SlideShare a Scribd company logo
1 of 6
Download to read offline
Adaptive and Online One-Class Support Vector Machine-based Outlier Detection
Techniques for Wireless Sensor Networks
Yang Zhang, Nirvana Meratnia, Paul Havinga
Group of Pervasive Systems
University of Twente
Enschede, The Netherlands
Email: {zhangy,meratnia,havinga}@cs.utwente.nl
Abstract
Outlier detection in wireless sensor networks is essen-
tial to ensure data quality, secure monitoring and reliable
detection of interesting and critical events. A key chal-
lenge for outlier detection in wireless sensor networks is
to adaptively identify outliers in an online manner with a
high accuracy while maintaining the resource consumption
of the network to a minimum. In this paper, we propose
one-class support vector machine-based outlier detection
techniques that sequentially update the model representing
normal behavior of the sensed data and take advantage of
spatial and temporal correlations that exist between sensor
data to cooperatively identify outliers. Experiments with both
synthetic and real data show that our online outlier detection
techniques achieve high detection accuracy and low false
alarm rate.
1. Introduction
Advances in electronics and wireless communications
market have made the vision of wireless sensor nodes
a reality. Wireless sensor nodes are tiny, low-cost sensor
devices integrated with sensing, processing and short-range
wireless communication capabilities. Wireless sensor net-
works (WSNs) consist of a large number of these sensor
nodes that are networked together. A wide variety of appli-
cations of WSNs ranges from personal spaces to scientiļ¬c,
industrial, business, and military domains. Examples of these
applications include environmental and habitat monitoring,
object and inventory tracking, health and medical monitor-
ing, battleļ¬eld observation, industrial safety and controlling
etc. In a typical application, a WSN deployed in a region
is meant to collect real-time data using its sensors, perform
processing and make actions.
Compared to wired networks, strong resource constraints
such as energy, memory, processing power and communica-
tion bandwidth make WSNs more vulnerable to faults and
malicious activities (e.g., denial of service attacks or black
hole attacks). These activities can cause sensor readings
unreliable and inaccurate. To ensure a reasonable data qual-
ity, secure monitoring and reliable detection of interesting
and critical events, it is essential to identify anomalous
measurements in the point of action, i.e., locally in the
network.
In WSNs, outliers also known as anomalies are those
measurements that do not conform to the normal behavioral
pattern of the sensed data [1]. Consequently, a straightfor-
ward approach for outlier detection in WSNs is to build
a model representing normal behavior of the sensed data
and identify an outlier as a sensor measurement that does
not conform to this model. However, due to the fact that
sensor data is streaming data, i.e., an ordered sequence of
unbounded, real-time data records with a high data rate,
a normal model will evolve over time and the deļ¬ned
normal model may not be sufļ¬ciently representative for
future identiļ¬cation. Thus a key challenge in WSNs is to
adaptively identify outliers in an online manner with a high
accuracy while consuming minimal resource of the network.
In this paper, we propose three one-class support vector
machine (SVM)-based outlier detection techniques that can
update the normal behavioral model of the sensed data in an
online manner. These techniques take advantage of spatial
and temporal correlations that exist in sensor data to coop-
eratively identify outliers. Experiments with both synthetic
and real data collected by the SensorScope System [2] show
that our online outlier detection techniques achieve better
accuracy compared to an earlier online outlier detection
technique [3] designed for WSNs.
The rest of this paper is organized as follows. Related
work on one-class SVM-based outlier detection techniques
is presented in Section 2. Fundamentals of the one-class
centered quarter-sphere SVM are described in Section 3. Our
proposed adaptive and online outlier detection techniques
are explained in Section 4. Experimental results and perfor-
mance evaluation are reported in Section 5. The paper is
concluded in Section 6 with plans for future research.
2009 International Conference on Advanced Information Networking and Applications Workshops
978-0-7695-3639-2/09 $25.00 Ā© 2009 Crown Copyright
DOI 10.1109/WAINA.2009.200
990
2009 International Conference on Advanced Information Networking and Applications Workshops
978-0-7695-3639-2/09 $25.00 Ā© 2009 IEEE
DOI 10.1109/WAINA.2009.200
990
2. Related Work
Compared to the other three data mining tasks, i.e., pre-
dictive modelling, cluster analysis and association analysis,
outlier detection is the closest task to the initial motiva-
tion behind data mining [1]. Outlier detection techniques
can be categorized into statistical-based, nearest neighbor-
based, clustering-based, classiļ¬cation-based, and spectral
decomposition-based approaches [1], [10]. SVM-based tech-
niques are one of the popular classiļ¬cation-based approaches
in the data mining and machine learning communities. They
have been widely used to detect outliers due to the following
three main advantages: SVM-based techniques (i) do not
require an explicit statistical model, (ii) provide an optimum
solution for classiļ¬cation by maximizing the margin of the
decision boundary, and (iii) avoid the curse of dimensionality
problem.
One of the challenges faced by SVM-based outlier de-
tection techniques for WSNs is obtaining error-free or
labelled data for training. One-class (unsupervised) SVM-
based techniques can address this challenge. They model the
normal behavior of the unlabelled data while automatically
ignoring the anomalies existed in the training set. Several
one-class SVM-based outlier detection techniques have been
proposed. The main idea of one-class SVM-based outlier
detection techniques is to use a non-linear function to map
the data vectors collected from the original space to a higher
dimensional space, called (feature space). Then a decision
boundary of normal data is found, which encompasses the
majority of the data vectors in the feature space. Those
new unseen data vectors falling outside the boundary are
classiļ¬ed as outliers. Scholkopf et al. [4] have proposed a
hyperplane-based one-class SVM, which identiļ¬es outliers
by ļ¬tting a hyperplane from the origin. Tax et al. [5] have
proposed a hypersphere one-class SVM, which identiļ¬es
outliers by ļ¬tting a hypersphere with a minimal radius.
Another challenge faced by SVM-based outlier detection
techniques for WSNs is their use of a quadratic optimization
during the learning process of the boundary of normal
data. This process is extremely costly and not suitable for
limited resources available in WSNs. Laskov et al. [6] have
extended work in [5] by proposing a one-class quarter-sphere
SVM, which is formulated as a linear optimization problem
and thus reduces the effort and computational complexity.
Rajasegarar et al. [7] and Zhang et al. [3] further exploit
potential of the one-class quarter-sphere SVM of [6] for
online outlier detection in WSNs. The main difference of
the two techniques is that unlike a batch technique of [7],
the work of [3] aims at identifying every new measurement
collected at a node as normal or anomalous in real-time.
Davy et al. [8] consider the change of the normal model
over time and online identifying outliers using previous
data vectors in a sliding time window. Due to its expensive
computational effort, this technique is not applicable to
WSNs.
3. Fundamentals of the One-Class Centered
Quarter-Sphere SVM
In this paper, we exploit the one-class centered quarter-
sphere SVM of Laskov et al. [6] to build the normal
model of sensor measurements in a sliding time window.
They have converted the quadratic optimization problem of
the one-class SVM to a linear optimization problem. The
geometry of the one-class centered quarter-sphere SVM-
based approach is shown in Figure 1.
Origin
Margin Support vectors
(0 < a < 1/vm)
Feature 1
Feature2
Non Support vectors
(a = 0)
R
Non-Margin
Support vectors (Outliers)
(a = 1/vm)
Figure 1. Geometry of the quarter-sphere formulation
of one-class SVM
The constrained optimization problem of the one-class
centered quarter-sphere SVM is formalized as follows:
min
R ,Ī¾ m
R2
+ 1
Ļ…m
m
i=1
Ī¾i (1)
subject to : Ļ†(xi) 2
ā‰¤ R2
+ Ī¾i, Ī¾i ā‰„ 0, i = 1, 2, . . . m
where m denotes the number of data vectors in the train-
ing set. The parameter Ļ… (0, 1) controls the number of
outliers. The squared norm Ļ†(xi) 2
is given by the dot
product Ļ†(xi)Ā·Ļ†(xi), which indicates a measure of similarity
between Ļ†(xi) and Ļ†(xi) in the feature space. A kernel
function k(xi, xi) is used to compute the similarity of any of
two vectors in the feature space using the original attribute
set. Hence, the dual formulation of (1) will become:
min
Ī± m
āˆ’
m
i=1
Ī±ik(xi, xi) (2)
subject to :
m
i=1
Ī±i = 1, 0 ā‰¤ Ī±i ā‰¤
1
Ļ…m
, i = 1, 2, . . . m
where Ī±i is the Lagrangian multiplier. In order to ļ¬x the
center of the quarter-sphere at the origin, the mapped data
vectors in the feature space need to be subtracted from the
mean Ī¼ = 1
m
m
i=1
Ļ†(xi). The centered kernel matrix Kc can
991991
be obtained in terms of the kernel matrix K = k(xi, xj) =
(Ļ†(xi) Ā· Ļ†(xj)) using Kc = K āˆ’ 1mK āˆ’ K1m + 1mK1m,
where 1m is an m Ɨ m matrix with all values equal to 1
m .
From equation (2), the {Ī±i} value can be easily obtained
using some effective linear optimization techniques [9]. The
data vectors in the training set can be classiļ¬ed depending
on the results of {Ī±i}, as shown in Figure 1. The training
data vectors with 0 ā‰¤ Ī± ā‰¤ 1
Ļ…m , which fall on the quarter-
sphere, are called margin support vectors. Their distances
to the origin indicate the minimal radius R of the quarter-
sphere and can be used to determine any new unseen data
vector as normal or anomalous.
4. Adaptive and Online Outlier Detection Tech-
niques for Wireless Sensor Networks
In this section, we will describe our three online and local
outlier detection techniques, which take different strategies
to sequentially update the normal model formed by the one-
class centered quarter-sphere SVM. The policies concerning
updating the normal model in these techniques include
updating (i) at each time interval, (ii) at a ļ¬xed-size time
window, and (iii) depending on the previous decision results.
These proposed techniques enable each sensor node in the
network to exploit temporal correlations among its most
recent sensor measurements to identify its new arriving
measurement as normal or anomalous in real-time. More-
over, using the high degree spatial correlations that exist
between sensor readings of adjacent nodes, each node has
more information to verify local outliers they detected. The
whole detection process does not only depend on a nodeā€™s
own decision criterion learned from its temporal readings
but also on the decision criteria learned from its spatially
neighboring nodes.
4.1. Problem Statement
We consider that sensor nodes are time synchronized and
are densely deployed in a homogeneous WSN, where sensor
data tends to be correlated in both time and space. The
network topology is modelled as an undirected graph G
where G = (S, E). S represents the nodes in the network
and E represents an edge which connects two nodes if
they are within radio transmission range of each other. A
subset N(S0) represents a closed neighborhood of a node
S0 S, which contains the node S0 and its k spatially
neighboring nodes. The k spatially neighboring nodes are
represented by Sj = {Sj : j = 1 . . . k}, i.e., N(S0) =
{Sj S|(Sj, S0) E} āˆŖ {S0}. An example of N(S0) is the
closed disk centered at S0 with the radio transmission range
of S0, as shown in Figure 2.
At every time interval Ī”i, each sensor node in the set
N(S0) measures a data vector. Let xi
0, xi
1, xi
2, . . . , xi
k denote
the data vector measured at S0, S1, S2, . . . , Sk, respectively.
S0
S1
S2
S4
S3
S6
S5
N(S0)
Figure 2. Example of a closed neighborhood N(S0) of
the sensor node S0
Each data vector is composed of multiple attributes xil
j ,
where xi
j = {xil
j : j = 0 . . . k, l = 1 . . . d} and xi
j
d
.
At time t, S0 has collected its m measurements from time
tāˆ’m to time tāˆ’1: {xtāˆ’m
0 , . . . , xtāˆ’1
0 }. Our aim is to online
identify every new measurement collected by S0 as normal
or anomalous. This local process can be applied to each node
in the network and thus scales well to large WSNs.
4.2. Instant Outlier Detection Technique
The simplest method of updating the normal model over
time is to compute the minimal radius of one-class quarter-
sphere for each training set, i.e., at each time interval.
Initially, each node learns the local radius of the quarter-
sphere using its m sequential sensor measurements, which
may include some anomalous data. The one-class quarter-
sphere SVM can efļ¬ciently ļ¬nd a minimal radius R to
enclose the majority of these mapped sensor measurements
in the feature space. Each node then locally broadcasts
the learned radius information to its spatially neighboring
nodes. When receiving the radius from all of its neighbors,
each node computes a median radius Rm of its neighboring
nodes. We use median because in estimating the ā€centerā€ of
a sample set, the median is more robust than the mean.
Sensor data of adjacent nodes in a densely deployed WSN
tend to be spatially and temporally correlated [10]. When a
new sensor measurement xt
0 is collected at time t, S0 ļ¬rst
compares the distance of xt
0 from the origin with the radius
R learned with respect to its m previous measurements
{xtāˆ’m
0 , . . . , xtāˆ’1
0 } in a sliding window. For computation of
distance between xt
0 and the origin in the feature space,
i.e., d(x) please refer to [3]. The data xt
0 will be classiļ¬ed
as normal if d(x) <= R, which means that xt
0 falls on
or inside the quarter-sphere at S0. Otherwise if d(x) > R,
xt
0 is a potential (temporal) outlier. In this case, S0 further
compares d(x) with the median radius Rm of its neighboring
nodes. If d(x) > Rm, xt
0 will ļ¬nally be classiļ¬ed as outlier
in the subset N(S0). Thus, the decision function can be
formulated as (3), where the sensor measurements with a
negative value are classiļ¬ed as outlier.
992992
f(x) = sgn(R āˆ’ d(x)) āˆ§ sgn(Rm āˆ’ d(x)) (3)
The two radii R and Rm are important decision criteria
for local outlier identiļ¬cation. Using the radius informa-
tion from adjacent nodes is also to overcome the main
shortcoming of unsupervised techniques, which is suffering
from high false alarm rate if the given data contains many
anomalies [1].
The next step of this technique is to update the normal
model at each time interval. Each update step needs to add a
current measurement and to remove the oldest measurement
from the sliding window. This procedure is repeated with
evolving the training set of ļ¬xed size. This instant outlier
detection (IOD) technique is shown in Figure 3 and Table 1.
Time
m {xt-mā€¦ xt-1 } Current time (t)
xt-m-1 xt
Figure 3. Principle of the IOD. Circles represent sensor
measurements. The ā€slidingā€ training set is composed
of the last m measurements. The black dot represents
the measurement identiļ¬ed at current time t.
1 procedure LearningSVM()
2 each node collects m sensor measurements for
learning its own radius R and locally broadcasts
the radius to its spatially neighboring nodes;
3 each node then computes Rm;
4 initiate OutlierDetectionProcess(R, Rm);
5 return;
6 procedure OutlierDetectionProcess(R, Rm)
7 when xt arrives
8 compute d(x);
9 if (d(x) > R AND d(x) > Rm)
10 xt indicates an outlier;
11 else
12 xt indicates a normal measurement;
13 endif;
14 initiate UpdatingProcess(xt);
15 set t ā† t + 1;
16 return;
17 procedure UpdatingProcess(xt)
18 update the training set: the oldest measurement
xtāˆ’m is removed and replaced by xt.
19 recompute R using the updated training set.
20 locally broadcast R to its neighboring nodes;
21 recompute Rm of its neighboring nodes;
22 return;
Table 1. The pseudocode of the IOD.
Once the radius of a node is updated, the node locally
broadcasts the new radius R to its neighboring nodes. The
median radius Rm of neighboring nodes also needs to be
recomputed. The updated R and Rm are used to identify the
next sensor measurement as normal or anomalous.
4.3. Fixed-size Time Window-based Outlier Detec-
tion Technique
A slightly modiļ¬ed version of the IOD is to identify each
sensor measurement upon being collected but update the
normal model at a ļ¬xed-size time window. It means that
the training set will be freezed for the next n (n m)
measurements, while each new measurement upon arrival
will be classiļ¬ed as normal or anomalous. Therefore, there
is no delay in outlier detection itself.
Each update step in this technique requires to add the
previous n sensor measurements and to remove the oldest n
measurements from the sliding window. The corresponding
modiļ¬cation of this ļ¬xed-sized time window-based outlier
detection (FTWOD) technique is shown in Figure 4 and
Table 2. In fact, the FTWOD becomes like the IOD when
using n = 1.
Time
m {xt-mā€¦ xt-1 } Current time (t+n-1)
xt-m-1 xt+n-1
n
Figure 4. Principle of the FTWOD. The training set is
updated at each n measurements.
. . ....
14 If (t % n == 0)
14ā€™ initiate UpdatingProcess(xtāˆ’n+1 . . . xt);
. . ....
Table 2. The modiļ¬cation for the FTWOD.
4.4. Adaptive Outlier Detection Technique
The policies of the above two techniques is updating
the normal model either at each time interval or at n time
intervals, without considering the impact when a normal
or anomalous measurement is incorporated into the sliding
training set. Moreover, they introduce a high communication
load due to the fact that each node is required to locally
broadcast the updated R to its neighboring nodes. Thus, for
the sake of energy efļ¬ciency and computational simplicity,
we introduce a third technique, which takes a new strategy to
update the normal model depending on the previous decision
results, i.e., only when a new measurement will have a
signiļ¬cant impact on the previous normal model.
As shown in Figure 1, the margin support vectors and
outliers have non-zero Ī± values so that the dual formulation
of (1) will not be met if they are added into the existed
training set. In order to meet the constraints of (2) and ļ¬nd
a minimal radius, when a current measurement is detected
993993
as margin support vector or outlier, this technique adds all
the previous nā€™ measurements including the current measure-
ment into the training set and also removes the same amount
of the oldest measurements from the training set. Due to
the fact that compared to normal data, outliers and margin
support vectors are very rare [1], this technique is more
efļ¬cient in terms of energy and computational costs. The
corresponding modiļ¬cation of this adaptive outlier detection
(AOD) technique is shown in Figure 5 and Table 3.
Time
m {xt-mā€¦ xt -1} Current time (t+nā€™-1)
xt-m-1 xt+nā€™-1
nā€™
Figure 5. Principle of the AOD. The black dot represents
the measurement identiļ¬ed as a margin support vector
or an outlier.
. . ....
14 If (xt is an outlier or a margin support vector)
14ā€™ initiate UpdatingProcess(xtāˆ’n +1 . . . xt);
. . ....
Table 3. The modiļ¬cation for the AOD.
5. Experimental Results and Evaluation
This section speciļ¬es the performance evaluation of our
three techniques compared to the online outlier detection
(OOD) technique presented earlier in [3]. In our experi-
ments, we have used synthetic data as well as real data
gathered from a deployment of WSN using the SensorScope
System [2]. For the simulation, we use Matlab and consider a
closed neighborhood as shown in Figure 2, which is centered
at a node with its 6 spatially neighboring nodes.
5.1. Experimental Datasets
The 2-D synthetic data used for each node is composed of
a mixture of three Gaussian distribution with uniform out-
liers; the mean is randomly selected from (0.3, 0.35, 0.45),
and the standard deviation is selected as 0.03. Subsequently,
10% (of the normal data) anomalous data is introduced and
uniformly distributed in the interval [0.5, 1]. The data values
are normalized to ļ¬t in the [0, 1]. The OOD in [3] identiļ¬es
outliers in an online manner using the same training set
without considering the evolution of the normal model over
time. The testing data used for each node comprises of 200
normal and 20 anomalous data.
The real data are collected from a closed neighborhood
from a WSN deployed in Grand-St-Bernard as shown in
Figure 6. The closed neighborhood contains the node 2 and
its 6 spatially neighboring nodes, namely nodes 3, 4, 8, 12,
20, 14. The network recorded ambient temperature, relative
humidity, soil moisture, solar radiation and watermark mea-
surements at 2 minutes intervals. In our experiments, we
use a 6am-6pm period of data recorded on 20th September
2007 with two attributes: ambient temperature and relative
humidity for each sensor measurement. The data values are
normalized to the range [0, 1]. The amount of anomalous
data is about 10% of normal data. The labels of measure-
ments are obtained depending on the degree of dissimilarity
between one another.
Figure 6. Grand-St-Bernard deployment in [2]
5.2. Experimental Results and Evaluation
We have tested the following three kernel functions: (i)
Linear kernel function: kLinear = (x1.x2), where {x1, x2}
are the data vectors; (ii) Radial basis function (RBF) kernel
function: kRBF = exp(āˆ’ x1 āˆ’ x2
2
/Ļƒ2
), where Ļƒ is the
width parameter of the kernel function; and (iii) Polynomial
kernel function: kP olynomial = (x1.x2 + 1)r
, where r is the
degree of the polynomial.
Kernel matrices generated using the above kernel func-
tions were centered. We have evaluated two important per-
formance metrics, the detection rate, which represents the
percentage of anomalous data that are correctly considered
as outliers, and the false alarm rate, also known as false
positive rate (FPR), which represents the percentage of
normal data that are incorrectly considered as outliers.
We have examined the effect of the regularisation pa-
rameter Ļ… for our three outlier detection techniques and
the technique presented in [3]. Ļ… represents the fraction of
outliers and we have varied it in the range from 0.01 to 0.25
in intervals of 0.03 and the kernel width parameter Ļƒ is set
to 0.25. A receiver operating characteristics (ROC) curve is
used to represent the trade-off between the detection rate
and the false alarm rate. The larger the area under the ROC
curve, the better the performance of the technique.
Figure 7 shows the ROC curves obtained for the four
techniques using the RBF kernel function for synthetic data.
Figure 7(b) (c) show the detection rate and the false alarm
994994
0 5 10 15 20
20
40
60
80
100
IOD
FTWOD
AOD
OOD
(a) ROC Curves (RBF Kernel Function)
FPR (%)
DR(%)
(b) Detection Rate Vs Nu (RBF Kernel Function)
Nu (v)
DR(%)
0 0.05 0.1 0.15 0.2 0.25
0
20
40
60
80
100 IOD
FTWOD
AOD
OOD
(c) False Alarm Rate Vs Nu (RBF Kernel Function)
FPR(%)
Nu (v)
0 0.05 0.1 0.15 0.2 0.25
0
5
10
15
20 IOD
FTWOD
AOD
OOD
Figure 7. (a) ROC curves with RBF kernel for synthetic data; (b) Detection rate with RBF kernel for real data; (c)
False alarm rate with RBF kernel for real data.
Computational complexity Memory
Training Testing complexity
IOD O(N āˆ— L) O(N āˆ— m) O(d āˆ— m)
FTWOD O((N/n) āˆ— L) O(N āˆ— m) O(d āˆ— (m + n))
AOD O(n āˆ— L) O(N āˆ— m) O(d āˆ— (m + n ))
Table 4. Complexity analysis of three online outlier
detection techniques.
rate obtained for the four techniques using the RBF kernel
function for real data. Simulation results show that our
three techniques achieve better accuracy compared to the
technique in [3]. It has been previously shown that work
of [3] outperforms a batch outlier detection technique [7] for
WSNs. Having these new protocols outperforming the work
in [3], we conclude that our protocols are more efļ¬cient in
detecting outliers in WSNs in an online manner.
Computational and memory complexity of our techniques
are presented in Table 4, where m and N devote the number
of data in the training and testing sets, respectively, d
represents the dimensionality of the measurements and O(L)
represents the computational complexity of solving a linear
optimization problem.
6. Conclusion
In this paper, we have developed three one-class SVM-
based outlier detection techniques that update the normal
model of the sensed data in an online manner. We compared
the performance of these techniques with an earlier tech-
nique using synthetic and real data of the SensorScope Sys-
tem. Experimental results show that our techniques achieves
better detection accuracy and lower false alarm, while
keeping the computational complexity and memory costs
low. Our future research includes testing the communication
overhead of our techniques, examining the effect of the
kernel parameters, and real implementation of the protocols
on the sensor nodes.
Acknowledgment
This work is supported by the EUā€™s Seventh Framework
Programme and the SENSEI project.
References
[1] V. Chandola, A. Banerjee, and V. Kumar. Outlier detection: A
survey. Technical Report, University of Minnesota, 2007.
[2] http : //sensorscope.epfl.ch/index.php/MainP age.
[3] Y. Zhang, N. Meratnia, and P. Havinga. An online outlier
detection technique for wireless sensor networks using unsu-
pervised quarter-sphere support vector machine. ISSNIP 2008,
to appear.
[4] B. Scholkopf, J. C. Platt, J. C. Shawe-Taylor, A. J. Smola,
and R. C. Williamson. Estimating the support of a high-
dimensional distribution. Neural Computation, 13(7):1443-
1471, 2001.
[5] D. M. J. Tax and R. P. W. Duin. Support vector data
description. Machine Learning, 54(1):45-66, 2004.
[6] P. Laskov, C. Schafer, and I. Kotenko. Intrusion detection in
unlabeled data with quarter sphere support vector machines.
Detection of Intrusions and Malware & Vulnerability Assess-
ment, 2004.
[7] S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek.
Quarter sphere based distributed anomaly detection in wireless
sensor networks. IEEE International Conference on Commu-
nications, June 2007.
[8] M. Davy, F. Desobry, A. Gretton, and C. Doncarli. An online
support vector machine for abnomal events detection. Signal
Processing, 8(2):52ā€“57, 2006.
[9] S. G. Nash and A. Sofer. Linear and nonlinear programming.
McGrawHill, 37(3-4), 1996.
[10] Y. Zhang, N. Meratnia, and P. Havinga. Outlier detection
techniques for wireless sensor networks: A survey. Technical
Report, University of Twente, 2007.
995995

More Related Content

What's hot

An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...ijsrd.com
Ā 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614IJERA Editor
Ā 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
Ā 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size underijfcstjournal
Ā 
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKSENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKijwmn
Ā 
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore ProjectsLatest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects1crore projects
Ā 
Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Efficient Doubletree: An Algorithm for Large-Scale Topology DiscoveryEfficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Efficient Doubletree: An Algorithm for Large-Scale Topology DiscoveryIOSR Journals
Ā 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
Ā 
Classification of Multi-date Image using NDVI values
Classification of Multi-date Image using NDVI valuesClassification of Multi-date Image using NDVI values
Classification of Multi-date Image using NDVI valuesijsrd.com
Ā 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisIOSR Journals
Ā 
Wireless Sensor Network using Particle Swarm Optimization
Wireless Sensor Network using Particle Swarm OptimizationWireless Sensor Network using Particle Swarm Optimization
Wireless Sensor Network using Particle Swarm Optimizationidescitation
Ā 
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACHSENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACHcsandit
Ā 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel basedIJITCA Journal
Ā 
Multi sensor data fusion system for enhanced analysis of deterioration in con...
Multi sensor data fusion system for enhanced analysis of deterioration in con...Multi sensor data fusion system for enhanced analysis of deterioration in con...
Multi sensor data fusion system for enhanced analysis of deterioration in con...Sayed Abulhasan Quadri
Ā 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsVijay Karan
Ā 
Report on Enhancing the performance of WSN
Report on Enhancing the performance of WSNReport on Enhancing the performance of WSN
Report on Enhancing the performance of WSNDheeraj Kumar
Ā 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsVijay Karan
Ā 
Matrioska tracking keypoints in real-time
Matrioska tracking keypoints in real-timeMatrioska tracking keypoints in real-time
Matrioska tracking keypoints in real-timepowerUserHallo
Ā 

What's hot (20)

An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
Ā 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
Ā 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Ā 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size under
Ā 
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKSENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
Ā 
I0341042048
I0341042048I0341042048
I0341042048
Ā 
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore ProjectsLatest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
Ā 
I0925259
I0925259I0925259
I0925259
Ā 
Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Efficient Doubletree: An Algorithm for Large-Scale Topology DiscoveryEfficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Ā 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
Ā 
Classification of Multi-date Image using NDVI values
Classification of Multi-date Image using NDVI valuesClassification of Multi-date Image using NDVI values
Classification of Multi-date Image using NDVI values
Ā 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data Analysis
Ā 
Wireless Sensor Network using Particle Swarm Optimization
Wireless Sensor Network using Particle Swarm OptimizationWireless Sensor Network using Particle Swarm Optimization
Wireless Sensor Network using Particle Swarm Optimization
Ā 
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACHSENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
Ā 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel based
Ā 
Multi sensor data fusion system for enhanced analysis of deterioration in con...
Multi sensor data fusion system for enhanced analysis of deterioration in con...Multi sensor data fusion system for enhanced analysis of deterioration in con...
Multi sensor data fusion system for enhanced analysis of deterioration in con...
Ā 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
Ā 
Report on Enhancing the performance of WSN
Report on Enhancing the performance of WSNReport on Enhancing the performance of WSN
Report on Enhancing the performance of WSN
Ā 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
Ā 
Matrioska tracking keypoints in real-time
Matrioska tracking keypoints in real-timeMatrioska tracking keypoints in real-time
Matrioska tracking keypoints in real-time
Ā 

Viewers also liked

Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
Ā 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
Ā 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion DetectionGregory Hanis
Ā 
Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureIEEEFINALYEARPROJECTS
Ā 
Machine Learning Challenges For Automated Prompting In Smart Homes
Machine Learning Challenges For Automated Prompting In Smart HomesMachine Learning Challenges For Automated Prompting In Smart Homes
Machine Learning Challenges For Automated Prompting In Smart HomesBarnan Das
Ā 
Anomaly Detection Using the CLA
Anomaly Detection Using the CLAAnomaly Detection Using the CLA
Anomaly Detection Using the CLANumenta
Ā 
Anomaly detection, part 1
Anomaly detection, part 1Anomaly detection, part 1
Anomaly detection, part 1David Khosid
Ā 
A Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOpsA Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOpsBigPanda
Ā 
Chapter 10 Anomaly Detection
Chapter 10 Anomaly DetectionChapter 10 Anomaly Detection
Chapter 10 Anomaly DetectionKhalid Elshafie
Ā 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
Ā 
Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)Adam Gibson
Ā 
Support Vector Machine without tears
Support Vector Machine without tearsSupport Vector Machine without tears
Support Vector Machine without tearsAnkit Sharma
Ā 
Anomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) EnglishAnomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) EnglishAdam Gibson
Ā 
Anomaly detection in deep learning
Anomaly detection in deep learningAnomaly detection in deep learning
Anomaly detection in deep learningAdam Gibson
Ā 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkIOSR Journals
Ā 
Anomaly Detection using SIngle Class SVM with Gaussian Kernel
Anomaly Detection using SIngle Class SVM with Gaussian KernelAnomaly Detection using SIngle Class SVM with Gaussian Kernel
Anomaly Detection using SIngle Class SVM with Gaussian KernelAnoop Vasant Kumar
Ā 

Viewers also liked (19)

Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
Ā 
Lecture6 svdd
Lecture6 svddLecture6 svdd
Lecture6 svdd
Ā 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
Ā 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
Ā 
Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasure
Ā 
Machine Learning Challenges For Automated Prompting In Smart Homes
Machine Learning Challenges For Automated Prompting In Smart HomesMachine Learning Challenges For Automated Prompting In Smart Homes
Machine Learning Challenges For Automated Prompting In Smart Homes
Ā 
Anomaly Detection Using the CLA
Anomaly Detection Using the CLAAnomaly Detection Using the CLA
Anomaly Detection Using the CLA
Ā 
Anomaly Detection
Anomaly DetectionAnomaly Detection
Anomaly Detection
Ā 
Anomaly detection, part 1
Anomaly detection, part 1Anomaly detection, part 1
Anomaly detection, part 1
Ā 
A Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOpsA Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOps
Ā 
Chapter 10 Anomaly Detection
Chapter 10 Anomaly DetectionChapter 10 Anomaly Detection
Chapter 10 Anomaly Detection
Ā 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
Ā 
Anomaly Detection
Anomaly DetectionAnomaly Detection
Anomaly Detection
Ā 
Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)
Ā 
Support Vector Machine without tears
Support Vector Machine without tearsSupport Vector Machine without tears
Support Vector Machine without tears
Ā 
Anomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) EnglishAnomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) English
Ā 
Anomaly detection in deep learning
Anomaly detection in deep learningAnomaly detection in deep learning
Anomaly detection in deep learning
Ā 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
Ā 
Anomaly Detection using SIngle Class SVM with Gaussian Kernel
Anomaly Detection using SIngle Class SVM with Gaussian KernelAnomaly Detection using SIngle Class SVM with Gaussian Kernel
Anomaly Detection using SIngle Class SVM with Gaussian Kernel
Ā 

Similar to Adaptive and online one class support vector machine-based outlier detection

Matlab 2013 14 papers astract
Matlab 2013 14 papers astractMatlab 2013 14 papers astract
Matlab 2013 14 papers astractIGEEKS TECHNOLOGIES
Ā 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for networkIJNSA Journal
Ā 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...IJNSA Journal
Ā 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksIRJET Journal
Ā 
report2.doc
report2.docreport2.doc
report2.docbutest
Ā 
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMDYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMcscpconf
Ā 
1-s2.0-S1474034622002737-main.pdf
1-s2.0-S1474034622002737-main.pdf1-s2.0-S1474034622002737-main.pdf
1-s2.0-S1474034622002737-main.pdfarchurssu
Ā 
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...inventionjournals
Ā 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor networkijmnct
Ā 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
Ā 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
Ā 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networksambitlick
Ā 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755IJERA Editor
Ā 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...IJECEIAES
Ā 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET Journal
Ā 
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksAn Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksM H
Ā 
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...theijes
Ā 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
Ā 

Similar to Adaptive and online one class support vector machine-based outlier detection (20)

Matlab 2013 14 papers astract
Matlab 2013 14 papers astractMatlab 2013 14 papers astract
Matlab 2013 14 papers astract
Ā 
C1804011117
C1804011117C1804011117
C1804011117
Ā 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
Ā 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
Ā 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Ā 
report2.doc
report2.docreport2.doc
report2.doc
Ā 
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMDYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
Ā 
1-s2.0-S1474034622002737-main.pdf
1-s2.0-S1474034622002737-main.pdf1-s2.0-S1474034622002737-main.pdf
1-s2.0-S1474034622002737-main.pdf
Ā 
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
Ā 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor network
Ā 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Ā 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Ā 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Ā 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
Ā 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...
Ā 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
Ā 
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksAn Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
Ā 
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Ā 
C1802022430
C1802022430C1802022430
C1802022430
Ā 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
Ā 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
Ā 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
Ā 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
Ā 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
Ā 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
Ā 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Ā 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
Ā 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
Ā 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
Ā 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdfssuser54595a
Ā 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
Ā 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
Ā 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Ā 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Ā 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Ā 
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Ā 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Ā 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Ā 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
Ā 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Ā 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
Ā 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
Ā 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Ā 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Ā 

Adaptive and online one class support vector machine-based outlier detection

  • 1. Adaptive and Online One-Class Support Vector Machine-based Outlier Detection Techniques for Wireless Sensor Networks Yang Zhang, Nirvana Meratnia, Paul Havinga Group of Pervasive Systems University of Twente Enschede, The Netherlands Email: {zhangy,meratnia,havinga}@cs.utwente.nl Abstract Outlier detection in wireless sensor networks is essen- tial to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key chal- lenge for outlier detection in wireless sensor networks is to adaptively identify outliers in an online manner with a high accuracy while maintaining the resource consumption of the network to a minimum. In this paper, we propose one-class support vector machine-based outlier detection techniques that sequentially update the model representing normal behavior of the sensed data and take advantage of spatial and temporal correlations that exist between sensor data to cooperatively identify outliers. Experiments with both synthetic and real data show that our online outlier detection techniques achieve high detection accuracy and low false alarm rate. 1. Introduction Advances in electronics and wireless communications market have made the vision of wireless sensor nodes a reality. Wireless sensor nodes are tiny, low-cost sensor devices integrated with sensing, processing and short-range wireless communication capabilities. Wireless sensor net- works (WSNs) consist of a large number of these sensor nodes that are networked together. A wide variety of appli- cations of WSNs ranges from personal spaces to scientiļ¬c, industrial, business, and military domains. Examples of these applications include environmental and habitat monitoring, object and inventory tracking, health and medical monitor- ing, battleļ¬eld observation, industrial safety and controlling etc. In a typical application, a WSN deployed in a region is meant to collect real-time data using its sensors, perform processing and make actions. Compared to wired networks, strong resource constraints such as energy, memory, processing power and communica- tion bandwidth make WSNs more vulnerable to faults and malicious activities (e.g., denial of service attacks or black hole attacks). These activities can cause sensor readings unreliable and inaccurate. To ensure a reasonable data qual- ity, secure monitoring and reliable detection of interesting and critical events, it is essential to identify anomalous measurements in the point of action, i.e., locally in the network. In WSNs, outliers also known as anomalies are those measurements that do not conform to the normal behavioral pattern of the sensed data [1]. Consequently, a straightfor- ward approach for outlier detection in WSNs is to build a model representing normal behavior of the sensed data and identify an outlier as a sensor measurement that does not conform to this model. However, due to the fact that sensor data is streaming data, i.e., an ordered sequence of unbounded, real-time data records with a high data rate, a normal model will evolve over time and the deļ¬ned normal model may not be sufļ¬ciently representative for future identiļ¬cation. Thus a key challenge in WSNs is to adaptively identify outliers in an online manner with a high accuracy while consuming minimal resource of the network. In this paper, we propose three one-class support vector machine (SVM)-based outlier detection techniques that can update the normal behavioral model of the sensed data in an online manner. These techniques take advantage of spatial and temporal correlations that exist in sensor data to coop- eratively identify outliers. Experiments with both synthetic and real data collected by the SensorScope System [2] show that our online outlier detection techniques achieve better accuracy compared to an earlier online outlier detection technique [3] designed for WSNs. The rest of this paper is organized as follows. Related work on one-class SVM-based outlier detection techniques is presented in Section 2. Fundamentals of the one-class centered quarter-sphere SVM are described in Section 3. Our proposed adaptive and online outlier detection techniques are explained in Section 4. Experimental results and perfor- mance evaluation are reported in Section 5. The paper is concluded in Section 6 with plans for future research. 2009 International Conference on Advanced Information Networking and Applications Workshops 978-0-7695-3639-2/09 $25.00 Ā© 2009 Crown Copyright DOI 10.1109/WAINA.2009.200 990 2009 International Conference on Advanced Information Networking and Applications Workshops 978-0-7695-3639-2/09 $25.00 Ā© 2009 IEEE DOI 10.1109/WAINA.2009.200 990
  • 2. 2. Related Work Compared to the other three data mining tasks, i.e., pre- dictive modelling, cluster analysis and association analysis, outlier detection is the closest task to the initial motiva- tion behind data mining [1]. Outlier detection techniques can be categorized into statistical-based, nearest neighbor- based, clustering-based, classiļ¬cation-based, and spectral decomposition-based approaches [1], [10]. SVM-based tech- niques are one of the popular classiļ¬cation-based approaches in the data mining and machine learning communities. They have been widely used to detect outliers due to the following three main advantages: SVM-based techniques (i) do not require an explicit statistical model, (ii) provide an optimum solution for classiļ¬cation by maximizing the margin of the decision boundary, and (iii) avoid the curse of dimensionality problem. One of the challenges faced by SVM-based outlier de- tection techniques for WSNs is obtaining error-free or labelled data for training. One-class (unsupervised) SVM- based techniques can address this challenge. They model the normal behavior of the unlabelled data while automatically ignoring the anomalies existed in the training set. Several one-class SVM-based outlier detection techniques have been proposed. The main idea of one-class SVM-based outlier detection techniques is to use a non-linear function to map the data vectors collected from the original space to a higher dimensional space, called (feature space). Then a decision boundary of normal data is found, which encompasses the majority of the data vectors in the feature space. Those new unseen data vectors falling outside the boundary are classiļ¬ed as outliers. Scholkopf et al. [4] have proposed a hyperplane-based one-class SVM, which identiļ¬es outliers by ļ¬tting a hyperplane from the origin. Tax et al. [5] have proposed a hypersphere one-class SVM, which identiļ¬es outliers by ļ¬tting a hypersphere with a minimal radius. Another challenge faced by SVM-based outlier detection techniques for WSNs is their use of a quadratic optimization during the learning process of the boundary of normal data. This process is extremely costly and not suitable for limited resources available in WSNs. Laskov et al. [6] have extended work in [5] by proposing a one-class quarter-sphere SVM, which is formulated as a linear optimization problem and thus reduces the effort and computational complexity. Rajasegarar et al. [7] and Zhang et al. [3] further exploit potential of the one-class quarter-sphere SVM of [6] for online outlier detection in WSNs. The main difference of the two techniques is that unlike a batch technique of [7], the work of [3] aims at identifying every new measurement collected at a node as normal or anomalous in real-time. Davy et al. [8] consider the change of the normal model over time and online identifying outliers using previous data vectors in a sliding time window. Due to its expensive computational effort, this technique is not applicable to WSNs. 3. Fundamentals of the One-Class Centered Quarter-Sphere SVM In this paper, we exploit the one-class centered quarter- sphere SVM of Laskov et al. [6] to build the normal model of sensor measurements in a sliding time window. They have converted the quadratic optimization problem of the one-class SVM to a linear optimization problem. The geometry of the one-class centered quarter-sphere SVM- based approach is shown in Figure 1. Origin Margin Support vectors (0 < a < 1/vm) Feature 1 Feature2 Non Support vectors (a = 0) R Non-Margin Support vectors (Outliers) (a = 1/vm) Figure 1. Geometry of the quarter-sphere formulation of one-class SVM The constrained optimization problem of the one-class centered quarter-sphere SVM is formalized as follows: min R ,Ī¾ m R2 + 1 Ļ…m m i=1 Ī¾i (1) subject to : Ļ†(xi) 2 ā‰¤ R2 + Ī¾i, Ī¾i ā‰„ 0, i = 1, 2, . . . m where m denotes the number of data vectors in the train- ing set. The parameter Ļ… (0, 1) controls the number of outliers. The squared norm Ļ†(xi) 2 is given by the dot product Ļ†(xi)Ā·Ļ†(xi), which indicates a measure of similarity between Ļ†(xi) and Ļ†(xi) in the feature space. A kernel function k(xi, xi) is used to compute the similarity of any of two vectors in the feature space using the original attribute set. Hence, the dual formulation of (1) will become: min Ī± m āˆ’ m i=1 Ī±ik(xi, xi) (2) subject to : m i=1 Ī±i = 1, 0 ā‰¤ Ī±i ā‰¤ 1 Ļ…m , i = 1, 2, . . . m where Ī±i is the Lagrangian multiplier. In order to ļ¬x the center of the quarter-sphere at the origin, the mapped data vectors in the feature space need to be subtracted from the mean Ī¼ = 1 m m i=1 Ļ†(xi). The centered kernel matrix Kc can 991991
  • 3. be obtained in terms of the kernel matrix K = k(xi, xj) = (Ļ†(xi) Ā· Ļ†(xj)) using Kc = K āˆ’ 1mK āˆ’ K1m + 1mK1m, where 1m is an m Ɨ m matrix with all values equal to 1 m . From equation (2), the {Ī±i} value can be easily obtained using some effective linear optimization techniques [9]. The data vectors in the training set can be classiļ¬ed depending on the results of {Ī±i}, as shown in Figure 1. The training data vectors with 0 ā‰¤ Ī± ā‰¤ 1 Ļ…m , which fall on the quarter- sphere, are called margin support vectors. Their distances to the origin indicate the minimal radius R of the quarter- sphere and can be used to determine any new unseen data vector as normal or anomalous. 4. Adaptive and Online Outlier Detection Tech- niques for Wireless Sensor Networks In this section, we will describe our three online and local outlier detection techniques, which take different strategies to sequentially update the normal model formed by the one- class centered quarter-sphere SVM. The policies concerning updating the normal model in these techniques include updating (i) at each time interval, (ii) at a ļ¬xed-size time window, and (iii) depending on the previous decision results. These proposed techniques enable each sensor node in the network to exploit temporal correlations among its most recent sensor measurements to identify its new arriving measurement as normal or anomalous in real-time. More- over, using the high degree spatial correlations that exist between sensor readings of adjacent nodes, each node has more information to verify local outliers they detected. The whole detection process does not only depend on a nodeā€™s own decision criterion learned from its temporal readings but also on the decision criteria learned from its spatially neighboring nodes. 4.1. Problem Statement We consider that sensor nodes are time synchronized and are densely deployed in a homogeneous WSN, where sensor data tends to be correlated in both time and space. The network topology is modelled as an undirected graph G where G = (S, E). S represents the nodes in the network and E represents an edge which connects two nodes if they are within radio transmission range of each other. A subset N(S0) represents a closed neighborhood of a node S0 S, which contains the node S0 and its k spatially neighboring nodes. The k spatially neighboring nodes are represented by Sj = {Sj : j = 1 . . . k}, i.e., N(S0) = {Sj S|(Sj, S0) E} āˆŖ {S0}. An example of N(S0) is the closed disk centered at S0 with the radio transmission range of S0, as shown in Figure 2. At every time interval Ī”i, each sensor node in the set N(S0) measures a data vector. Let xi 0, xi 1, xi 2, . . . , xi k denote the data vector measured at S0, S1, S2, . . . , Sk, respectively. S0 S1 S2 S4 S3 S6 S5 N(S0) Figure 2. Example of a closed neighborhood N(S0) of the sensor node S0 Each data vector is composed of multiple attributes xil j , where xi j = {xil j : j = 0 . . . k, l = 1 . . . d} and xi j d . At time t, S0 has collected its m measurements from time tāˆ’m to time tāˆ’1: {xtāˆ’m 0 , . . . , xtāˆ’1 0 }. Our aim is to online identify every new measurement collected by S0 as normal or anomalous. This local process can be applied to each node in the network and thus scales well to large WSNs. 4.2. Instant Outlier Detection Technique The simplest method of updating the normal model over time is to compute the minimal radius of one-class quarter- sphere for each training set, i.e., at each time interval. Initially, each node learns the local radius of the quarter- sphere using its m sequential sensor measurements, which may include some anomalous data. The one-class quarter- sphere SVM can efļ¬ciently ļ¬nd a minimal radius R to enclose the majority of these mapped sensor measurements in the feature space. Each node then locally broadcasts the learned radius information to its spatially neighboring nodes. When receiving the radius from all of its neighbors, each node computes a median radius Rm of its neighboring nodes. We use median because in estimating the ā€centerā€ of a sample set, the median is more robust than the mean. Sensor data of adjacent nodes in a densely deployed WSN tend to be spatially and temporally correlated [10]. When a new sensor measurement xt 0 is collected at time t, S0 ļ¬rst compares the distance of xt 0 from the origin with the radius R learned with respect to its m previous measurements {xtāˆ’m 0 , . . . , xtāˆ’1 0 } in a sliding window. For computation of distance between xt 0 and the origin in the feature space, i.e., d(x) please refer to [3]. The data xt 0 will be classiļ¬ed as normal if d(x) <= R, which means that xt 0 falls on or inside the quarter-sphere at S0. Otherwise if d(x) > R, xt 0 is a potential (temporal) outlier. In this case, S0 further compares d(x) with the median radius Rm of its neighboring nodes. If d(x) > Rm, xt 0 will ļ¬nally be classiļ¬ed as outlier in the subset N(S0). Thus, the decision function can be formulated as (3), where the sensor measurements with a negative value are classiļ¬ed as outlier. 992992
  • 4. f(x) = sgn(R āˆ’ d(x)) āˆ§ sgn(Rm āˆ’ d(x)) (3) The two radii R and Rm are important decision criteria for local outlier identiļ¬cation. Using the radius informa- tion from adjacent nodes is also to overcome the main shortcoming of unsupervised techniques, which is suffering from high false alarm rate if the given data contains many anomalies [1]. The next step of this technique is to update the normal model at each time interval. Each update step needs to add a current measurement and to remove the oldest measurement from the sliding window. This procedure is repeated with evolving the training set of ļ¬xed size. This instant outlier detection (IOD) technique is shown in Figure 3 and Table 1. Time m {xt-mā€¦ xt-1 } Current time (t) xt-m-1 xt Figure 3. Principle of the IOD. Circles represent sensor measurements. The ā€slidingā€ training set is composed of the last m measurements. The black dot represents the measurement identiļ¬ed at current time t. 1 procedure LearningSVM() 2 each node collects m sensor measurements for learning its own radius R and locally broadcasts the radius to its spatially neighboring nodes; 3 each node then computes Rm; 4 initiate OutlierDetectionProcess(R, Rm); 5 return; 6 procedure OutlierDetectionProcess(R, Rm) 7 when xt arrives 8 compute d(x); 9 if (d(x) > R AND d(x) > Rm) 10 xt indicates an outlier; 11 else 12 xt indicates a normal measurement; 13 endif; 14 initiate UpdatingProcess(xt); 15 set t ā† t + 1; 16 return; 17 procedure UpdatingProcess(xt) 18 update the training set: the oldest measurement xtāˆ’m is removed and replaced by xt. 19 recompute R using the updated training set. 20 locally broadcast R to its neighboring nodes; 21 recompute Rm of its neighboring nodes; 22 return; Table 1. The pseudocode of the IOD. Once the radius of a node is updated, the node locally broadcasts the new radius R to its neighboring nodes. The median radius Rm of neighboring nodes also needs to be recomputed. The updated R and Rm are used to identify the next sensor measurement as normal or anomalous. 4.3. Fixed-size Time Window-based Outlier Detec- tion Technique A slightly modiļ¬ed version of the IOD is to identify each sensor measurement upon being collected but update the normal model at a ļ¬xed-size time window. It means that the training set will be freezed for the next n (n m) measurements, while each new measurement upon arrival will be classiļ¬ed as normal or anomalous. Therefore, there is no delay in outlier detection itself. Each update step in this technique requires to add the previous n sensor measurements and to remove the oldest n measurements from the sliding window. The corresponding modiļ¬cation of this ļ¬xed-sized time window-based outlier detection (FTWOD) technique is shown in Figure 4 and Table 2. In fact, the FTWOD becomes like the IOD when using n = 1. Time m {xt-mā€¦ xt-1 } Current time (t+n-1) xt-m-1 xt+n-1 n Figure 4. Principle of the FTWOD. The training set is updated at each n measurements. . . .... 14 If (t % n == 0) 14ā€™ initiate UpdatingProcess(xtāˆ’n+1 . . . xt); . . .... Table 2. The modiļ¬cation for the FTWOD. 4.4. Adaptive Outlier Detection Technique The policies of the above two techniques is updating the normal model either at each time interval or at n time intervals, without considering the impact when a normal or anomalous measurement is incorporated into the sliding training set. Moreover, they introduce a high communication load due to the fact that each node is required to locally broadcast the updated R to its neighboring nodes. Thus, for the sake of energy efļ¬ciency and computational simplicity, we introduce a third technique, which takes a new strategy to update the normal model depending on the previous decision results, i.e., only when a new measurement will have a signiļ¬cant impact on the previous normal model. As shown in Figure 1, the margin support vectors and outliers have non-zero Ī± values so that the dual formulation of (1) will not be met if they are added into the existed training set. In order to meet the constraints of (2) and ļ¬nd a minimal radius, when a current measurement is detected 993993
  • 5. as margin support vector or outlier, this technique adds all the previous nā€™ measurements including the current measure- ment into the training set and also removes the same amount of the oldest measurements from the training set. Due to the fact that compared to normal data, outliers and margin support vectors are very rare [1], this technique is more efļ¬cient in terms of energy and computational costs. The corresponding modiļ¬cation of this adaptive outlier detection (AOD) technique is shown in Figure 5 and Table 3. Time m {xt-mā€¦ xt -1} Current time (t+nā€™-1) xt-m-1 xt+nā€™-1 nā€™ Figure 5. Principle of the AOD. The black dot represents the measurement identiļ¬ed as a margin support vector or an outlier. . . .... 14 If (xt is an outlier or a margin support vector) 14ā€™ initiate UpdatingProcess(xtāˆ’n +1 . . . xt); . . .... Table 3. The modiļ¬cation for the AOD. 5. Experimental Results and Evaluation This section speciļ¬es the performance evaluation of our three techniques compared to the online outlier detection (OOD) technique presented earlier in [3]. In our experi- ments, we have used synthetic data as well as real data gathered from a deployment of WSN using the SensorScope System [2]. For the simulation, we use Matlab and consider a closed neighborhood as shown in Figure 2, which is centered at a node with its 6 spatially neighboring nodes. 5.1. Experimental Datasets The 2-D synthetic data used for each node is composed of a mixture of three Gaussian distribution with uniform out- liers; the mean is randomly selected from (0.3, 0.35, 0.45), and the standard deviation is selected as 0.03. Subsequently, 10% (of the normal data) anomalous data is introduced and uniformly distributed in the interval [0.5, 1]. The data values are normalized to ļ¬t in the [0, 1]. The OOD in [3] identiļ¬es outliers in an online manner using the same training set without considering the evolution of the normal model over time. The testing data used for each node comprises of 200 normal and 20 anomalous data. The real data are collected from a closed neighborhood from a WSN deployed in Grand-St-Bernard as shown in Figure 6. The closed neighborhood contains the node 2 and its 6 spatially neighboring nodes, namely nodes 3, 4, 8, 12, 20, 14. The network recorded ambient temperature, relative humidity, soil moisture, solar radiation and watermark mea- surements at 2 minutes intervals. In our experiments, we use a 6am-6pm period of data recorded on 20th September 2007 with two attributes: ambient temperature and relative humidity for each sensor measurement. The data values are normalized to the range [0, 1]. The amount of anomalous data is about 10% of normal data. The labels of measure- ments are obtained depending on the degree of dissimilarity between one another. Figure 6. Grand-St-Bernard deployment in [2] 5.2. Experimental Results and Evaluation We have tested the following three kernel functions: (i) Linear kernel function: kLinear = (x1.x2), where {x1, x2} are the data vectors; (ii) Radial basis function (RBF) kernel function: kRBF = exp(āˆ’ x1 āˆ’ x2 2 /Ļƒ2 ), where Ļƒ is the width parameter of the kernel function; and (iii) Polynomial kernel function: kP olynomial = (x1.x2 + 1)r , where r is the degree of the polynomial. Kernel matrices generated using the above kernel func- tions were centered. We have evaluated two important per- formance metrics, the detection rate, which represents the percentage of anomalous data that are correctly considered as outliers, and the false alarm rate, also known as false positive rate (FPR), which represents the percentage of normal data that are incorrectly considered as outliers. We have examined the effect of the regularisation pa- rameter Ļ… for our three outlier detection techniques and the technique presented in [3]. Ļ… represents the fraction of outliers and we have varied it in the range from 0.01 to 0.25 in intervals of 0.03 and the kernel width parameter Ļƒ is set to 0.25. A receiver operating characteristics (ROC) curve is used to represent the trade-off between the detection rate and the false alarm rate. The larger the area under the ROC curve, the better the performance of the technique. Figure 7 shows the ROC curves obtained for the four techniques using the RBF kernel function for synthetic data. Figure 7(b) (c) show the detection rate and the false alarm 994994
  • 6. 0 5 10 15 20 20 40 60 80 100 IOD FTWOD AOD OOD (a) ROC Curves (RBF Kernel Function) FPR (%) DR(%) (b) Detection Rate Vs Nu (RBF Kernel Function) Nu (v) DR(%) 0 0.05 0.1 0.15 0.2 0.25 0 20 40 60 80 100 IOD FTWOD AOD OOD (c) False Alarm Rate Vs Nu (RBF Kernel Function) FPR(%) Nu (v) 0 0.05 0.1 0.15 0.2 0.25 0 5 10 15 20 IOD FTWOD AOD OOD Figure 7. (a) ROC curves with RBF kernel for synthetic data; (b) Detection rate with RBF kernel for real data; (c) False alarm rate with RBF kernel for real data. Computational complexity Memory Training Testing complexity IOD O(N āˆ— L) O(N āˆ— m) O(d āˆ— m) FTWOD O((N/n) āˆ— L) O(N āˆ— m) O(d āˆ— (m + n)) AOD O(n āˆ— L) O(N āˆ— m) O(d āˆ— (m + n )) Table 4. Complexity analysis of three online outlier detection techniques. rate obtained for the four techniques using the RBF kernel function for real data. Simulation results show that our three techniques achieve better accuracy compared to the technique in [3]. It has been previously shown that work of [3] outperforms a batch outlier detection technique [7] for WSNs. Having these new protocols outperforming the work in [3], we conclude that our protocols are more efļ¬cient in detecting outliers in WSNs in an online manner. Computational and memory complexity of our techniques are presented in Table 4, where m and N devote the number of data in the training and testing sets, respectively, d represents the dimensionality of the measurements and O(L) represents the computational complexity of solving a linear optimization problem. 6. Conclusion In this paper, we have developed three one-class SVM- based outlier detection techniques that update the normal model of the sensed data in an online manner. We compared the performance of these techniques with an earlier tech- nique using synthetic and real data of the SensorScope Sys- tem. Experimental results show that our techniques achieves better detection accuracy and lower false alarm, while keeping the computational complexity and memory costs low. Our future research includes testing the communication overhead of our techniques, examining the effect of the kernel parameters, and real implementation of the protocols on the sensor nodes. Acknowledgment This work is supported by the EUā€™s Seventh Framework Programme and the SENSEI project. References [1] V. Chandola, A. Banerjee, and V. Kumar. Outlier detection: A survey. Technical Report, University of Minnesota, 2007. [2] http : //sensorscope.epfl.ch/index.php/MainP age. [3] Y. Zhang, N. Meratnia, and P. Havinga. An online outlier detection technique for wireless sensor networks using unsu- pervised quarter-sphere support vector machine. ISSNIP 2008, to appear. [4] B. Scholkopf, J. C. Platt, J. C. Shawe-Taylor, A. J. Smola, and R. C. Williamson. Estimating the support of a high- dimensional distribution. Neural Computation, 13(7):1443- 1471, 2001. [5] D. M. J. Tax and R. P. W. Duin. Support vector data description. Machine Learning, 54(1):45-66, 2004. [6] P. Laskov, C. Schafer, and I. Kotenko. Intrusion detection in unlabeled data with quarter sphere support vector machines. Detection of Intrusions and Malware & Vulnerability Assess- ment, 2004. [7] S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek. Quarter sphere based distributed anomaly detection in wireless sensor networks. IEEE International Conference on Commu- nications, June 2007. [8] M. Davy, F. Desobry, A. Gretton, and C. Doncarli. An online support vector machine for abnomal events detection. Signal Processing, 8(2):52ā€“57, 2006. [9] S. G. Nash and A. Sofer. Linear and nonlinear programming. McGrawHill, 37(3-4), 1996. [10] Y. Zhang, N. Meratnia, and P. Havinga. Outlier detection techniques for wireless sensor networks: A survey. Technical Report, University of Twente, 2007. 995995