15 research outputs found

    The Way Cyber Physical Systems Will Revolutionise Maintenance

    Get PDF
    The way maintenance is carried out is altering rapidly. The introduction of Cyber Physical Systems (CPS) and cloud technologies are providing new technological possibilities that change dramatically the way it is possible to follow production machinery and the necessity to carry out maintenance. In the near future, the number of machines that can be followed from remoteness will explode. At the same time, it will be conceivable to carry out local diagnosis and prognosis that support the adaptation of Condition Based Maintenance (CBM) i.e. financial optimisation can drive the decision whether a machine needs maintenance or not. Further to this, the cloud technology allows to accumulate relevant data from numerous sources that can be used for further improvement of the maintenance practices. The paper goes through the new technologies that have been mentioned above and how they can be benefitted from in practise

    Cyber Physical System Based Proactive Collaborative Maintenance

    Get PDF
    The aim of the MANTIS project is to provide a proactive maintenance service platform architecture based on Cyber Physical Systems. The platform will allow estimating future performance, predicting and preventing imminent failures and scheduling proactive maintenance. Maintenance is an important element that creates added value in the business processes and it also creates new business models with a stronger service orientation. Physical systems and the environment they work in are continuously monitored by a range of intelligent sensors, resulting in massive amounts of data, which characterise the usage history, working condition, location, movement and other physical properties of the systems. These systems are part of a larger network of heterogeneous and collaborative systems (e.g. vehicle fleets) connected via robust communication mechanisms able to operate in challenging environments. MANTIS consists of distributed processing chains that efficiently transform raw data into knowledge, while minimising the need for bandwidth. Sophisticated distributed sensing and decision-making functions are performed at different levels collaboratively, ranging from local nodes to locally optimise performance, bandwidth and maintenance; to cloud-based platforms that integrate information from diverse systems and execute distributed processing and analytics algorithms for global decision-making

    Short Messages Spam Filtering Using Sentiment Analysis

    Get PDF
    In the same way that short instant messages are more and more used, spam and non-legitimate campaigns through this type of communication systems are growing up. Those campaigns, besides being an illegal online activity, are a direct threat to the privacy of the users. Previous short messages spam filtering techniques focus on automatic text classification and do not take message polarity into account. Focusing on phone SMS messages, this work demonstrates that it is possible to improve spam filtering in short message services using sentiment analysis techniques. Using a publicly available labelled (spam/legitimate) SMS dataset, we calculate the polarity of each message and aggregate the polarity score to the original dataset, creating new datasets. We compare the results of the best classifiers and filters over the different datasets (with and without polarity) in order to demonstrate the influence of the polarity. Experiments show that polarity score improves the SMS spam classification, on the one hand, reaching to a 98.91% of accuracy. And on the other hand, obtaining a result of 0 false positives with 98.67% of accuracy

    Short Messages Spam Filtering Combining Personality Recognition and Sentiment Analysis

    Get PDF
    Currently, short communication channels are growing up due to the huge increase in the number of smartphones and online social networks users. This growth attracts malicious campaigns, such as spam campaigns, that are a direct threat to the security and privacy of the users. While most researches are focused on automatic text classification, in this work we demonstrate the possibility of improving current short messages spam detection systems using a novel method. We combine personality recognition and sentiment analysis techniques to analyze Short Message Services (SMS) texts. We enrich a publicly available dataset adding these features, first separately and after in combination, of each message to the dataset, creating new datasets. We apply several combinations of the best SMS spam classifiers and filters to each dataset in order to compare the results of each one. Taking into account the experimental results we analyze the real inuence of each feature and the combination of both. At the end, the best results are improved in terms of accuracy, reaching to a 99.01% and the number of false positive is reduced

    Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends

    Get PDF
    Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as such, IN protection is an active research field. Among different types of security solutions, IN Anomaly Detection Systems (ADSs) have received wide attention from the scientific community.While INs have grown in size and in complexity, requiring the development of novel, Big Data solutions for data processing, IN ADSs have not evolved at the same pace. In parallel, the development of BigData frameworks such asHadoop or Spark has led the way for applying Big Data Analytics to the field of cyber-security,mainly focusing on the Information Technology (IT) domain. However, due to the particularities of INs, it is not feasible to directly apply IT security mechanisms in INs, as IN ADSs face unique characteristics. In this work we introduce three main contributions. First, we survey the area of Big Data ADSs that could be applicable to INs and compare the surveyed works. Second, we develop a novel taxonomy to classify existing INbased ADSs. And, finally, we present a discussion of open problems in the field of Big Data ADSs for INs that can lead to further development

    A methodology and experimental implementation for industrial robot health assessment via torque signature analysis

    Get PDF
    This manuscript focuses on methodological and technological advances in the field of health assessment and predictive maintenance for industrial robots. We propose a non-intrusive methodology for industrial robot joint health assessment. Torque sensor data is used to create a digital signature given a defined trajectory and load combination. The signature of each individual robot is later used to diagnose mechanical deterioration. We prove the robustness and reliability of the methodology in a real industrial use case scenario. Then, an in depth mechanical inspection is carried out in order to identify the root cause of the failure diagnosed in this article. The proposed methodology is useful for medium and long term health assessment for industrial robots working in assembly lines, where years of almost uninterrupted work can cause irreversible damage

    Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance

    Get PDF
    This paper presents the implementation of a refer-ence architecture for Cyber Physical Systems (CPS) to supportCondition Based Maintenance (CBM) of industrial assets. The article focuses on describing how the MANTIS ReferenceArchitecture is implemented to support predictive maintenance of clutch-brake assets fleet, and includes the data analysis techniques and algorithms implemented at platform level to facilitate predictive maintenance activities. These technologiesare (1) Root Cause Analysis powered by Attribute Oriented Induction Clustering and (2) Remaining Useful Life powered by Time Series Forecasting. The work has been conducted in a real use case within the EU project MANTIS

    Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments

    Get PDF
    Industrial environments have vastly changed sincethe conception of initial primitive and isolated networks. Thecurrent full interconnection paradigm, where connectivity be-tween different devices and the Internet has become a businessnecessity, has driven device interconnectivity towards buildingthe Industrial Internet of Things (IIoT), enabling added valueservices such as supply chain optimization or improved processcontrol. However, whereas interconnectivity has increased, IIoTsecurity practices has not evolved at the same pace, due partlyto inherited security practices from when industrial networkswhere not connected and the existence of basic hardware withno security functionalities. In this work, we present an AnomalyDetection System for industrial environments that monitorsphysical quantities to detect intrusions. It is based in the nullspace detection, which is at the same time, based on StochasticSubspace Identification (SSI). The approach is validated usingthe Tennessee-Eastman chemical process

    Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data

    Get PDF
    This study presents a novel soft computing system that provides network managers with a synthetic and intuitive representation of the situation of the monitored network, in order to reduce the widely known high false-positive rate associated to misuse-based Intrusion Detection Systems (IDSs). The proposed system is based on the use of different projection methods for the visual inspection of honeypot data, and may be seen as a complementary network security tool that sheds light on internal data structures through visual inspection. Furthermore, it is intended to understand the performance of Snort (a well-known misuse-based IDS) through the visualization of attack patterns. Empirical verification and comparison of the proposed projection methods are performed in a real domain where real-life data are defined and analyzed
    corecore