Abstract
Two themes have dominated the research on anomaly detection in time series data, one related to explorations of deep architectures for the task, and the other, equally important, the creation of large benchmark datasets. In line with the current trends, we have proposed several deep learning architectures based on Variational Autoencoders that have been evaluated for detecting cyber-attacks on water distribution system on the BATADAL challenge task and dataset. The second research aim of this study was to examine the impact of using Mahalanobis distance as a reconstruction error on the performance of the proposed models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chandola V., Banerjee A., Kumar V.: Anomaly detection: a survey. ACM Comput. Surv. July 2009. Article No. 15. https://doi.org/10.1145/1541880.1541882
Chapelle, O., Chi, M., Zien, A.: A continuation method for semi-supervised SVMs. In: Proceedings of the 23rd international conference on Machine learning (ICML ’06), pp. 185–192. Association for Computing Machinery, New York (2006). https://doi.org/10.1145/1143844.1143868
Reif, M., Goldstein, M., Stahl, A., Breuel, T.: Anomaly detection by combining decision trees and parametric densities. In: 2008 19th International Conference on Pattern Recognition, Tampa, FL, pp. 1–4 (2008). https://doi.org/10.1109/ICPR.2008.4761796
Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001). https://doi.org/10.1023/A:1010933404324
Primartha R., Tama B. A.: Anomaly detection using random forest: a performance revisited. In: 2017 International Conference on Data and Software Engineering (ICoDSE) (2017). https://doi.org/10.1109/ICODSE.2017.8285847
Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS One 11(4), e0152173 (2016)
Knorr, E.M., Ng, R.T.: Algorithms for mining distance-based outliers in large datasets. In Proceedings of VLDB 1998, pp. 392–403 (1998). https://doi.org/10.5555/645924.671334
Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of SIGMOD 2000, pp. 93–104 (2000). https://doi.org/10.1145/342009.335388
Pham, N., Pagh, R.: A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, August 2012, pp. 877–885 (2012). https://doi.org/10.1145/2339530.2339669
Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation forest. In: IEEE International Conference on Data Mining, 2009, pp. 413–422. https://doi.org/10.1109/ICDM.2008.17
Jolliffe, I.T., Cadima, J.: Principal component analysis: a review and recent developments. Philos. Trans. A Math. Phys. Eng. Sci. 374(2065), 20150202 (2016). https://doi.org/10.1098/rsta.2015.0202
Munir, M., Dengel, A., Chattha, M.A., Ahmed, S.: A comparative analysis of traditional and deep learning-based anomaly detection methods for streaming data. In: 18th IEEE International Conference on Machine Learning and Applications (ICMLA) At: Boca Raton, Florida, USA, December 2019 (2019). https://doi.org/10.1109/ICMLA.2019.00105
Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407 (2019)
Diederik, P.K., Welling, M.: Auto-Encoding Variational Bayes. arXiv:1312.6114 (2013)
Goodfellow, I.J., et al.: Generative Adversarial Networks. arXiv:1406.2661 (2014)
Kim, C., Lee, J., Kim, R., Park, Y., Kang, J.: DeepNAP: deep neural anomaly pre-detection in a semiconductor fab. Inf. Sci. 457–458, 1–11 (2018). https://doi.org/10.1016/j.ins.2018.05.020
Malhotra, P., Vig, L., Shroff, G., Agarwal, P.: Long short term memory networks for anomaly detection in time series. In: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, 2015, pp. 89–94
Xu, H., et al.: Unsupervised anomaly detection via variational autoencoder for seasonal KPIs in web applications. arXiv:1802.03903 (2018)
Zhang, C., Li, S., Zhang, H., Chen, Y.: VELC: a new variational autoencoder based model for time series anomaly detection (2019). arXiv:1907.01702
Taormina, R., et al.: The battle of the attack detection algorithms: disclosing cyber attacks on water distribution networks. J. Water Resour. Plann. Manage. 144(8) (2018) https://doi.org/10.1061/(ASCE)WR.1943-5452.0000969
Mclachlan, G.J.: Mahalanobis distance. Resonance 4(6), 20–26 (1999). https://doi.org/10.1007/BF02834632
Pereira, J., Silveira, M.: Unsupervised anomaly detection in energy time series data using variational recurrent autoencoders with attention. In: 17th IEEE International Conference on Machine Learning and Applications (ICMLA), Orlando, Florida, USA, December 2018 (2018). https://doi.org/10.1109/ICMLA.2018.00207
An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2(1), 1–18 (2015)
Housh, M., Ohar, Z.: Model based approach for cyber-physical attacks detection 547 in water distribution systems. In: World Environmental and Water Resources Congress 2017, vol. 548, pp. 727–736 (2017). https://doi.org/10.1061/9780784480625.067
Maruf, M., et al.: Water distribution system modeling by using EPA-NET software. In: International Conference on Recent Innovation in Civil Engineering for Sustainable Development (IICSD-2015), DUET, Gazipur, Bangladesh, December 2015 (2015)
Abokifa, A.A., Haddad, K., Lo, C.S., Biswas, P.: Detection of cyber physical attacks on water distribution systems via principal component analysis and artificial neural networks. In: World Environmental and Water Resources Congress 2017, vol. 495, 676–691 (2017). https://doi.org/10.1061/9780784480625.063
Giacomoni, M., Gatsis, N., Taha, A.: Identification of cyber attacks on water distribution systems by unveiling low-dimensionality in the sensory data. In: World Environmental and Water Resources Congress 2017, vol. 531, pp. 660–675 (2017). https://doi.org/10.1061/9780784480625.062
Brentan, B. M., et al.: On-line cyber attack detection in water networks through state forecasting and control by pattern recognition. In: World Environmental and Water Resources Congress 2017, vol. 510, pp. 583–592 (2017). https://doi.org/10.1061/9780784480625.054
Chandy, S.E., Rasekh, A., Barker, Z.A., Campbell, B., Shafiee, M.E.: Detection of cyber-attacks to water systems through machine-learning-based anomaly detection in SCADA data. In: World Environmental and Water Resources Congress 2017, vol. 520, 611–616 (2017). https://doi.org/10.1061/9780784480625.057
Pasha, M.F.K., Kc, B., Somasundaram, S.L.: An approach to detect the cyber-physical attack on water distribution system. In: World Environmental and Water Resources Congress 2017, vol. 584, pp. 703–711 (2017).https://doi.org/10.1061/9780784480625.065
Aghashahi, M., Sundararajan, R., Pourahmadi, M., Banks, M.K.: Water distribution systems analysis symposium; battle of the attack detection algorithms 501 (BATADAL). In: World Environmental and Water Resources Congress 2017, vol. 502, pp. 101–108 (2017). https://doi.org/10.1061/9780784480595.010
Acknowledgement
This work was partially financed by the Faculty of Computer Science and Engineering at the “Ss. Cyril and Methodius” University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gjorgiev, L., Gievska, S. (2020). Time Series Anomaly Detection with Variational Autoencoder Using Mahalanobis Distance. In: Dimitrova, V., Dimitrovski, I. (eds) ICT Innovations 2020. Machine Learning and Applications. ICT Innovations 2020. Communications in Computer and Information Science, vol 1316. Springer, Cham. https://doi.org/10.1007/978-3-030-62098-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-62098-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62097-4
Online ISBN: 978-3-030-62098-1
eBook Packages: Computer ScienceComputer Science (R0)