Skip to main content

Online Monitoring Automation Using Anomaly Detection in IoT/IT Environment

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 985))

Abstract

The increase of the IoT and the cloud environment have played a significant role of making our society knowledgeable and informative.

Due to this trends the system environment gets more sophisticated and requires more system resources. In this paper, the monitoring automation without humans being involved has been proposed. It is noted that the 93.75% faults has been detected via the simulation using the proposed technique and the faults that the operators reported have been detected as well in datacenter.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Killick, R., Eckley, I.: changepoint: an R package for changepoint analysis. J. Stat. Softw. 58(3), 1–19 (2014)

    Article  Google Scholar 

  2. Zimek, A., Schubert, E.: Outlier detection. In: Encyclopedia of Database Systems, pp. 1–5. Springer, New York (2017). https://doi.org/10.1007/978-1-4899-7993-3_80719-1. ISBN 9781489979933. Accessed 16 Aug 2018

    Google Scholar 

  3. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)

    Article  Google Scholar 

  4. Kim, C., Nam, S.-H., Joe, I.: A log regression seasonality based approach for time series decomposition prediction in system resources. In: Advances in Computer Science and Ubiquitous Computing, pp. 843–849. Springer, Singapore (2015)

    Chapter  Google Scholar 

  5. Shin, K.-H., Kim, C.: Estimation method of predicted time series data based on absolute maximum value. J. Energy Eng. 27(4) (2018)

    Google Scholar 

  6. Veasey, T.J., Dodson, S.J.: Anomaly detection in application performance monitoring data. In: Proceedings of International Conference on Machine Learning and Computing (ICMLC) (2014)

    Google Scholar 

  7. Carter, K.M., Streilein, W.W.: Probabilistic reasoning for streaming anomaly detection. In: 2012 IEEE Statistical Signal Processing Workshop (SSP). IEEE (2012)

    Google Scholar 

  8. Killick, R., Fearnhead, P., Eckley, I.A.: Optimal detection of changepoints with a linear computational cost. J. Am. Stat. Assoc. 107(500), 1590–1598 (2012)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Inwhee Joe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, C., Joe, I., Jang, D., Kim, E., Nam, S. (2019). Online Monitoring Automation Using Anomaly Detection in IoT/IT Environment. In: Silhavy, R. (eds) Artificial Intelligence Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 985. Springer, Cham. https://doi.org/10.1007/978-3-030-19810-7_10

Download citation

Publish with us

Policies and ethics