Comprehensive Analysis and Improved Techniques for Anomaly Detection in Time Series Data with Autoencoder Models
How to cite (IJASEIT) :
H. Yang, S. Kumara, S. T. S. Bukkapatnam, and F. Tsung, “The internet of things for smart manufacturing: A review,” IISE Transactions, vol. 51, no. 11, pp. 1190–1216, May 2019, doi:10.1080/24725854.2018.1555383.
A. Khudoyberdiev, I. Ullah, and D. Kim, “Optimization-assisted water supplement mechanism with energy efficiency in IoT based greenhouse,” Journal of Intelligent & Fuzzy Systems, vol. 40, no. 5, pp. 10163–10182, Apr. 2021, doi: 10.3233/jifs-200618.
F. Zantalis, G. Koulouras, S. Karabetsos, and D. Kandris, “A Review of Machine Learning and IoT in Smart Transportation,” Future Internet, vol. 11, no. 4, p. 94, Apr. 2019, doi: 10.3390/fi11040094.
A. Khudoyberdiev, S. S. R. Garnaik, H. Y. Kim, and J. Ryoo, “A Study of the Man and Unmanned Teaming System for Improving Efficiency in a Fulfillment Center,” IEEE Access, vol. 11, pp. 139587–139600, 2023, doi: 10.1109/access.2023.3341396.
O. A. Qowiy et al., “Online Real-Time Monitoring System of A Structural Steel Railway Bridge Using Wireless Smart Sensors,” International Journal on Advanced Science, Engineering and Information Technology, vol. 14, no. 2, pp. 381–392, Apr. 2024, doi:10.18517/ijaseit.14.2.19291.
S. Ahmad, F. Jamil, A. Khudoyberdiev, and D. Kim, “Accident risk prediction and avoidance in intelligent semi-autonomous vehicles based on road safety data and driver biological behaviours1,” Journal of Intelligent & Fuzzy Systems, vol. 38, no. 4, pp. 4591–4601, Apr. 2020, doi: 10.3233/jifs-191375.
L. Yuan, "Scientific conception of coal mine dust control and occupational safety", Journal of China Coal Society, vol. 45, pp. 1-7, January 2020.
S. Ahmad, A. Khudoyberdiev, and D. Kim, “Towards the Task-Level Optimal Orchestration Mechanism in Multi-Device Multi-Task Architecture for Mission-Critical IoT Applications,” IEEE Access, vol. 7, pp. 140922–140935, 2019, doi: 10.1109/access.2019.2942611.
S. Schmidl, P. Wenig, and T. Papenbrock, “Anomaly detection in time series,” Proceedings of the VLDB Endowment, vol. 15, no. 9, pp. 1779–1797, May 2022, doi: 10.14778/3538598.3538602.
W.-H. Kim, G.-W. Kim, J. Ahn, and K. Chung, “Time-Series Data Augmentation for Improving Multi-Class Classification Performance,” International Journal on Advanced Science, Engineering and Information Technology, vol. 14, no. 3, pp. 887–893, Jun. 2024, doi:10.18517/ijaseit.14.3.18550.
G. Li and J. J. Jung, “Deep learning for anomaly detection in multivariate time series: Approaches, applications, and challenges,” Information Fusion, vol. 91, pp. 93–102, Mar. 2023, doi:10.1016/j.inffus.2022.10.008.
A. Khudoyberdiev, M. Abdul Jaleel, I. Ullah, and D. Kim, “Enhanced Water Quality Control Based on Predictive Optimization for Smart Fish Farming,” Computers, Materials & Continua, vol. 75, no. 3, pp. 5471–5499, 2023, doi: 10.32604/cmc.2023.036898.
M. Braei and S. Wagner, "Anomaly detection in univariate time-series: A survey on the state-of-the-art" in arXiv:2004.00433, 2020, [online] Available: http://arxiv.org/abs/2004.00433.
Y. Zhang, Y. Chen, J. Wang, and Z. Pan, “Unsupervised Deep Anomaly Detection for Multi-Sensor Time-Series Signals,” IEEE Transactions on Knowledge and Data Engineering, pp. 1–1, 2021, doi:10.1109/tkde.2021.3102110.
M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander, “LOF,” Proceedings of the 2000 ACM SIGMOD international conference on Management of data, pp. 93–104, May 2000, doi:10.1145/342009.335388.
