Skip to main content

A Framework Based Isolation Forest for Detecting Anomalies in Natural Gas Production

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1554))

  • 275 Accesses

Abstract

Natural gas is one of the main fossil fuels, and it is widely used in residential and industrial applications. The demand for natural gas is constantly increasing. However, due to the complex and diverse production environment for gas production, abnormal events that occur during the production of natural gas wells will reduce the gas production of gas wells with sufficient gas reservoirs. At present, detecting abnormal event in gas production mainly relies on engineers according to their own experience. This method is unreliable and requires a lot of manpower. In this paper, the first unsupervised framework for detecting anomalies in natural gas production is proposed. In this framework, a novel data convention method using a time window is proposed to enable the capture of the contextual anomaly. Besides, a low time-complexity and a small memory-requirement method called Isolation Forest is used to build a detector. Moreover, the maximum information coefficient (MIC) based feature selection mechanism reduces the high dimension caused by data convention in order to solve the increasing complexity of natural gas data sets. We apply our framework to several real natural gas well production data set labeled manually. Observations show that this framework increases the accuracy of the detection in the actual gas well production.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alallaq, N., Al-khiza’ay, M., Dohan, M.I., Han, X.: Sentiment analysis to enhance detection of latent astroturfing groups in online social networks. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds.) ATIS 2018. CCIS, vol. 950, pp. 79–91. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-2907-4_7

    Chapter  Google Scholar 

  2. Alallaq, N., Al-khiza’ay, M., Han, X.: Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain. Cybersecurity 2(1), 1–11 (2019). https://doi.org/10.1186/s42400-019-0029-8

    Article  Google Scholar 

  3. Albanese, D., Riccadonna, S., Donati, C., Franceschi, P.: A practical tool for maximal information coefficient analysis. Oxford Open 7(4), giy032 (2018)

    Google Scholar 

  4. Lin, B., Wesseh, P.K., Jr.: Estimates of inter-fuel substitution possibilities in Chinese chemical industry. Energy Econ. 40(2), 560–568 (2013)

    Article  Google Scholar 

  5. Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: Lof: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93–104 (2000)

    Google Scholar 

  6. Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)

    Article  Google Scholar 

  7. Hanley, J.A., Mcneil, B.J.: The meaning and use of the area under a receiver operating characteristic (roc) curve. Radiology 143(1), 29 (1982)

    Article  Google Scholar 

  8. Hwang, I., Kim, S., Kim, Y., Seah, C.E.: A survey of fault detection, isolation, and reconfiguration methods. IEEE Trans. Control Syst. Technol. 18(3), 636–653 (2009)

    Article  Google Scholar 

  9. Kriegel, H.P., Kröger, P., Schubert, E., Zimek, A.: Loop: local outlier probabilities. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, pp. 1649–1652 (2009)

    Google Scholar 

  10. Li, G., Tan, J., Chaudhry, S.S.: Industry 4.0 and big data innovations. Enterp. Inf. Syst. 13(2), 145–147 (2019). https://doi.org/10.1080/17517575.2018.1554190

  11. Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413–422. IEEE (2008)

    Google Scholar 

  12. Milojevic, S.: Sustainable application of natural gas as engine fuel in city buses: benefit and restrictions. Istrazivanja i Projektovanja za Privredu 15(1), 81–88 (2017)

    Article  Google Scholar 

  13. Naseer, S., Faizan Ali, R., Dominic, P., Saleem, Y.: Learning representations of network traffic using deep neural networks for network anomaly detection: a perspective towards oil and gas it infrastructures. Symmetry 12(11), 1882 (2020)

    Article  Google Scholar 

  14. Ord, K.: Outliers in statistical data. In: Barnett, V., Lewis, T. (eds.) 3rd edition, Wiley, Chichester, 584 p. [UK pound]55.00, 175–176 (1994), ISBN 0-471-93094-6. Int. J. Forecast. 12(1) (1996). https://ideas.repec.org/a/eee/intfor/v12y1996i1p175-176.html

  15. Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 427–438 (2000)

    Google Scholar 

  16. Rousseeuw, P.J., Hubert, M.: Robust statistics for outlier detection. Wiley Interdisc. Rev. Data Min. Knowl. Discovery 1(1), 73–79 (2011)

    Article  Google Scholar 

  17. Subramani, S., Wang, H., Vu, H.Q., Li, G.: Domestic violence crisis identification from Facebook posts based on deep learning. IEEE Access 6, 54075–54085 (2018). https://doi.org/10.1109/ACCESS.2018.2871446

    Article  Google Scholar 

  18. Vu, H.Q., Luo, J.M., Ye, B.H., Li, G., Law, R.: Evaluating museum visitor experiences based on user-generated travel photos. J. Travel Tourism Market. 35(4), 493–506 (2018). https://doi.org/10.1080/10548408.2017.1363684

    Article  Google Scholar 

  19. Xia, H., Vu, H.Q., Law, R., Li, G.: Evaluation of hotel brand competitiveness based on hotel features ratings. Int. J. Hospitality Manage. 86, 102366 (2020). https://doi.org/10.1016/j.ijhm.2019.102366, https://www.sciencedirect.com/science/article/pii/S0278431919303019

  20. Zhu, T., Li, G., Zhou, W., Xiong, P., Yuan, C.: Privacy-preserving topic model for tagging recommender systems. Knowl. Inf. Syst. 46(1), 33–58 (2015). https://doi.org/10.1007/s10115-015-0832-9

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, S., Wang, Z., Liu, L., Liu, Y., Chen, H., Tang, X. (2022). A Framework Based Isolation Forest for Detecting Anomalies in Natural Gas Production. In: Pokhrel, S.R., Yu, M., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2021. Communications in Computer and Information Science, vol 1554. Springer, Singapore. https://doi.org/10.1007/978-981-19-1166-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-1166-8_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-1165-1

  • Online ISBN: 978-981-19-1166-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics