Wireless Sensor Networks anomaly detection using Machine Learning: A
Survey
- URL: http://arxiv.org/abs/2303.08823v1
- Date: Wed, 15 Mar 2023 15:02:11 GMT
- Title: Wireless Sensor Networks anomaly detection using Machine Learning: A
Survey
- Authors: Ahsnaul Haque, Md Naseef-Ur-Rahman Chowdhury, Hamdy Soliman, Mohammad
Sahinur Hossen, Tanjim Fatima, and Imtiaz Ahmed
- Abstract summary: Wireless Sensor Networks (WSNs) have become increasingly valuable in various civil/military applications.
The sensed data generated by WSNs is often noisy and unreliable, making it a challenge to detect and diagnose anomalies.
Machine learning (ML) techniques have been widely used to address this problem by detecting and identifying unusual patterns in the sensed data.
- Score: 1.2699602067359046
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: Wireless Sensor Networks (WSNs) have become increasingly valuable in various
civil/military applications like industrial process control, civil engineering
applications such as buildings structural strength monitoring, environmental
monitoring, border intrusion, IoT (Internet of Things), and healthcare.
However, the sensed data generated by WSNs is often noisy and unreliable,
making it a challenge to detect and diagnose anomalies. Machine learning (ML)
techniques have been widely used to address this problem by detecting and
identifying unusual patterns in the sensed data. This survey paper provides an
overview of the state of the art applications of ML techniques for data anomaly
detection in WSN domains. We first introduce the characteristics of WSNs and
the challenges of anomaly detection in WSNs. Then, we review various ML
techniques such as supervised, unsupervised, and semi-supervised learning that
have been applied to WSN data anomaly detection. We also compare different
ML-based approaches and their performance evaluation metrics. Finally, we
discuss open research challenges and future directions for applying ML
techniques in WSNs sensed data anomaly detection.
Related papers
- Anomaly Detection of Tabular Data Using LLMs [54.470648484612866]
We show that pre-trained large language models (LLMs) are zero-shot batch-level anomaly detectors.
We propose an end-to-end fine-tuning strategy to bring out the potential of LLMs in detecting real anomalies.
arXiv Detail & Related papers (2024-06-24T04:17:03Z) - Progressing from Anomaly Detection to Automated Log Labeling and
Pioneering Root Cause Analysis [53.24804865821692]
This study introduces a taxonomy for log anomalies and explores automated data labeling to mitigate labeling challenges.
The study envisions a future where root cause analysis follows anomaly detection, unraveling the underlying triggers of anomalies.
arXiv Detail & Related papers (2023-12-22T15:04:20Z) - Anomaly Detection in Industrial Machinery using IoT Devices and Machine
Learning: a Systematic Mapping [0.0]
Internet of Things (IoT) has enabled the collection of large volumes of data from industrial machinery.
However, the volume and complexity of data generated by the Internet of Things ecosystems make it difficult for humans to detect anomalies manually.
Machine learning (ML) algorithms can automate anomaly detection in industrial machinery by analyzing generated data.
arXiv Detail & Related papers (2023-07-28T20:58:00Z) - Leveraging a Probabilistic PCA Model to Understand the Multivariate
Statistical Network Monitoring Framework for Network Security Anomaly
Detection [64.1680666036655]
We revisit anomaly detection techniques based on PCA from a probabilistic generative model point of view.
We have evaluated the mathematical model using two different datasets.
arXiv Detail & Related papers (2023-02-02T13:41:18Z) - Exploring the Use of Data-Driven Approaches for Anomaly Detection in the
Internet of Things (IoT) Environment [4.724825031148412]
The Internet of Things (IoT) is a system that connects physical computing devices, sensors, software, and other technologies.
Data can be collected, transferred, and exchanged with other devices over the network without requiring human interactions.
Research on anomaly detection in the IoT environment has become popular and necessary in recent years.
arXiv Detail & Related papers (2022-12-31T06:28:58Z) - An Outlier Exposure Approach to Improve Visual Anomaly Detection
Performance for Mobile Robots [76.36017224414523]
We consider the problem of building visual anomaly detection systems for mobile robots.
Standard anomaly detection models are trained using large datasets composed only of non-anomalous data.
We tackle the problem of exploiting these data to improve the performance of a Real-NVP anomaly detection model.
arXiv Detail & Related papers (2022-09-20T15:18:13Z) - Applications of Generative Adversarial Networks in Anomaly Detection: A
Systematic Literature Review [28.752089275446462]
generative adversarial networks (GANs) have attracted a great deal of attention in anomaly detection research.
In this paper, we present a systematic literature review of the applications of GANs in anomaly detection.
arXiv Detail & Related papers (2021-10-22T21:48:48Z) - TELESTO: A Graph Neural Network Model for Anomaly Classification in
Cloud Services [77.454688257702]
Machine learning (ML) and artificial intelligence (AI) are applied on IT system operation and maintenance.
One direction aims at the recognition of re-occurring anomaly types to enable remediation automation.
We propose a method that is invariant to dimensionality changes of given data.
arXiv Detail & Related papers (2021-02-25T14:24:49Z) - Smart Anomaly Detection in Sensor Systems: A Multi-Perspective Review [0.0]
Anomaly detection is concerned with identifying data patterns that deviate remarkably from the expected behaviour.
This is an important research problem, due to its broad set of application domains, from data analysis to e-health, cybersecurity, predictive maintenance, fault prevention, and industrial automation.
We review state-of-the-art methods that may be employed to detect anomalies in the specific area of sensor systems.
arXiv Detail & Related papers (2020-10-27T09:56:16Z) - Experimental Review of Neural-based approaches for Network Intrusion
Management [8.727349339883094]
We provide an experimental-based review of neural-based methods applied to intrusion detection issues.
We offer a complete view of the most prominent neural-based techniques relevant to intrusion detection, including deep-based approaches or weightless neural networks.
Our evaluation quantifies the value of neural networks, particularly when state-of-the-art datasets are used to train the models.
arXiv Detail & Related papers (2020-09-18T18:32:24Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.