
any form of neural network to fully use the temporal features and to make state assessments and to adaptively fuse the common and
special properties of nodes. This framework for anomaly detection combines the advantages of supervised classification models and
reconstruction models. The fundamental relationships between the sensor channels are understood using a neural network as the
kernel, and abnormalities are detected using a multi-phased approach. The NN model was trained using data with normal
operational conditions. The model does time series forecasting using a multi-channel sequence for the present time window and
produces a prediction for the upcoming observation. The overall anomaly is determined by comparing the projected value to the
actual observation. Utilising a number of targeted scenarios and tests, the system may link unusual behaviour to a specific piece of
data. According to the results of the investigation, our technology successfully detects anomalies and risky situations.
REFERENCES
[1] Mining frequent trajectory patterns of WIP in an Internet of Things-based spatial-temporal database is a project by H. Cai, G. Yu, W. A. Yang, and K. Lu.
[2] Y. Zhao and F. Ferrari, Topological impacts on the mechanical characteristics of doi: /j.physa.,S.
[3] Anomaly detection through short local trajectories, Biswas and R. V. Babu, Journal of Neucomputing,.,.,., Z. Sun, D. Cao, H. He, X. Li, Grant Imahara, Mouser
Electronics, Manseld, TX, USA, developed a new integrated local trajectory planning and tracking control framework for autonomous ground vehicles. Online,
Internet. Offering: Moving Things. A. Gardi, R. Sabatini, and T., "Accessed: Dec.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2804
2
8
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
[4] Kistan, Multiobjective, D trajectory opti- mization for integrated avionics and air traffic management systems, doi:
[5] R. Zhen, Y. Jin, Q. Hu, Z. Shao, and N. Nikitakos, "Maritime anomaly identification inside coastal waters based on vessel trajectory grouping and doi:., /s,.,
[6] Fluid-induced transition from banded kyanite- to biminerallic eclogite and implications for the development of cratons, Geochimica j.gca.,.,.,., H. Sommer, D.
E. Jacob, R. A. Stern, D. Petts, D. P. Mattey, and D. G. Pearson.
[7] Pyrite multiple-sulfur isotope evidence for fast expansion and contraction of the early Paleoproterozoic seawater sulphate was published in a study by C. Scott,
B. A. Wing, A. Bekker, N. J. Planavsky, P. Medvedev, S. M. Bates, M. Yun, and T. W. Lyons. ,
[8] Adjoint BFKL at nite coupling: A short-cut from the collinear limit, B. Basso, S. Caron-Huot, and A. Sever, Journal of High Energy Physics. Berlin, Germany:
Springer, January, p., doi:,., /JHEP, (,),.,
[9] Bayesian detection of clusters and discontinous patterns, L. Knorr-Held and G. Raer, doi:., /j., -, X.,.,.x., The NIST definition of cloud computing, NIST,
Gaithersburg, MD, USA, Tech. Rep. Special Publication, P. Mell and T. Grance, -, , . ,
[10] Cloud computing: State-of-the-art, Q. Zhang, L. Cheng, and R. Boutaba, May , . , Reliability prediction and sensitivity analysis based on software design, S. S.
Gokhale and K. S. Trivedi, Proc.,
[11] Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida published a paper titled "A global hybrid intru- sion detection system for wireless sensor networks" in the
Procedia Computer journal.
[12] M. A. Sharkh and M. Kalil, "A quest for optimising the data processing decision for cloud-fog hybrid environments," Proc. Int. Conf. Commun., G.
Thamilarasu and S. Chawla, "Towards deep-learning-driven intrusion," Apr.
[13] SafeDrive: Online driving anomaly identification from large-scale vehicle data, M. Zhang, C. Chen, T. Wo, T. Xie, M. Z. A. Bhuiyan, and X. Lin, Aug.
[14] M. Razzaq, G.-R. Kwon, and S. Shin, Energy efcient Dijkstra-based weighted sum minimization routing protocol for WSN, in Proc. , rd Int
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2805
2
8