Skip to main content

d-BTAI: The Dynamic-Binary Tree Based Anomaly Identification Algorithm for Industrial Systems

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12799))

Abstract

Many of the existing approaches to anomaly detection are based upon supervised learning and heavily dependent on training datasets. However, anomalies rarely occur in most industrial systems. Hence it is challenging to retrieve a training dataset labeled with true anomalies. Therefore, this motivates us to investigate such scenarios where it is arduous to get labeled data for anomalies. This paper has proposed a clustering-based recursive anomaly detection algorithm; dynamic-Binary Tree Anomaly Identifier (d-BTAI). d-BTAI has been applied on industrial devices since anomalies in large industrial devices can incur massive losses. The algorithm has experimented on various publicly available industrial datasets such as Cloudwatch, Yahoo, and Backblaze. d-BTAI has attained a higher Area under the ROC curve (AUC) in comparison with Isolation Forest (iForest), One Class Support Vector Machine (OCSVM), and Elliptic Envelope. The higher Negative Predictive Value (NPV) and specificity value demonstrate the algorithm’s efficacy on multiple datasets.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. https://webscope.sandbox.yahoo.com/catalog.php?datatype=s&did=70. Accessed 15 Jan 2019

  2. Backblaze failure data. https://www.backblaze.com/b2/hard-drive-test-data.htm. Accessed 2 Mar 2019

  3. Globenewswire. https://www.globenewswire.com/news-release/2019/05/13/1822194/0/en/Medical-Equipment-Maintenance-Market-to-Reach-26-4-Billion-by-2024-P-S-Intelligence.html. Accessed 15 Feb 2020

  4. Nab. https://github.com/numenta/NAB/tree/master/data. Accessed 15 Jan 2019

  5. Apiletti, D., et al.: istep, an integrated self-tuning engine for predictive maintenance in industry 4.0. In: IEEE International Conference on ISPA-IUCC-BDCloud-SocialCom-SustainCom (2018)

    Google Scholar 

  6. Bruke, R.: Hazmat studies: Nmr and mri medical scanners: Surviving the ïnvisible force (2012). https://www.firehouse.com/rescue/article/10684588/firefighter-hazmat-situations. Accessed 15 Feb 2019

  7. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection. ACM Comput. Surv. 41(3), 1–58 (2009). https://doi.org/10.1145/1541880.1541882

  8. Chigurupati, A., Thibaux, R., Lassar, N.: Predicting hardware failure using machine learning. In: 2016 Annual Reliability and Maintainability Symposium (RAMS), Tucson, AZ, USA, January 2016. https://doi.org/10.1109/RAMS.2016.7448033

  9. Erfani, S., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121–134 (2016)

    Article  Google Scholar 

  10. He, Z., Xu, X., Deng, S.: Discovering cluster-based local outliers. Pattern Recogn. Lett. 24, 1641–1650 (2003)

    Article  Google Scholar 

  11. Karczmarek, P., Kiersztyn, A., Pedrycz, W., Al, E.: K-means-based isolation forest. Knowl. Syst. 195 (2020)

    Google Scholar 

  12. Liu, T.F., Ting, M.K., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 273–280 (2008). https://doi.org/10.1109/ICDMW.2016.0046

  13. Munir, M., Siddiqui, A.S., Dengel, A., Ahmed, S.: Deepant: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 1(1), 1085–1100 (2018). https://doi.org/10.1109/access.2018.2886457

  14. Narsingyani, D., Kale, O.: Optimizing false positive in anomaly based intrusion detection using genetic algorithm. In: 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education (MITE) (2015)

    Google Scholar 

  15. Rousseeuw, P.J., Driessen, K.V.: A fast algorithm for the minimum covariance determinant estimator. Technometrics 41(3), 212–223 (1999). https://doi.org/10.1080/00401706.1999.10485670

  16. Russo, A., Sarkar, S., Pecchia, S.: Assessing invariant mining techniques for cloud-based utility computing systems. IEEE Trans. Serv. Comput. (2017)

    Google Scholar 

  17. Shang, W., Li, L., Wan, M., Zeng, P.: Industrial communication intrusion detection algorithm based on improved one-class SVM. In: 2015 World Congress on Industrial Control Systems Security (WCICSS) (2015). https://doi.org/10.1109/wcicss.2015.7420317

  18. Yin, C., S. Zhang, J.W., Xiong, N.N.: Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans. Syst. Man Cybern. Syst. 1–11 (2020). https://doi.org/10.1109/tsmc.2020.2968516

  19. Zhang, L., Lin, J., Karim, R.: Adaptive kernel density-based anomaly detection for nonlinear systems. Knowl. Based Syst. 41(3), 50–63 (2018)

    Google Scholar 

  20. Zhou, C., Paffenroth, R.C.: Anomaly detection with robust deep autoencoders. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD (2017). https://doi.org/10.1145/3097983.3098052

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sarkar, J., Sarkar, S., Saha, S., Das, S. (2021). d-BTAI: The Dynamic-Binary Tree Based Anomaly Identification Algorithm for Industrial Systems. In: Fujita, H., Selamat, A., Lin, J.CW., Ali, M. (eds) Advances and Trends in Artificial Intelligence. From Theory to Practice. IEA/AIE 2021. Lecture Notes in Computer Science(), vol 12799. Springer, Cham. https://doi.org/10.1007/978-3-030-79463-7_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-79463-7_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-79462-0

  • Online ISBN: 978-3-030-79463-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics