Edge Computing Application: Real-Time Anomaly Detection Algorithm for Sensing Data

被引:0
|
作者
Zhang Q. [1 ]
Hu Y. [1 ]
Ji C. [1 ]
Zhan P. [1 ]
Li X. [1 ]
机构
[1] School of Computer Science & Technology, Shandong University, Jinan
关键词
Correlation; Edge computing; Internet of things; Outlier distance; Time series data;
D O I
10.7544/issn1000-1239.2018.20170804
中图分类号
学科分类号
摘要
With the rapid development of Internet of things (IoT), we have gradually entered into the IoE (Internet of everything) era. In face of the low quality of real-time gathering sensor data in IoT, this paper proposes a novel real-time anomaly detection algorithm based on edge computing for streaming sensor data. This algorithm firstly expresses the corresponding sensor data in the form of time series and establishes the distributed sensing data anomaly detection model based on edge computation. Secondly, this algorithm utilizes the continuity of single-source time series and the correlation between multi-source time series to detect anomaly data from streaming sensor data effectively and respectively. The corresponding anomaly detection result sets are also generated in the same process. Finally, the above two anomaly detection result sets would be effectively fused in a certain way so as to obtain more accurate detection result. In other words, this algorithm achieves a higher detection rate compared with other traditional methods. Extensive experiments on the real-world dataset of household heating data from the Jinan municipal steam heating system, which collects monitoring data from 3 084 apartments of 394 buildings, have been conducted to demonstrate the advantages of our algorithm. © 2018, Science Press. All right reserved.
引用
收藏
页码:524 / 536
页数:12
相关论文
共 25 条
  • [1] Shi W., Sun H., Cao J., Et al., Edge computing-An emerging computing model for the Internet of everything era, Journal of Computer Research and Development, 54, 5, pp. 907-924, (2017)
  • [2] Wang X., Fang Z., Wang P., Et al., A distributed multi-level composite index for KNN processing on long time series, Proc of the 21st Int Conf on Database Systems for Advanced Applications, pp. 215-230, (2017)
  • [3] Sharma A.B., Chen H., Ding M., Et al., Fault detection and localization in distributed systems using invariant relationships, Proc of the 43th Int Conf on Dependable Systems and Networks (DSN), pp. 1-8, (2013)
  • [4] Barnett V., Lewis T., Outliers in Statistical Data, pp. 20-29, (1994)
  • [5] Knox E.M., Ng R.T., Algorithms for mining distancebased outliers in large datasets, Proc of the 24th Int Conf on Very Large Data Bases, pp. 392-403, (1998)
  • [6] Knorr E.M., Ng R.T., Finding intensional knowledge of distance-based outliers, Journal of Very Large Data Bases, 99, 12, pp. 211-222, (1999)
  • [7] Ramaswamy S., Rastogi R., Shim K., Efficient algorithms for mining outliers from large data sets, Proc of the 29th Int Conf on Management of Data, pp. 427-438, (2000)
  • [8] Markou M., Singh S., Novelty detection: A review-part 2: Neural network based approaches, Signal Processing, 83, 12, pp. 2499-2521, (2003)
  • [9] Mourao-Miranda J., Hardoon D.R., Hahn T., Et al., Patient classification as an outlier detection problem: An application of the one-class support vector machine, Neuroimage, 58, 3, pp. 793-804, (2011)
  • [10] Wang J.S., Chiang J.C., A cluster validity measure with outlier detection for support vector clustering, IEEE Trans on Systems, Man, and Cybernetics, Part B: Cybernetics, 38, 1, pp. 78-89, (2008)