32 research outputs found

    Benchmarking Change Detector Algorithms from Different Concept Drift Perspectives

    Get PDF
    The stream mining paradigm has become increasingly popular due to the vast number of algorithms and methodologies it provides to address the current challenges of Internet of Things (IoT) and modern machine learning systems. Change detection algorithms, which focus on identifying drifts in the data distribution during the operation of a machine learning solution, are a crucial aspect of this paradigm. However, selecting the best change detection method for different types of concept drift can be challenging. This work aimed to provide a benchmark for four drift detection algorithms (EDDM, DDM, HDDMW, and HDDMA) for abrupt, gradual, and incremental drift types. To shed light on the capacity and possible trade-offs involved in selecting a concept drift algorithm, we compare their detection capability, detection time, and detection delay. The experiments were carried out using synthetic datasets, where various attributes, such as stream size, the amount of drifts, and drift duration can be controlled and manipulated on our generator of synthetic stream. Our results show that HDDMW provides the best trade-off among all performance indicators, demonstrating superior consistency in detecting abrupt drifts, but has suboptimal time consumption and a limited ability to detect incremental drifts. However, it outperforms other algorithms in detection delay for both abrupt and gradual drifts with an efficient detection performance and detection time performance

    Detecting and mitigating adversarial examples in regression tasks: A photovoltaic power generation forecasting case study

    Get PDF
    With data collected by Internet of Things sensors, deep learning (DL) models can forecast the generation capacity of photovoltaic (PV) power plants. This functionality is especially relevant for PV power operators and users as PV plants exhibit irregular behavior related to environmental conditions. However, DL models are vulnerable to adversarial examples, which may lead to increased predictive error and wrong operational decisions. This work proposes a new scheme to detect adversarial examples and mitigate their impact on DL forecasting models. This approach is based on one-class classifiers and features extracted from the data inputted to the forecasting models. Tests were performed using data collected from a real-world PV power plant along with adversarial samples generated by the Fast Gradient Sign Method under multiple attack patterns and magnitudes. One-class Support Vector Machine and Local Outlier Factor were evaluated as detectors of attacks to Long-Short Term Memory and Temporal Convolutional Network forecasting models. According to the results, the proposed scheme showed a high capability of detecting adversarial samples with an average F1-score close to 90%. Moreover, the detection and mitigation approach strongly reduced the prediction error increase caused by adversarial samples

    Time series segmentation based on stationarity analysis to improve new samples prediction

    Get PDF
    A wide range of applications based on sequential data, named time series, have become increasingly popular in recent years, mainly those based on the Internet of Things (IoT). Several different machine learning algorithms exploit the patterns extracted from sequential data to support multiple tasks. However, this data can suffer from unreliable readings that can lead to low accuracy models due to the low-quality training sets available. Detecting the change point between high representative segments is an important ally to find and thread biased subsequences. By constructing a framework based on the Augmented Dickey-Fuller (ADF) test for data stationarity, two proposals to automatically segment subsequences in a time series were developed. The former proposal, called Change Detector segmentation, relies on change detection methods of data stream mining. The latter, called ADF-based segmentation, is constructed on a new change detector derived from the ADF test only. Experiments over real-file IoT databases and benchmarks showed the improvement provided by our proposals for prediction tasks with traditional Autoregressive integrated moving average (ARIMA) and Deep Learning (Long short-term memory and Temporal Convolutional Networks) methods. Results obtained by the Long short-term memory predictive model reduced the relative prediction error from 1 to 0.67, compared to time series without segmentation

    Behavior of the DenStream Clustering Algorithm for Attack Detection in the Internet of Things

    Get PDF
    Multiple attack detection schemes based on supervised batch learning are presented in the literature as an alternative to improve Internet of Things (IoT) security. These schemes require benign and malicious traffic samples for training and are unable to easily adapt to changes in the analyzed data. In this work, we study how we can use DenStream, an unsupervised stream mining algorithm, to detect attacks in IoT networks. This type of algorithm does not require labeled examples and can learn incrementally, adapting to changes. We aim to investigate whether attacks can be detected by monitoring the behavior of DenStream's clusters. The results showed that DenStream could provide indicators of attack occurrence in TCP, UDP, and ICMP traffic

    Information and telecommunications project for a digital city: a brazilian case study

    Get PDF
    Making information and telecommunications available is a permanent challenge for cities concerned to their social, urban and local planning and development, focused on life quality of their citizens and on the effectiveness of public management. Such a challenge requires the involvement of everyone in the city. The objective is to describe the information and telecommunications project from the planning of a digital city carried out in Vinhedo-SP, Brazil. It was built as a telecommunications infrastructure of the kind of "open access metropolitan area networks" which enables the integration of citizens in a single telecommunications environment. The research methodology was emphasized by a case study which turned to be a research-action, comprising the municipal administration and its local units. The results achieved describe, by means of a methodology, the phases, sub-phases, activities, approval points and resulting products, and formalize their respective challenges and difficulties. The contributions have to do with the practical feasibility of the project and execution of its methodology. The conclusion reiterates the importance of the project, collectively implemented and accepted, as a tool to help the management of cities, in the implementation of Strategic Digital City Projects, in the decisions of public administration managers, and in the quality of life of their citizens3119811

    Anomaly Detection For Network Servers Using Digital Signature Of Network Segment

    No full text
    Network anomaly detection is essential for rapid fault recovery and increasing network reliability. This paper presents results of the utilization of digital signature of network segments (DSNS) for network servers to characterize the traffic that flow through the network servers. It's also presented an alarm system model that use the network servers' traffic characterization generated by DSNS. The obtained results validate the experiment and show in practice significant advantages in networks management. © 2005 IEEE.2005290295Barford, P., Kline, J., Plonka, D., Ron, A., A signal analysis of network traffic anomalies, internet measurement workshop (2002) Proceedings of the Second ACM SIGCOMM Workshop on Internet Measurement, , Marseille, ISBN:1-58113-603-XThottan, M., Ji, C., Anomaly detection in IP networks (2003) Signal Processing, IEEE Transactions on, 51 (8). , AugLakhina, A., Crovella, M., Diot, C., Diagnosing network-wide traffic anomalies (2004) SIGCOMM'04, , Portland, Oregon, USA, ISBN: 1-58113-862-8Rueda, A., Kinsner, A survey of traffic characterization techniques in telecommunication networks (1996) Electrical and Computer Engineering, 1996. Canadian Conference on, 2, pp. 830-833. , Iss., 26-29 May vol.2Adas, A., Traffic models in broadband networks (1997) Communications Magazine, 35 (7), pp. 82-89. , IEEE, JulProença Jr., M.L., Coppelmans, C.M.L., The hurst parameter for digital signature of network segment (2004) LNCS, 3124. , 11 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS - ICT 2004, Fortaleza. Springer-Verlag. 08, ISBN 3-540-22571-4Papavassiliou, S., Pace, M., Zawadzki, A., Ho, L., Implementing enhanced network maintenance for transaction access services: Tools and applications (2000) Communications, 2000. ICC 2000. IEEE International Conference on, 1. , JuneHajji, H., Baselining network traffic and online faults detection (2003) Communications, 2003. ICC '03. IEEE International Conference on, 1. , 11-15 MayManagement information base for network management of TCP/IP-based internets: MIB-II (1991) RFC, 1213. , marProença Jr., M.L., Uma experiência de gerenciamento de rede com backbone ATM através da ferramenta GBA (2001) XIX Simpósio Brasileiro de Telecomunicaçöes - SBrT 2001, , Fortaleza 03-06/09Martin, B.J., Altman Douglas, G., Statistical methods for assessing agreement between two methods of clinical measurement (1986) The LANCET, 1, pp. 307-310Jain, R., The art of computer systems performance analysis (1991) Techniques for Experimental Design, Measurement, Simulation and Modeling, , Willey ComputingRemote monitoring management information base version (1995) RFC, 1757. , fe
    corecore