Anomaly Detection for Industrial Big Data

نویسندگان

  • Neil Caithness
  • David Wallom
چکیده

As the Industrial Internet of Things (IIoTa) grows, systems are increasingly being monitored by arrays of sensors returning time-series data at ever-increasing ‘volume, velocity and variety’b (i.e. Industrial Big Datac). An obvious use for these data is real-time systems condition monitoring and prognostic time to failure analysis (remaining useful life, RUL). (e.g. See white papers by Senseye.io, Prognostics The Future of Condition Monitoringd, and output of the NASA Prognostics Center of Excellence (PCoEe).) However, as noted by Agrawal and Choudharyf ‘Our ability to collect “big data” has greatly surpassed our capability to analyze it, underscoring the emergence of the fourth paradigm of science, which is data-driven discovery.’ In order to fully utilize the potential of Industrial Big Data we need data-driven techniques that operate at scales that process models cannot. Here we present a prototype technique for data-driven anomaly detection to operate at industrial scale. The method generalizes to application with almost any multivariate dataset based on independent ordinations of repeated (bootstrapped) partitions of the dataset and inspection of the joint distribution of ordinal distances. ahttp://www3.weforum.org/docs/WEFUSA_IndustrialInternet_Report2015.pdf bhttps://aip.scitation.org/doi/10.1063/1.4907823 chttp://www.vix.com.pl/wp-content/uploads/the_rise_of_industrial_big_data.pdf dhttps://www.senseye.io/white-papers-senseye-scalable-predictive-maintenance/ ehttps://ti.arc.nasa.gov/tech/dash/groups/pcoe/ fhttps://aip.scitation.org/doi/full/10.1063/1.4946894

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Behavior-Based Online Anomaly Detection for a Nationwide Short Message Service

As fraudsters understand the time window and act fast, real-time fraud management systems becomes necessary in Telecommunication Industry. In this work, by analyzing traces collected from a nationwide cellular network over a period of a month, an online behavior-based anomaly detection system is provided. Over time, users' interactions with the network provides a vast amount of usage data. Thes...

متن کامل

Statistical wavelet-based anomaly detection in big data with compressive sensing

Anomaly detection in big data is a key problem in the big data analytics domain. In this paper, the definitions of anomaly detection and big data were presented. Due to the sampling and storage burden and the inadequacy of privacy protection of anomaly detection based on uncompressed data, compressive sensing theory was introduced and used in the anomaly detection algorithm. The anomaly detecti...

متن کامل

Big Trajectory Data Analysis for Clustering and Anomaly Detection

We’ve been developing a sensor that can acquire positional data. Recently, a position-based big data creation is easy task and trajectory analysis is the highest priority for ”position-based service”. Traffic congestion, marketing mining, and pattern analysis are the one of the examples in trajectory analysis field. In this paper, we propose the trajectory analysis approach for clustering and a...

متن کامل

Anomaly Detection Technology Using BigGraph

Many difficulties are encountered along all three axes of Big Data (volume, variety, and velocity), which limit the applicability of established technology. BigGraph is a research project and platform for realising the vision of an intelligent society, where requirements along all three axes can be accommodated. In the fraud detection scenario, working with Fujitsu UK & Ireland, BigGraph resear...

متن کامل

Toward Bulk Synchronous Parallel-Based Machine Learning Techniques for Anomaly Detection in High-Speed Big Data Networks

Anomaly detection systems, also known as intrusion detection systems (IDSs), continuously monitor network traffic aiming to identify malicious actions. Extensive research has been conducted to build efficient IDSs emphasizing two essential characteristics. The first is concerned with finding optimal feature selection, while another deals with employing robust classification schemes. However, th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018