15 research outputs found
The Way Cyber Physical Systems Will Revolutionise Maintenance
The way maintenance is carried out is altering rapidly. The introduction of Cyber Physical Systems (CPS) and cloud technologies are providing new technological possibilities that change dramatically the way it is possible to follow production machinery and the necessity to carry out maintenance. In the near future, the number of machines that can be followed from remoteness will explode. At the same time, it will be conceivable to carry out local diagnosis and prognosis that support the adaptation of Condition Based Maintenance (CBM) i.e. financial optimisation can drive the decision whether a machine needs maintenance or not. Further to this, the cloud technology allows to accumulate relevant data from numerous sources that can be used for further improvement of the maintenance practices. The paper goes through the new technologies that have been mentioned above and how they can be benefitted from in practise
Cyber Physical System Based Proactive Collaborative Maintenance
The aim of the MANTIS project is to provide a proactive maintenance service platform architecture based on Cyber
Physical Systems. The platform will allow estimating future performance, predicting and preventing imminent failures and
scheduling proactive maintenance. Maintenance is an important element that creates added value in the business processes and it also creates new business models with a stronger service orientation. Physical systems and the environment they work
in are continuously monitored by a range of intelligent sensors, resulting in massive amounts of data, which characterise the usage history, working condition, location, movement and other physical properties of the systems. These systems are part of a larger network of heterogeneous and collaborative systems (e.g. vehicle fleets) connected via robust communication mechanisms able to operate in challenging environments. MANTIS consists of distributed processing chains that efficiently transform raw data into knowledge, while minimising the need for bandwidth. Sophisticated distributed sensing and decision-making functions are performed at different levels collaboratively, ranging from local nodes to locally optimise performance, bandwidth and maintenance; to cloud-based platforms that integrate information from diverse systems and execute distributed processing and analytics algorithms for global decision-making
Short Messages Spam Filtering Using Sentiment Analysis
In the same way that short instant messages are more and more used, spam and non-legitimate campaigns through this type of communication systems are growing up. Those campaigns, besides being an illegal online activity, are a direct threat to the privacy of the users. Previous short messages spam filtering techniques focus on automatic text classification and do not take message polarity into account. Focusing on phone SMS messages, this work demonstrates that it is possible to improve spam filtering in short message services using sentiment analysis techniques. Using a publicly available labelled (spam/legitimate) SMS dataset, we calculate the polarity of each message and aggregate the polarity score to the original dataset, creating new datasets. We compare the results of the best classifiers and filters over the different datasets (with and without polarity) in order to demonstrate the influence of the polarity. Experiments show that polarity score improves the SMS spam classification, on the one hand, reaching to a 98.91% of accuracy. And on the other hand, obtaining a result of 0 false positives with 98.67% of accuracy
Short Messages Spam Filtering Combining Personality Recognition and Sentiment Analysis
Currently, short communication channels are growing up due to the huge increase in the number of smartphones and online social networks users. This growth attracts malicious campaigns, such as spam campaigns, that are a direct threat to the security and privacy of the users. While most researches are focused on automatic text classification, in this work we demonstrate the possibility of improving current short messages spam detection systems using a novel method. We combine personality recognition and sentiment analysis techniques to analyze Short Message Services (SMS) texts. We enrich a publicly available dataset adding these features, first separately and after in combination, of each message to the dataset, creating new datasets. We apply several combinations of the best SMS spam classifiers and filters to each dataset in order to compare the results of each one. Taking into account the experimental results we analyze the real inuence of each feature and the combination of both. At the end, the best results are improved in terms of accuracy, reaching to a 99.01% and the number of false positive is reduced
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical
processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as such, IN protection is an active research
field. Among different types of security solutions, IN Anomaly Detection Systems (ADSs) have received wide attention from the
scientific community.While INs have grown in size and in complexity, requiring the development of novel, Big Data solutions for
data processing, IN ADSs have not evolved at the same pace. In parallel, the development of BigData frameworks such asHadoop or
Spark has led the way for applying Big Data Analytics to the field of cyber-security,mainly focusing on the Information Technology
(IT) domain. However, due to the particularities of INs, it is not feasible to directly apply IT security mechanisms in INs, as IN
ADSs face unique characteristics. In this work we introduce three main contributions. First, we survey the area of Big Data ADSs
that could be applicable to INs and compare the surveyed works. Second, we develop a novel taxonomy to classify existing INbased
ADSs. And, finally, we present a discussion of open problems in the field of Big Data ADSs for INs that can lead to further
development
A methodology and experimental implementation for industrial robot health assessment via torque signature analysis
This manuscript focuses on methodological and technological advances in the field of health assessment and predictive maintenance for industrial robots. We propose a non-intrusive methodology for industrial robot joint health assessment. Torque sensor data is used to create a digital signature given a defined trajectory and load combination. The signature of each individual robot is later used to diagnose mechanical deterioration. We prove the robustness and reliability of the methodology in a real industrial use case scenario. Then, an in depth mechanical inspection is carried out in order to identify the root cause of the failure diagnosed in this article. The proposed methodology is useful for medium and long term health assessment for industrial robots working in assembly lines, where years of almost uninterrupted work can cause irreversible damage
Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance
This paper presents the implementation of a refer-ence architecture for Cyber Physical Systems (CPS) to supportCondition Based Maintenance (CBM) of industrial assets. The article focuses on describing how the MANTIS ReferenceArchitecture is implemented to support predictive maintenance of clutch-brake assets fleet, and includes the data analysis techniques and algorithms implemented at platform level to facilitate predictive maintenance activities. These technologiesare (1) Root Cause Analysis powered by Attribute Oriented Induction Clustering and (2) Remaining Useful Life powered by Time Series Forecasting. The work has been conducted in a real use case within the EU project MANTIS
Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments
Industrial environments have vastly changed sincethe conception of initial primitive and isolated networks. Thecurrent full interconnection paradigm, where connectivity be-tween different devices and the Internet has become a businessnecessity, has driven device interconnectivity towards buildingthe Industrial Internet of Things (IIoT), enabling added valueservices such as supply chain optimization or improved processcontrol. However, whereas interconnectivity has increased, IIoTsecurity practices has not evolved at the same pace, due partlyto inherited security practices from when industrial networkswhere not connected and the existence of basic hardware withno security functionalities. In this work, we present an AnomalyDetection System for industrial environments that monitorsphysical quantities to detect intrusions. It is based in the nullspace detection, which is at the same time, based on StochasticSubspace Identification (SSI). The approach is validated usingthe Tennessee-Eastman chemical process
Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data
This study presents a novel soft computing system that provides network managers with a synthetic and intuitive representation of the situation of the monitored network, in order to reduce the widely known high false-positive rate associated to misuse-based Intrusion Detection Systems (IDSs). The proposed system is based on the use of different projection methods for the visual inspection of honeypot data, and may be seen as a complementary network security tool that sheds light on internal data structures through visual inspection. Furthermore, it is intended to understand the performance of Snort (a well-known misuse-based IDS) through the visualization of attack patterns. Empirical verification and comparison of the proposed projection methods are performed in a real domain where real-life data are defined and analyzed