J. Tang, Z. Chen, A. W. Fu, and D. W. Cheung, “Enhancing Effectiveness of Outlier Detections for Low Density Patterns,” Advances in Knowledge Discovery and Data Mining, pp. 535–548, 2002, doi: 10.1007/3-540-47887-6_53.
Y. Wei, J. Jang-Jaccard, W. Xu, F. Sabrina, S. Camtepe, and M. Boulic, “LSTM-Autoencoder-Based Anomaly Detection for Indoor Air Quality Time-Series Data,” IEEE Sensors Journal, vol. 23, no. 4, pp. 3787–3800, Feb. 2023, doi: 10.1109/jsen.2022.3230361.
S. Chauhan and L. Vig, “Anomaly detection in ECG time signals via deep long short-term memory networks,” 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 1–7, Oct. 2015, doi: 10.1109/dsaa.2015.7344872.
S. Kanarachos, S.-R. G. Christopoulos, A. Chroneos, and M. E. Fitzpatrick, “Detecting anomalies in time series data via a deep learning algorithm combining wavelets, neural networks and Hilbert transform,” Expert Systems with Applications, vol. 85, pp. 292–304, Nov. 2017, doi: 10.1016/j.eswa.2017.04.028.
T. Amarbayasgalan, B. Jargalsaikhan, and K. H. Ryu, “Unsupervised Novelty Detection Using Deep Autoencoders with Density Based Clustering,” Applied Sciences, vol. 8, no. 9, p. 1468, Aug. 2018, doi:10.3390/app8091468.
M. Munir, S. A. Siddiqui, A. Dengel, and S. Ahmed, “DeepAnT: A Deep Learning Approach for Unsupervised Anomaly Detection in Time Series,” IEEE Access, vol. 7, pp. 1991–2005, 2019, doi:10.1109/access.2018.2886457.
A. Taylor, N. Japkowicz, and S. Leblanc, “Frequency-based anomaly detection for the automotive CAN bus,” 2015 World Congress on Industrial Control Systems Security (WCICSS), pp. 45–49, Dec. 2015, doi: 10.1109/wcicss.2015.7420322.
N. Sehatbakhsh, M. Alam, A. Nazari, A. Zajic, and M. Prvulovic, “Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices,” 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 1–8, Apr. 2018, doi: 10.1109/hst.2018.8383884.
M. Xie, J. Hu, X. Yu, and E. Chang, “Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD,” Network and System Security, pp. 542–549, 2014, doi:10.1007/978-3-319-11698-3_44.
L. Gjorgiev and S. Gievska, “Time Series Anomaly Detection with Variational Autoencoder Using Mahalanobis Distance,” ICT Innovations 2020. Machine Learning and Applications, pp. 42–55, 2020, doi: 10.1007/978-3-030-62098-1_4.
K. Choi, J. Yi, C. Park, and S. Yoon, “Deep Learning for Anomaly Detection in Time-Series Data: Review, Analysis, and Guidelines,” IEEE Access, vol. 9, pp. 120043–120065, 2021, doi:10.1109/access.2021.3107975.
F. A. Mazarbhuiya, M. Y. AlZahrani, and L. Georgieva, “Anomaly Detection Using Agglomerative Hierarchical Clustering Algorithm,” Information Science and Applications 2018, pp. 475–484, Jul. 2018, doi: 10.1007/978-981-13-1056-0_48.
Y. Lian, Y. Geng, and T. Tian, “Anomaly Detection Method for Multivariate Time Series Data of Oil and Gas Stations Based on Digital Twin and MTAD-GAN,” Applied Sciences, vol. 13, no. 3, p. 1891, Feb. 2023, doi: 10.3390/app13031891.
H. Torabi, S. L. Mirtaheri, and S. Greco, “Practical autoencoder based anomaly detection by using vector reconstruction error,” Cybersecurity, vol. 6, no. 1, Jan. 2023, doi: 10.1186/s42400-022-00134-9.
H.-K. Shin, W. Lee, J.-H. Yun and H. Kim, “HAI 1.0: Hil-based augmented ICS security dataset”, Proc. 13th USENIX Workshop Cyber Security Experimentation Test, pp. 1-5, Aug. 2020, [online] Available: https://www.usenix.org/conference/cset20/presentation/shin.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).