Skip to main content

Time Series Anomaly Detection with Variational Autoencoder Using Mahalanobis Distance

  • Conference paper
  • First Online:
ICT Innovations 2020. Machine Learning and Applications (ICT Innovations 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1316))

Included in the following conference series:

Abstract

Two themes have dominated the research on anomaly detection in time series data, one related to explorations of deep architectures for the task, and the other, equally important, the creation of large benchmark datasets. In line with the current trends, we have proposed several deep learning architectures based on Variational Autoencoders that have been evaluated for detecting cyber-attacks on water distribution system on the BATADAL challenge task and dataset. The second research aim of this study was to examine the impact of using Mahalanobis distance as a reconstruction error on the performance of the proposed models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.batadal.net/data.html.

References

  1. Chandola V., Banerjee A., Kumar V.: Anomaly detection: a survey. ACM Comput. Surv. July 2009. Article No. 15. https://doi.org/10.1145/1541880.1541882

  2. Chapelle, O., Chi, M., Zien, A.: A continuation method for semi-supervised SVMs. In: Proceedings of the 23rd international conference on Machine learning (ICML ’06), pp. 185–192. Association for Computing Machinery, New York (2006). https://doi.org/10.1145/1143844.1143868

  3. Reif, M., Goldstein, M., Stahl, A., Breuel, T.: Anomaly detection by combining decision trees and parametric densities. In: 2008 19th International Conference on Pattern Recognition, Tampa, FL, pp. 1–4 (2008). https://doi.org/10.1109/ICPR.2008.4761796

  4. Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001). https://doi.org/10.1023/A:1010933404324

    Article  MATH  Google Scholar 

  5. Primartha R., Tama B. A.: Anomaly detection using random forest: a performance revisited. In: 2017 International Conference on Data and Software Engineering (ICoDSE) (2017). https://doi.org/10.1109/ICODSE.2017.8285847

  6. Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS One 11(4), e0152173 (2016)

    Article  Google Scholar 

  7. Knorr, E.M., Ng, R.T.: Algorithms for mining distance-based outliers in large datasets. In Proceedings of VLDB 1998, pp. 392–403 (1998). https://doi.org/10.5555/645924.671334

  8. Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of SIGMOD 2000, pp. 93–104 (2000). https://doi.org/10.1145/342009.335388

  9. Pham, N., Pagh, R.: A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, August 2012, pp. 877–885 (2012). https://doi.org/10.1145/2339530.2339669

  10. Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation forest. In: IEEE International Conference on Data Mining, 2009, pp. 413–422. https://doi.org/10.1109/ICDM.2008.17

  11. Jolliffe, I.T., Cadima, J.: Principal component analysis: a review and recent developments. Philos. Trans. A Math. Phys. Eng. Sci. 374(2065), 20150202 (2016). https://doi.org/10.1098/rsta.2015.0202

    Article  MathSciNet  MATH  Google Scholar 

  12. Munir, M., Dengel, A., Chattha, M.A., Ahmed, S.: A comparative analysis of traditional and deep learning-based anomaly detection methods for streaming data. In: 18th IEEE International Conference on Machine Learning and Applications (ICMLA) At: Boca Raton, Florida, USA, December 2019 (2019). https://doi.org/10.1109/ICMLA.2019.00105

  13. Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407 (2019)

  14. Diederik, P.K., Welling, M.: Auto-Encoding Variational Bayes. arXiv:1312.6114 (2013)

  15. Goodfellow, I.J., et al.: Generative Adversarial Networks. arXiv:1406.2661 (2014)

  16. Kim, C., Lee, J., Kim, R., Park, Y., Kang, J.: DeepNAP: deep neural anomaly pre-detection in a semiconductor fab. Inf. Sci. 457–458, 1–11 (2018). https://doi.org/10.1016/j.ins.2018.05.020

    Article  MathSciNet  Google Scholar 

  17. Malhotra, P., Vig, L., Shroff, G., Agarwal, P.: Long short term memory networks for anomaly detection in time series. In: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, 2015, pp. 89–94

    Google Scholar 

  18. Xu, H., et al.: Unsupervised anomaly detection via variational autoencoder for seasonal KPIs in web applications. arXiv:1802.03903 (2018)

  19. Zhang, C., Li, S., Zhang, H., Chen, Y.: VELC: a new variational autoencoder based model for time series anomaly detection (2019). arXiv:1907.01702

  20. Taormina, R., et al.: The battle of the attack detection algorithms: disclosing cyber attacks on water distribution networks. J. Water Resour. Plann. Manage. 144(8) (2018) https://doi.org/10.1061/(ASCE)WR.1943-5452.0000969

  21. Mclachlan, G.J.: Mahalanobis distance. Resonance 4(6), 20–26 (1999). https://doi.org/10.1007/BF02834632

    Article  Google Scholar 

  22. Pereira, J., Silveira, M.: Unsupervised anomaly detection in energy time series data using variational recurrent autoencoders with attention. In: 17th IEEE International Conference on Machine Learning and Applications (ICMLA), Orlando, Florida, USA, December 2018 (2018). https://doi.org/10.1109/ICMLA.2018.00207

  23. An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2(1), 1–18 (2015)

    Google Scholar 

  24. Housh, M., Ohar, Z.: Model based approach for cyber-physical attacks detection 547 in water distribution systems. In: World Environmental and Water Resources Congress 2017, vol. 548, pp. 727–736 (2017). https://doi.org/10.1061/9780784480625.067

  25. Maruf, M., et al.: Water distribution system modeling by using EPA-NET software. In: International Conference on Recent Innovation in Civil Engineering for Sustainable Development (IICSD-2015), DUET, Gazipur, Bangladesh, December 2015 (2015)

    Google Scholar 

  26. Abokifa, A.A., Haddad, K., Lo, C.S., Biswas, P.: Detection of cyber physical attacks on water distribution systems via principal component analysis and artificial neural networks. In: World Environmental and Water Resources Congress 2017, vol. 495, 676–691 (2017). https://doi.org/10.1061/9780784480625.063

  27. Giacomoni, M., Gatsis, N., Taha, A.: Identification of cyber attacks on water distribution systems by unveiling low-dimensionality in the sensory data. In: World Environmental and Water Resources Congress 2017, vol. 531, pp. 660–675 (2017). https://doi.org/10.1061/9780784480625.062

  28. Brentan, B. M., et al.: On-line cyber attack detection in water networks through state forecasting and control by pattern recognition. In: World Environmental and Water Resources Congress 2017, vol. 510, pp. 583–592 (2017). https://doi.org/10.1061/9780784480625.054

  29. Chandy, S.E., Rasekh, A., Barker, Z.A., Campbell, B., Shafiee, M.E.: Detection of cyber-attacks to water systems through machine-learning-based anomaly detection in SCADA data. In: World Environmental and Water Resources Congress 2017, vol. 520, 611–616 (2017). https://doi.org/10.1061/9780784480625.057

  30. Pasha, M.F.K., Kc, B., Somasundaram, S.L.: An approach to detect the cyber-physical attack on water distribution system. In: World Environmental and Water Resources Congress 2017, vol. 584, pp. 703–711 (2017).https://doi.org/10.1061/9780784480625.065

  31. Aghashahi, M., Sundararajan, R., Pourahmadi, M., Banks, M.K.: Water distribution systems analysis symposium; battle of the attack detection algorithms 501 (BATADAL). In: World Environmental and Water Resources Congress 2017, vol. 502, pp. 101–108 (2017). https://doi.org/10.1061/9780784480595.010

Download references

Acknowledgement

This work was partially financed by the Faculty of Computer Science and Engineering at the “Ss. Cyril and Methodius” University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laze Gjorgiev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gjorgiev, L., Gievska, S. (2020). Time Series Anomaly Detection with Variational Autoencoder Using Mahalanobis Distance. In: Dimitrova, V., Dimitrovski, I. (eds) ICT Innovations 2020. Machine Learning and Applications. ICT Innovations 2020. Communications in Computer and Information Science, vol 1316. Springer, Cham. https://doi.org/10.1007/978-3-030-62098-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62098-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62097-4

  • Online ISBN: 978-3-030-62098-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics