Comparative Analysis of Machine Learning-Based Algorithms for Detection of Anomalies in IIoT

Comparative Analysis of Machine Learning-Based Algorithms for Detection of Anomalies in IIoT

Bhupal Naik D. S., Venkatesulu Dondeti, Sivadi Balakrishna
Copyright: © 2022 |Pages: 55
DOI: 10.4018/IJIRR.298647
Article PDF Download
Open access articles are freely available for download

Abstract

With the enormous increase in data, anomaly detection plays a prominent role in the finer analysis process. IIoT represents the Industrial Internet of Things that at first chiefly alluded to a mechanical system whereby an enormous number of devices or machines are associated and synchronized using programming devices and third stage advancements in a machine-to-machine and Internet of Things, later an Industry 4.0. The data produced by multiple huge numbers of sensors are incredibly complicated, diverse, and massive in IIoT and is raw. These may contain anomalies which are needed to be identified for better data analysis. In this research, we compare the Machine Learning algorithms of classification for detecting anomalies. The algorithms being compared here are Random Forest (RF), Logistic Regression (LR), Light Gradient Boosting Machine (LightGBM), Decision Trees (DT), K Nearest Neighbors (KNN). Three IIOT benchmark datasets were taken into consideration for analysis. The results have shown that RF has outperformed other algorithms used for the detection of anomalies in IIoT data.
Article Preview
Top

I. Introduction

The word IoT can be defined as the correlation and coordination of diverse entities, where an entity could be an object, human, or machine which requests for or provides a service(J. Lin, Wei Yu, Nan Zhang, Xinyu Yang, 2017).In the world of industries, it is known as IIoT(Industrial Internet of Things). IIoT deals with the interconnection between machines, actuators, controllers and intensify productivity and automation in various industrial areas eg., transportation, manufacturing, and processing (A. Hassanzadeh, S. Modi& S. Mulchandani, 2015).Although IIoT proceeds to influence our current predicament and aim to create new future perspectives, it poses significant administrative and design problems (L. Da Xu, W. He&S. Li, 2014).

Anomaly is a term used to describe data that behaves in a way that is not intended, deviated from other data. The detection of anomalies (Anomaly Detection), also known as deviation detection, novelty discovery or outlier recognition, is identifying the patterns from the data that don’t match the anticipated behaviour. Though anomaly is unusual, it is a significant phenomenon. Hence, the research community has thus drawn considerable attention to anomaly detection (X. Liu & P. S. Nielsen, 2016) (M. Schreyer, T. Sattarov, D. Borth, A. Dengel, & B. Reimer, 2018). These anomalies can have a significant impact on the precision of classification based on data, prediction, and other operations; therefore, critical in identifying outliers rapidly in addition to effectively increase the accuracy of future operations based on data (Saihua Cai, Li Li, Sicong Li, Ruizhi Sun, Gang Yuan, 2020).

Anomaly detection has a broad range of applications; including the detection of fraud by credit card, industrial damage detection, healthcare, image processing, intrusion detection by computers, failure detection, and more (C. Chahla, H. Snoussi, L. Merghem& M. Esseghir, 2019).

Anomaly identification strategies in machine learning are classified into three categories depending on the labels available in the dataset:

Supervised Methods

ML models are designed for both abnormal and normal data in supervised learning techniques, in which unknown data case is given the label as anomalous or normal by assessing the concept it relates to (W. Cui & H. Wang, 2017).

Semi-Supervised Methods

Machine learning models are indeed to regular data in semi-supervised techniques, for which an unknown data example is labelled as ordinary if it is rational in following the model; else, the piece of instance is labelled as anomalous (W. Cui & H. Wang, 2017).

Unsupervised Methods

In unsupervised models, no training data is required, mainly because the anomalies in a given data set are assumed to be much more than normal data(W. Cui & H. Wang, 2017).

For this research, we developed a model for anomaly detection using multiple classification algorithms such as Logistic regression(LR), K Nearest Neighbor (KNN), Random Forest(RF), Decision Trees(DT), Light Gradient Boosting Machine (LightGBM), and compare the results based on various performance metrics.

This paper is assembled as follows: Section II discusses Literature Survey, Section III provides Methodologies, Section IV describes the Experimental evaluation, Section V discusses about the conclusion and future scope.

Top

Ii. Literature Survey

In this section, several aspects are examined concerning the relevant work, like IIoT, several anomaly detection machine algorithms.

Emiliano Sisinniet al. (Emiliano Sisinni, Abusayeed Saifullah, Song Han, Ulf Jennehag, Mikael Gidlund, 2018) have presented a detailed study on IoT, IIoT, and Industry 4.0 including the opportunities and the challenges in this paradigm. They also have discussed some of the recent works in research to overcome the challenges that involve the need for energy efficiency, interoperability, security, real-time performance, and privacy in the IIoT field.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 3 Released, 1 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing