An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training

An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training

Yuan Tian, Wendong Wang, Jingyuan He
Copyright: © 2024 |Pages: 28
DOI: 10.4018/IJISP.343306
Article PDF Download
Open access articles are freely available for download

Abstract

The existing Industrial Internet of Things (IIoT) temporal data analysis methods often suffer from issues such as information loss, difficulty balancing spatial and temporal features, and being affected by training data noise, which can lead to varying degrees of reduced model accuracy. Therefore, a new anomaly detection method was proposed, which integrated Transformer and adversarial training. Firstly, a bidirectional spatiotemporal feature extraction module was constructed by combining Graph Attention Networks (GAT) and Bidirectional Gated Recurrent Unit (BiGRU), which can simultaneously extract spatial and temporal features. Then, by combining multi-scale convolution with Long Short-Term Memory (LSTM), multi-scale contextual information was captured. Finally, an improved Transformer was used to fuse multi-dimensional features, combined with an adversarial-trained variational autoencoder to calculate the anomalies of the input data. This method outperforms other comparison models by conducting experiments on four publicly available datasets.
Article Preview
Top

Abnormal data in IIoT may lead to damage or malfunction of industrial equipment, affecting the quality and efficiency of industrial production, and reducing the safety and reliability of IIoT systems. Therefore, the detection and management of abnormal data is a very important aspect of IIoT. By using effective anomaly detection methods, abnormal data can be detected and processed in a timely manner; thereby, ensuring the normal operation of the IIoT system.

Prediction Based Methods

When detecting temporal anomaly data, using the Recurrent Neural Network (RNN) and the variants network was a common approach. For the simplification and lightweight consideration of the model structure, Tran et al. (2022) introduced an anomaly detection model based on self-supervised learning (SSL) to analyze the temporal data. This model has a certain effect on detecting the degree of data anomalies. In addition, a convolutional encoder was applied to capture the correlation of input data. Shen et al. (2020) implemented the detection of abnormal data based on LSTM and GRU. By introducing multiple gating units, long-term dependency relationships have been learned to better achieve long-sequence data processing and anomaly detection. Zhang et al. (2022) proposed an architecture with time-frequency analysis for anomaly detection (TFAD). This model contains modules for data decomposition and expansion, which can improve accuracy to a certain extent. Meng et al. (2020) applied Transformer to data streams by masking temporal data modeling and proposed a masking strategy for anomaly detection using an attention mechanism that includes parallel update time steps. Deng & Hooi (2021) proposed a model based on graph neural networks, which can represent temporal data as graph data and then perform anomaly detection by learning feature vectors of nodes and edges. Zhou et al. (2021) introduced a model based on Transformer: Informer. The computational complexity has been improved because of the attention network, and the prediction progress and long sequence prediction efficiency have been improved.

The above prediction-based data anomaly detection methods can predict future data points by establishing mathematical models or algorithms and comparing actual data with predicted data to detect outliers. These methods have a certain degree of predictability, adaptability, and interpretability. But at the same time, there are also obvious drawbacks, such as high requirements for data volume and high computational costs. In addition, if the data distribution changes, the model may need to be adjusted or retrained. Therefore, it is necessary to consider issues such as data quality, computational cost, and model drift during use. When selecting and using this anomaly detection method, it is necessary to weigh the specific application scenarios and requirements.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing