Abstract
At present, the data related to the Internet of Things has shown explosive growth, and the importance of data has been greatly improved. Data collection and analysis are becoming more and more valuable. However, a large number of abnormal data will bring great trouble to our research, and even lead people into misunderstandings. Therefore, anomaly detection is particularly necessary and important. The purpose of this paper is to find an efficient and accurate outlier detection algorithm. Our work also analyzes their advantages and disadvantages theoretically. At the same time, the effects of the data set size, number of proximity points, and data dimension on CPU time and precision are discussed. The performance, advantages and disadvantages of each algorithm in dealing with high-dimensional data are compared and analyzed. Finally, the algorithm is used to analyze the actual anomaly data collected from the Internet of Things and analyze the results. The results show that the LOF algorithm can find the abnormal data in the data set in a shorter time and with higher accuracy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lyu, L., Jin, J., Rajasegarar, S., et al.: Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering. IEEE Internet of Things J. 4(5), 1174–1184 (2017)
Kriegel, H.-P., Schubert, M., Zimek, A.: Angle-based outlier detection in high-dimensional data. In: KDD, Las Vegas, Nevada, USA (2008)
Breunig, M.M., Kriegel, H.-P., Ng, R.T., et al.: LOF: identifying density-based local outliers. In: ACM MOD, Dallas, TX USA (2000)
Taghizadeh, M.J., Parhizkar, R., Garner, P.N., Bourlard, H., Asaei, A.: Ad hoc microphone array calibration: euclidean distance matrix completion algorithm and theoretical guarantees. Sig. Process. 170, 123–140 (2014)
Zarpelão, B.B., Miani, R.S., Kawakani, C.T., et al.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017)
Trihinas, D., Pallis, G., Dikaiakos, M.D.: ADMin: adaptive monitoring dissemination for the internet of things. In: IEEE Conference on Computer Communications, INFOCOM 2017, pp. 1–9. IEEE (2017)
Gregg, D., David, U.: Parameterizing dose-response models to estimate relative potency functions directly. Toxicol. Sci. 129, 447–455 (2012)
Liu, C.-S.: Reconcile the perfectly elastoplastic model to simulate the cyclic behavior and ratcheting. Int. J. Solids Struct. 43(2), 222–253 (2005)
Kriegel, H.P., Zimek, A.: Angle-based outlier detection in high-dimensional data. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 444–452. ACM (2008)
Lu, Y., Qin, X.S.: Multisite rainfall downscaling and disaggregation in a tropical urban area. J. Hydrol. 509, 55–65 (2014)
Le Grand, S., Götz, A.W., Walker, R.C.: SPFP: speed without compromise—a mixed precision model for GPU accelerated molecular dynamics simulations. Comput. Phys. Commun. 184(2), 374–380 (2013)
Polišenská, K., Chiat, S., Comer, A., McKenzie, K.: Semantic effects in sentence recall: the contribution of immediate vs delayed recall in language assessment. J. Commun. Disord. 52, 65–77 (2014)
Feng, D.-C., Chen, F., Xu, W.-L.: Detecting local manifold structure for unsupervised feature selection. Acta Automatica Sinica 40, 2253–2261 (2014)
Zhou, M., Wang, Y., Srivastava, A.K., et al.: Ensemble based algorithm for synchrophasor data anomaly detection. IEEE Trans. Smart Grid (2018)
Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18–32 (2014)
Erfani, S.M., Rajasegarar, S., Karunasekera, S., et al.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121–134 (2016)
Acknowledgement
This work is partially supported by Project No. 5211DS16001R of State Grid Zhejiang Electric Power Co., Ltd. This work is also supported by the National Natural Science Foundation of China (NSFC) under Grant No. 61502374.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wang, Z., Liu, Z., Yuan, X., Xu, Y., Li, R. (2019). Assessing Data Anomaly Detection Algorithms in Power Internet of Things. In: Gao, H., Wang, X., Yin, Y., Iqbal, M. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 268. Springer, Cham. https://doi.org/10.1007/978-3-030-12981-1_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-12981-1_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12980-4
Online ISBN: 978-3-030-12981-1
eBook Packages: Computer ScienceComputer Science (R0)