Two effective anomaly correction methods in embedded systems

In this paper, two anomaly correction methods are proposed which are based on Markov and Stide detection methods. Both methods consist of three steps: 1) Training, 2) Anomaly detection and 3) Anomaly Correction. In training step, the Morkov-based method constructs a transition matrix; Stidebased method makes a database by events with their frequency. In detection step, when the probability of transition from previous event to current event does not reach a predefined threshold, the morkov-based method detects an anomaly. While, if frequency of unmatched events exceeds from the threshold value, Stide-based method determined an anomaly. In the correction step, the methods check the defined constraints for each anomalous event to find source of anomaly and a suitable way to correct the anomalous event. Evaluation of the proposed methods are done using a total of 7000 data sets. The window size of corrector and the number of injected anomalies varied between 3 and 5, 1 and 7, respectively. The experiments have been done to measure the correction coverage rate for Markov-based and Stide-based methods which are on average 77.66% and 60.9%, respectively. Area consumptions in Makov-based and Stide-based methods are on average 415.48μm2 and 239.61μm2, respectively.

[1]  Jonathan D. Cryer,et al.  Time Series Analysis , 1986 .

[2]  Bernd Freisleben,et al.  CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).

[3]  Ran Wolff,et al.  Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .

[4]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[5]  Alberto Sangiovanni-Vincentelli,et al.  An embedded system for an eye-detection sensor , 2005, Comput. Vis. Image Underst..

[6]  Andrea Torsello,et al.  Similarity-Based Pattern Recognition , 2006, Lecture Notes in Computer Science.

[7]  Navdeep Singh,et al.  A Survey of Intrusion Detection Techniques , 2013 .

[8]  P. Sajda,et al.  Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model , 2001, Proceedings IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA 2001).

[9]  Hamid R. Zarandi,et al.  Two effective methods to detect anomalies in embedded systems , 2012, Microelectron. J..

[10]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[11]  Arnaud Virazel,et al.  Error Resilient Infrastructure for Data Transfer in a Distributed Neutron Detector , 2011, 2011 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems.

[12]  Jeff G. Schneider,et al.  Detecting anomalous records in categorical datasets , 2007, KDD '07.

[13]  Youngju Kim,et al.  Amorphous Slack Methodology for Autonomous Fault-Handling in Reconfigurable Devices , 2012 .

[14]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[15]  Ernesto Araujo,et al.  Fuzzy Decision in Airplane Speed Control , 2006, 2006 IEEE International Conference on Fuzzy Systems.

[16]  Himanshu Bhatnagar Advanced ASIC Chip Synthesis: Using Synopsys' Design Compiler and PrimeTime , 1999 .

[17]  Joseph B. Evans,et al.  Anomaly Detection with Sensor Data for Distributed Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[18]  Himanshu Bhatnagar Advanced ASIC Chip Synthesis: Using Synopsys Design Compiler Physical Compiler and Prime Time , 2002 .

[19]  Eyal Amir,et al.  Real-time Bayesian Anomaly Detection for Environmental Sensor Data , 2007 .

[20]  Kymie M. C. Tan,et al.  Anomaly Detection in Embedded Systems , 2002, IEEE Trans. Computers.

[21]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.