Skip to main content

Assessing Data Anomaly Detection Algorithms in Power Internet of Things

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2018)

Abstract

At present, the data related to the Internet of Things has shown explosive growth, and the importance of data has been greatly improved. Data collection and analysis are becoming more and more valuable. However, a large number of abnormal data will bring great trouble to our research, and even lead people into misunderstandings. Therefore, anomaly detection is particularly necessary and important. The purpose of this paper is to find an efficient and accurate outlier detection algorithm. Our work also analyzes their advantages and disadvantages theoretically. At the same time, the effects of the data set size, number of proximity points, and data dimension on CPU time and precision are discussed. The performance, advantages and disadvantages of each algorithm in dealing with high-dimensional data are compared and analyzed. Finally, the algorithm is used to analyze the actual anomaly data collected from the Internet of Things and analyze the results. The results show that the LOF algorithm can find the abnormal data in the data set in a shorter time and with higher accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lyu, L., Jin, J., Rajasegarar, S., et al.: Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering. IEEE Internet of Things J. 4(5), 1174–1184 (2017)

    Article  Google Scholar 

  2. Kriegel, H.-P., Schubert, M., Zimek, A.: Angle-based outlier detection in high-dimensional data. In: KDD, Las Vegas, Nevada, USA (2008)

    Google Scholar 

  3. Breunig, M.M., Kriegel, H.-P., Ng, R.T., et al.: LOF: identifying density-based local outliers. In: ACM MOD, Dallas, TX USA (2000)

    Google Scholar 

  4. Taghizadeh, M.J., Parhizkar, R., Garner, P.N., Bourlard, H., Asaei, A.: Ad hoc microphone array calibration: euclidean distance matrix completion algorithm and theoretical guarantees. Sig. Process. 170, 123–140 (2014)

    Google Scholar 

  5. Zarpelão, B.B., Miani, R.S., Kawakani, C.T., et al.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017)

    Article  Google Scholar 

  6. Trihinas, D., Pallis, G., Dikaiakos, M.D.: ADMin: adaptive monitoring dissemination for the internet of things. In: IEEE Conference on Computer Communications, INFOCOM 2017, pp. 1–9. IEEE (2017)

    Google Scholar 

  7. Gregg, D., David, U.: Parameterizing dose-response models to estimate relative potency functions directly. Toxicol. Sci. 129, 447–455 (2012)

    Article  Google Scholar 

  8. Liu, C.-S.: Reconcile the perfectly elastoplastic model to simulate the cyclic behavior and ratcheting. Int. J. Solids Struct. 43(2), 222–253 (2005)

    Article  Google Scholar 

  9. Kriegel, H.P., Zimek, A.: Angle-based outlier detection in high-dimensional data. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 444–452. ACM (2008)

    Google Scholar 

  10. Lu, Y., Qin, X.S.: Multisite rainfall downscaling and disaggregation in a tropical urban area. J. Hydrol. 509, 55–65 (2014)

    Article  Google Scholar 

  11. Le Grand, S., Götz, A.W., Walker, R.C.: SPFP: speed without compromise—a mixed precision model for GPU accelerated molecular dynamics simulations. Comput. Phys. Commun. 184(2), 374–380 (2013)

    Article  Google Scholar 

  12. Polišenská, K., Chiat, S., Comer, A., McKenzie, K.: Semantic effects in sentence recall: the contribution of immediate vs delayed recall in language assessment. J. Commun. Disord. 52, 65–77 (2014)

    Article  Google Scholar 

  13. Feng, D.-C., Chen, F., Xu, W.-L.: Detecting local manifold structure for unsupervised feature selection. Acta Automatica Sinica 40, 2253–2261 (2014)

    Article  Google Scholar 

  14. Zhou, M., Wang, Y., Srivastava, A.K., et al.: Ensemble based algorithm for synchrophasor data anomaly detection. IEEE Trans. Smart Grid (2018)

    Google Scholar 

  15. Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18–32 (2014)

    Article  Google Scholar 

  16. Erfani, S.M., Rajasegarar, S., Karunasekera, S., et al.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121–134 (2016)

    Article  Google Scholar 

Download references

Acknowledgement

This work is partially supported by Project No. 5211DS16001R of State Grid Zhejiang Electric Power Co., Ltd. This work is also supported by the National Natural Science Foundation of China (NSFC) under Grant No. 61502374.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Z., Liu, Z., Yuan, X., Xu, Y., Li, R. (2019). Assessing Data Anomaly Detection Algorithms in Power Internet of Things. In: Gao, H., Wang, X., Yin, Y., Iqbal, M. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 268. Springer, Cham. https://doi.org/10.1007/978-3-030-12981-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12981-1_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12980-4

  • Online ISBN: 978-3-030-12981-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics