Skip to main content

Context-Aware Anomaly Detection in Embedded Systems

  • Conference paper
  • First Online:
Book cover Advances in Dependability Engineering of Complex Systems (DepCoS-RELCOMEX 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 582))

Included in the following conference series:

Abstract

To meet the reliability of embedded systems, fault-tolerant methods are widely used. The first step in many of these methods is detecting faults and anomaly detection is often the primary technique which leads to early indication of faults. In the context of embedded systems, some anomaly detection methods are available however; none of them are adaptable to dynamic environments. All of the previous works attempt to provide anomaly detection systems without considering the context of the data. Contextual anomalies, also referred to as conditional anomalies, have different behavior in different contexts. The purpose of designing a context-aware anomaly detection mechanism is to provide the capability of detecting anomalies while the system’s environment changes. In this paper, a method for detecting anomalies is proposed which adapts itself to the changes in dynamic environments during detection phase. This method first gives the context of a small window in a data flow and then loads corresponding configuration to the anomaly detector. The results have shown an average of 68.83% of true positive rate and 11.41% of false alarm rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Budalakoti, S., Srivastava, A.N., Otey, M.E.: Anomaly detection and diagnosis algorithms for discrete symbol sequences with applications to airline safety. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 39, 101–113 (2009)

    Article  Google Scholar 

  2. Maxion, R., Tan, K.: Anomaly detection in embedded systems. IEEE Trans. Comput. 51, 108–120 (2002)

    Article  Google Scholar 

  3. Chandola, V.: Anomaly detection for symbolic sequences and time series data, University of Minnesota (2009)

    Google Scholar 

  4. Margineantu, D., Bay, S., Chan, P., Lane, T.: Data mining methods for anomaly detection kdd-2005 workshop report. ACM SIGKDD Explor. Newslett. 7, 132–136 (2005)

    Article  Google Scholar 

  5. Hancock, E., Pelillo, M.: Similarity-Based Pattern Recognition. Springer, Heidelberg (2011)

    MATH  Google Scholar 

  6. Maxion, R., Feather, F.E.: A case study of ethernet anomalies in a distributed computing environment. IEEE Trans. Reliab. 39, 433–443 (1990)

    Article  Google Scholar 

  7. McCluskey, A., Lalkhen, A.G.: Statistics I: data and correlations. Continuing Educ. Anaesth. Crit. Care Pain 7, 95–99 (2007)

    Article  Google Scholar 

  8. Akoglu, L., Tong, H., Vreeken, J., Faloutsos, C.: Fast and reliable anomaly detection in categorical data. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 415–424 (2012)

    Google Scholar 

  9. Hayes, M.A., Capretz, M.A.: Contextual anomaly detection framework for big sensor data. J. Big Data 2, 1–22 (2015)

    Article  Google Scholar 

  10. Jiang, Y., Zeng, C., Xu, J., Li, T.: Real time contextual collective anomaly detection over multiple data streams. In: Proceedings of the ODD, pp. 23–30 (2014)

    Google Scholar 

  11. Janakiram, D., Adi Mallikarjuna Reddy, V.: Outlier detection in wireless sensor networks using Bayesian belief networks. In: First International Conference on Communication System Software and Middleware, pp. 1–6 (2006)

    Google Scholar 

  12. Srivastava, A.N.: Discovering system health anomalies using data mining techniques. In: Proceedings of Joint Army Navy NASA Airforce Conference on Propulsion (2005)

    Google Scholar 

  13. Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 133–145 (1999)

    Google Scholar 

  14. Zandrahimi, M., Zarandi, H.R., Mottaghi, M.H.: Two effective methods to detect anomalies in embedded systems. Microelectron. J. 43, 77–87 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fatemeh Ehsani-Besheli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Ehsani-Besheli, F., Zarandi, H.R. (2018). Context-Aware Anomaly Detection in Embedded Systems. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Advances in Dependability Engineering of Complex Systems. DepCoS-RELCOMEX 2017. Advances in Intelligent Systems and Computing, vol 582. Springer, Cham. https://doi.org/10.1007/978-3-319-59415-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59415-6_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59414-9

  • Online ISBN: 978-3-319-59415-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics