A Cluster-Based Method to Detect and Correct Anomalies in Sensor Data of Embedded Systems

This paper presents a method to detect and correct anomalies in embedded systems. The proposed method consists of three phases: 1) Training, 2) Anomaly detection, and 3) Anomaly Correction. In the training phase, the method constructs different clusters so that each cluster has a number of similar members, similarity values of the members for a cluster to each others are not less than a predefined similarity threshold. The similarity values are calculated by various similarity functions. During detection phase, if an event in testing data does not belong to any cluster, an anomaly is detected. In correction phase, some similarity functions are used which select a suitable sequence that meets the required constrains to be a normal sequence. Evaluation of the proposed method has been done based on correction coverage and hardware overheads such as power consumption, area, and delay overhead. The window size of corrector and the number of injected anomalies varied between 3 and 5, 1 and 7, respectively. The results of experiments on 7000 benchmarks show that this correction method can correct 70.36% of anomalies on the average. Power consumption, area, and delay overhead in cluster-based method are on average 318.47μw, 2.98μm2, and 0.09 ns, respectively.

[1]  Bernd Freisleben,et al.  CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).

[2]  Vipin Kumar,et al.  Similarity Measures for Categorical Data: A Comparative Evaluation , 2008, SDM.

[3]  Himanshu Bhatnagar Advanced ASIC Chip Synthesis: Using Synopsys' Design Compiler and PrimeTime , 1999 .

[4]  Hamid R. Zarandi,et al.  Two effective methods to detect anomalies in embedded systems , 2012, Microelectron. J..

[5]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[6]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[7]  Himanshu Bhatnagar Advanced ASIC Chip Synthesis: Using Synopsys Design Compiler Physical Compiler and Prime Time , 2002 .

[8]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[9]  Alberto Sangiovanni-Vincentelli,et al.  An embedded system for an eye-detection sensor , 2005, Comput. Vis. Image Underst..

[10]  Andrea Torsello,et al.  Similarity-Based Pattern Recognition , 2006, Lecture Notes in Computer Science.

[11]  Ernesto Araujo,et al.  Fuzzy Decision in Airplane Speed Control , 2006, 2006 IEEE International Conference on Fuzzy Systems.

[12]  Jeff G. Schneider,et al.  Detecting anomalous records in categorical datasets , 2007, KDD '07.

[13]  Hamid R. Zarandi,et al.  Two effective anomaly correction methods in embedded systems , 2015, 2015 CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST).

[14]  Youngju Kim,et al.  Amorphous Slack Methodology for Autonomous Fault-Handling in Reconfigurable Devices , 2012 .

[15]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[16]  Arnaud Virazel,et al.  Error Resilient Infrastructure for Data Transfer in a Distributed Neutron Detector , 2011, 2011 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems.

[17]  Kymie M. C. Tan,et al.  Anomaly Detection in Embedded Systems , 2002, IEEE Trans. Computers.

[18]  Hamid R. Zarandi,et al.  Markov-Based Anomaly Correction in Embedded Systems , 2016 .

[19]  Joseph B. Evans,et al.  Anomaly Detection with Sensor Data for Distributed Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[20]  Eyal Amir,et al.  Real-time Bayesian Anomaly Detection for Environmental Sensor Data , 2007 .

[21]  P. Sajda,et al.  Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model , 2001, Proceedings IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA 2001).

[22]  Navdeep Singh,et al.  A Survey of Intrusion Detection Techniques , 2013 .

[23]  Ran Wolff,et al.  Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .