rithm. The algorithms according to their run-time per-
formance are as follows: The rule-based method and
the S-H-ESD method are the fastest with an execution
time of 0.5s. Then, the LOF method with an execu-
tion time equal to 2.5s. Subsequently our algorithm
with 5.40s of execution time and finally ARIMA with
7.60s.
5 CONCLUSION
Anomaly detection in supervisory applications is very
important especially in the field of sensor networks.
This paper represents the CoRP approach based on
patterns applied to the univariate time series of sen-
sor data. This method is very effective at simultane-
ously detecting different types of anomalies observed
during actual deployments. Our algorithm is com-
posed of two steps: it marks (labels) all the remark-
able points present in the time series on the basis of
patterns of detection. Then, he precisely identifies
the multiple anomalies present by label compositions.
This approach requires application domain expertise
to be able to efficiently define patterns. Our case
study is based on a real context: sensor data from the
SGE (Rangueil campus management and operation
service in Toulouse). The evaluation of this method
is illustrated by first using the index and consumption
data of calorie sensors operated by the SGE and, sec-
ondly, by using datasets from the scientific literature.
We compare our algorithm to five methods belong-
ing to different anomaly detection techniques. Based
on the precision, recall, f-measure, evaluation crite-
ria, we show that our algorithm is the most efficient
at detecting different types of anomalies by minimiz-
ing false detections. There are several extensions of
this research, among them: i) Use learning methods to
automate the algorithm, model the patterns automati-
cally and improve its performance in terms of calcu-
lation ii) Apply our algorithm on data streams, which
are generated continuously, to trace alarms as early
as possible and detect anomalies even before storing
them in the databases.
ACKNOWLEDGEMENT
This work is in collaboration with the the Manage-
ment and Exploitation Service (SGE) of Rangueil
campus attached to the Rectorate of Toulouse. The
authors would like to thank the SGE, directed by Vir-
ginie Cellier, to provide us with access to sensor data
from their databases. Also, they are grateful for the
experts who have facilitated the understanding of the
data and anomalies observed in actual deployments.
REFERENCES
Agrawal, S. and Agrawal, J. (2015). Survey on anomaly de-
tection using data mining techniques. Procedia Com-
puter Science, 60:708–713.
Aminikhanghahi, S. and Cook, D. J. (2017). A survey
of methods for time series change point detection.
Knowledge and information systems, 51(2):339–367.
Basseville, M., Nikiforov, I. V., et al. (1993). Detection of
abrupt changes: theory and application, volume 104.
Prentice Hall Englewood Cliffs.
Breunig, M. M., Kriegel, H.-P., Ng, R. T., and Sander, J.
(2000). Lof: identifying density-based local outliers.
volume 29, pages 93–104. ACM sigmod record.
Chandola, V., Banerjee, A., and Kumar, V. (2009).
Anomaly detection: A survey. ACM computing sur-
veys (CSUR), 41(3):15.
Chen, C. and Liu, L.-M. (1993). Joint estimation of model
parameters and outlier effects in time series. Journal
of the American Statistical Association, 88(421):284–
297.
Cleveland, R. B., Cleveland, W. S., McRae, J. E., and Ter-
penning, I. (1990). Stl: A seasonal-trend decomposi-
tion. Journal of Official Statistics, 6(1):3–73.
Hochenbaum, J., Vallis, O. S., and Kejariwal, A. (2017).
Automatic anomaly detection in the cloud via statisti-
cal learning. arXiv preprint arXiv:1704.07706.
Hodge, V. and Austin, J. (2004). A survey of outlier de-
tection methodologies. Artificial intelligence review,
22(2):85–126.
L
´
opez-de Lacalle, J. (2016). tsoutliers r package for detec-
tion of outliers in time series. CRAN, R Package.
Ramanathan, N., Balzano, L., Burt, M. C., Estrin, D., Har-
mon, T., Harvey, C. K., Jay, J., Kohler, E., Rothenberg,
S. E., and Srivastava, M. B. (2006). Rapid deploy-
ment with confidence : Calibration and fault detection
in environmental sensor networks.
Rosner, B. (1983). Percentage points for a generalized esd
many-outlier procedure. Technometrics, 25(2):165–
172.
Sharma, A. B., Golubchik, L., and Govindan, R. (2010).
Sensor faults: Detection methods and prevalence in
real-world datasets. ACM Transactions on Sensor Net-
works (TOSN), 6(3):23.
Sreevidya, S. et al. (2014). A survey on outlier detection
methods. (IJCSIT) International Journal of Computer
Science and Information Technologies, 5(6).
Upadhyaya, S. and Singh, K. (2012). Nearest neighbour
based outlier detection techniques. International Jour-
nal of Computer Trends and Technology, 3(2):299–
303.
Yao, Y., Sharma, A., Golubchik, L., and Govindan, R.
(2010). Online anomaly detection for sensor systems:
A simple and efficient approach. Performance Evalu-
ation, 67(11):1059–1075.
Pattern-based Method for Anomaly Detection in Sensor Networks
113