Variational LSTM Enhanced Anomaly Detection for Industrial Big Data

With the increasing population of Industry 4.0, industrial big data (IBD) has become a hotly discussed topic in digital and intelligent industry field. The security problem existing in the signal processing on large scale of data stream is still a challenge issue in industrial internet of things, especially when dealing with the high-dimensional anomaly detection for intelligent industrial application. In this article, to mitigate the inconsistency between dimensionality reduction and feature retention in imbalanced IBD, we propose a variational long short-term memory (VLSTM) learning model for intelligent anomaly detection based on reconstructed feature representation. An encoder–decoder neural network associated with a variational reparameterization scheme is designed to learn the low-dimensional feature representation from high-dimensional raw data. Three loss functions are defined and quantified to constrain the reconstructed hidden variable into a more explicit and meaningful form. A lightweight estimation network is then fed with the refined feature representation to identify anomalies in IBD. Experiments using a public IBD dataset named UNSW-NB15 demonstrate that the proposed VLSTM model can efficiently cope with imbalance and high-dimensional issues, and significantly improve the accuracy and reduce the false rate in anomaly detection for IBD according to F1, area under curve (AUC), and false alarm rate (FAR).

[1]  Pascal Vincent,et al.  Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion , 2010, J. Mach. Learn. Res..

[2]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Diederik P. Kingma,et al.  Stochastic Gradient VB and the Variational Auto-Encoder , 2013 .

[4]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[5]  Jill Slay,et al.  The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..

[6]  Christian Diedrich,et al.  Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[7]  Robert X. Gao,et al.  Deep Learning and Its Applications to Machine Health Monitoring: A Survey , 2016, ArXiv.

[8]  Yang Yu,et al.  A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks , 2016, Sensors.

[9]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[10]  Elisa Bertino,et al.  Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[11]  Nick Feamster,et al.  Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[12]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[13]  Po Yang,et al.  Examining sensor-based physical activity recognition and monitoring for healthcare using Internet of Things: A systematic review , 2018, Journal of Biomedical Informatics.

[14]  Qingju Wang,et al.  When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.

[15]  Yiqiang Sheng,et al.  HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.

[16]  Erol Gelenbe,et al.  Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments , 2018, FNC/MobiSPC.

[17]  Pete Burnap,et al.  A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.

[18]  Bo Zhou,et al.  A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors , 2019, IEEE Internet of Things Journal.

[19]  Zhifeng Zhao,et al.  AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks , 2018, IEEE Internet of Things Journal.

[20]  Lei Chen,et al.  Time-Related Network Intrusion Detection Model: A Deep Learning Method , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[21]  Yuan Zuo,et al.  Learning-based network path planning for traffic engineering , 2019, Future Gener. Comput. Syst..

[22]  Yanxia Sun,et al.  A Deep Long Short-Term Memory based classifier for Wireless Intrusion Detection System , 2020, ICT Express.

[23]  Xiaojiang Du,et al.  A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.

[24]  Yun Yang,et al.  An overview of data fusion techniques for Internet of Things enabled physical activity recognition and measure , 2020, Inf. Fusion.

[25]  Yulei Wu,et al.  An Intelligent Anomaly Detection Scheme for Micro-Services Architectures With Temporal and Spatial Data Analysis , 2020, IEEE Transactions on Cognitive Communications and Networking.

[26]  Geyong Min,et al.  Time Series Anomaly Detection for Trustworthy Services in Cloud Computing Systems , 2017, IEEE Transactions on Big Data.