Figure 8: Labeled anomaly regions.
The next step was to apply a thresholding
method in order to identify regions with faulty
signals. The value of the threshold is determined in
this case automatically from the histogram of the C1
values: the threshold value is the lowest point of a
„valley” that separate the normal and abnormal c1
values. Figure 8 shows the final result with the
labeled values.
4 CONCLUSIONS
This paper showed that anomaly detection methods
may be derived from a system identification method.
The first example considered a system that may be
described with a first order differential equation. The
coefficients a and b of the discrete equation show
variations that can be exploited for anomaly
detection. The second example considered a system
where the input signal is not known. In this case an
autoregression model was computed. Again, one of
the coefficients of the discrete formula could be used
for anomaly detection.
In both cases the actual sequence of processing
steps needed for an accurate detection had to be
adjusted with the specific characteristics of the
analyzed system. So, from this point of view a
single method cannot be generally applied to any
real-life problems. But, with some adjustments the
proposed method may solve a wider range of
applications.
As it was demonstrated, the proposed anomaly
detection method can detect slight changes in the
behavior of a given system, that can be interpreted
as anomalies and which may not be detected by
more traditional methods or even by a human
observer. The proposed method also eliminate false
anomaly alerts which are caused by significant
changes in the input signal that affect also the
output; usually other anomaly methods ignore the
input signal and its effect on the output signal.
The proposed method is rather simple and may
be implemented on embedded devices with limited
computing or storage capabilities, such as
microcontrollers or DSPs. It is also recommended
for on-line anomaly detection.
As future work, we intend to apply pattern
recognition and classification methods (e.g. neural
networks and SVM) on the graph of the computed
model coefficients in order to discriminate between
normal and abnormal system behaviors.
ACKNOWLEDGMENT
The results presented in this paper were obtained
with the support of the Technical University of Cluj-
Napoca through the research Contract no.
1995/12.07.2017, Internal Competition CICDI-2017.
REFERENCES
Barnett, V. and Lewis, T., 1994 Outliers in Statistical
Data, New York: John Wiley Sons.
Chandola, V., Banerjee, A., Kumar, V., 2009. Anomaly
Detection: A Survey ACM Computing Surveys 41, 3.
Estevez-Tapiador, J. M., Garcia-Teodoro, P., Diaz-
Verdejo, J. E., 2014 Anomaly detection methods in
wired networks: a survey and taxonomy, Computer
Communications, volume 27
Rassam, M. A.; Zainal, A.; Maarof, M. A., 2013
Advancements of Data Anomaly Detection Research
in Wireless Sensor Networks: A Survey and Open
Issues. Sensors, 13, 10087-10122.
Agrawal, S., Agrawal, J., 2015 Survey on Anomaly
Detection using Data Mining Techniques, 19th
International Conference on Knowledge Based and
Intelligent Information and Engineering Systems, ed.
Elsevier, Procedia Computer Science 60, 708 713
Gupta, M., Gao, J., Aggarwal, C. C., Han, J., 2014 Outlier
Detection for Temporal Data: A Survey, IEEE
Transactions On Knowledge And Data Engineering,
vol. 25, no. 1
Cateni, S., Colla, V. and Vannucci, M., 2008 Outlier
Detection Methods for Industrial Applications, chapter
in book “Advances in Robotics, Automation and
Control”, book edited by Jesus Aramburo and Antonio
Ramirez Trevino, ISBN 978-953-7619-16-9
Zhang Y., Meratnia N., and Havinga P., 2010 Outlier
Detection Techniques for Wireless Sensor Networks:
A Survey, IEEE Communications Surveys and
Tutorials, vol. 12, no. 2.