2,371
Views
51
CrossRef citations to date
0
Altmetric
Review Article

A survey of machine learning methods applied to anomaly detection on drinking-water quality data

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Pages 235-248 | Received 12 Jun 2018, Accepted 22 Jun 2019, Published online: 19 Jul 2019

References

  • Abid, A., A. Kachouri, and A. Mahfoudhi. 2017. “Data Analysis and Outlier Detection in Smart City.” In 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C), 1–4, Sfax, Tunisia, February 17–19.
  • Adu-Manu, K., C. Tapparello, W. Heinzelman, F. Katsriku, and J.-D. Abdulai. 2017. “Water Quality Monitoring Using Wireless Sensor Networks.” ACM Transactions on Sensor Networks (TOSN) 13 (1): 1–41. doi:10.1145/3005719.
  • Ahmed, M., A. N. Mahmood, and J. Hu. 2016. “A Survey of Network Anomaly Detection Techniques.” Journal of Network and Computer Applications, 60: 19–31. doi:10.1016/j.jnca.2015.11.016.
  • Akhoondzadeh, M. 2015. “Application of Artificial Bee Colony Algorithm in TEC Seismo-Ionospheric Anomalies Detection.” Advances in Space Research 56 (6): 1200–1211. doi:10.1016/j.asr.2015.06.024.
  • Akyildiz, I. F., W. Su, Y. Sankarasubramaniam, and E. Cayirci. 2002. “Wireless Sensor Networks: A Survey.” Computer Networks 38 (4): 393–422. doi:10.1016/S1389-1286(01)00302-4.
  • Andrews, J. T. A., E. J. Morton, and L. D. Griffin. 2016. “Transfer representation-learning for anomaly detection.” In Proceedings of 33rd International Conference on Machine Learning. JMLR: New York, NY, USA.
  • Axelsson, S. 1998. “Intrusion Detection Systems: A Survey and Taxonomy.” Technical Report 98-17, Chalmers University of Technology, Goteborg, Sweden.
  • Bakker, M., T. Lapikas, B. H. Tangena, and J. H. G. Vreeburg. 2012. “Monitoring Water Supply Systems for Anomaly Detection and Response.”IWA.
  • Bartrand, T., W. Grayman, and T. Haxton. 2017. Drinking Water Treatment Source Water Early Warning System State of the Science Review. United States Environmental Protection Agency, Washington, DC, EPA/600/R-17/305.
  • Bengio, Y. 2009. “Learning Deep Architectures for AI.” Foundation and Trends in Machine Learning 2 (1): 127.
  • Bengio, Y. 2012. “Deep Learning of Representations for Unsupervised and Transfer Learning”. In Proceedings of ICML Workshop on Unsupervised and Transfer Learning 17–36, Washington, USA.
  • Bucak, I. O., and B. Karlik. 2011. “Detection of Drinking Water Quality Using CMAC Based Artificial Neural Networks.” Ekoloji 20 (78): 75–81. doi:10.5053/ekoloji.
  • Chandola, V., A. Banerjee, and V. Kumar. 2009. “Anomaly Detection: A Survey.” ACM Computing Surveys. doi:10.1145/1541880.1541882.
  • Chandy, S. E., A. Rasekh, Z. ;. A. Barker, and M. E. Shafiee. 2019. “Cyberattack Detection Using Deep Generative Models with Variational Inference.” Journal of Water Resources Planning and Management 145 (2): 4018093. doi:10.1061/(ASCE)WR.1943-5452.0001007. February 1.
  • Chen, L., and K.-D. Kang. 2015. “A Framework for Real-Time Information Derivation from Big Sensor Data.” In 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems 2015 August 24, 1020–1026, New York, NY, USA.
  • Chen, X., F. Feng, J. Wu, and W. Liu. 2018. “Anomaly Detection for Drinking Water Quality via Deep biLSTM Ensemble.” In Proceedings of the Genetic and Evolutionary Computation Conference Companion, edited by Hernan Aguirre, 3–4. New York, NY: ACM.
  • Chu, J., H. Wang, H. Meng, P. Jin, and T. Li. 2017. “Restricted Boltzmann Machines with Gaussian Visible Units Guided by Pairwise Constraints.” CoRR abs/1701: 03647.
  • Cordoba, G. A., L. T. Cuesta, and M. Tauš. 2014. “Using Artificial Neural Network Models to Assess Water Quality in Water Distribution Networks.” Procedia Engineering 70: 399–408. doi:10.1016/j.proeng.2014.02.045.
  • Das, S., S. Sarkar, A. Ray, A. Srivastava, and D. L. Simon. 2013. “Anomaly Detection in Flight Recoder Data: A Dynamic Data-Driven Approach.” In 2013 American Control Conference Washington, DC, USA,  June 17-19. doi:10.1109/ACC.2013.6580237.
  • Difallah, D. E., P. Cudré-Mauroux, and S. A. McKenna. 2013. “Scalable Anomaly Detection for Smart City Infrastructure Networks.” IEEE Internet Computing 17 (6): 39–47. doi:10.1109/MIC.2013.84.
  • Ding, S., X. Xu, and R. Nie. 2014. “Extreme Learning Machine and Its Applications.” Neural Computing and Applications 25 (3): 549–556. doi:10.1007/s00521-013-1522-8.
  • Dogo, E. M., A. F. Salami, N. I. Nwulu, and C. O. Aigbavboa. 2019. “Blockchain and Internet of Things-Based Technologies for Intelligent Water Management System.” In Artificial Intelligence in IoT. Transactions on Computational Science and Computational Intelligence, edited by F. Al-Turjman, 129–150. Cham, Switzerland: Springer.
  • Ecoli sense, Technology Review Accessed 20 March 2019. http://www.ecoli-sense.com/
  • Erfani, S. M., S. Rajasegarar, S. Karunasekera, and C. Leckie. 2016. “High-Dimensional and Large-Scale Anomaly Detection Using a Linear One-Class SVM with Deep Learning.” Pattern Recognition 58: 121–134. doi:10.1016/j.patcog.2016.03.028.
  • Fehst, V. H., T.-D. La, B. Nghiem, B. E. Mayer, P. Englert, and K.-H. Fiebig. 2018. “Automatic Vs. Manual Feature Engineering for Anomaly Detection of Drinking-Water Quality.” In Proceedings of the Genetic and Evolutionary Computation Conference Companion 2018, Kyoto, Japan, Jul15-19, ACM, New York, NY, USA.
  • Ferri, C., J. Hernández-Orallo, and R. Modroiu. 2009. “An Experimental Comparison of Performance Measures for Classification.” Pattern Recognition Letters 30 (1): 27–38. doi:10.1016/j.patrec.2008.08.010.
  • Friston, K. 2009. “The Free-Energy Principle: A Rough Guide to the Brain?” Trends in Cognitive Sciences 13 (7): 293–301. doi:10.1016/j.tics.2009.04.005.
  • Gamboa, J. C. B. 2017. “Deep Learning for Time-Series Analysis.” arXiv Preprint arXiv 1701: 01887. http://arxiv.org/abs/1701.01887
  • Garcia-Font, V., C. Garrigues, and H. Rif-Pous. 2016. “A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks.” Sensors 16 (6): 868. doi:10.3390/s16122100.
  • Geetha, S., and S. Gouthami. 2017. “Internet of Things Enabled Real Time Water Quality Monitoring System.” Smart Water 2 (1): 1–19. doi:10.1186/s40713-017-0005-y.
  • Goodfellow, I., Y. Bengio, and A. Courville. 2016. “Deep Learning.” The MIT Press.
  • Görnitz, N., M. Braun, and M. Kloft. 2015. “Hidden Markov Anomaly Detection.” In Proceeding of the 32nd International Conference Machine Learning, Volume 37, 1833–1842, July 06-11, Lille, France.
  • Graves, A. 2013. “Generating Sequences with Recurrent Neural Networks.” arXiv Preprint arXiv 1308: 0850. http://arxiv.org/abs/1308.0850
  • Greff, K., R. K. Srivastava, J. Koutnik, B. R. Steunebrink, and J. Schmidhuber. 2017. “LSTM: A Search Space Odyssey.” IEEE Transactions on Neural Networks and Learning Systems 28 (10): 2222–2232. doi:10.1109/TNNLS.2016.2582924.
  • Hinton, G. E., S. Osindero, and Y.-W. Teh. 2006. “A Fast Learning Algorithm for Deep Belief Nets.” Neural Computation 18 (7): 1527–1554. doi:10.1162/neco.2006.18.7.1527.
  • Hodge, V., and J. Austin. 2004. “A Survey of Outlier Detection Methodologies.” Artificial Intelligence Review 22 (2): 85–126. doi:AIRE.0000045502.10941.a9.
  • Huang, G., G.-B. Huang, S. Song, and K. You. 2015. “Trends in Extreme Learning Machines: A Review.” Neural Networks: the Official Journal of the International Neural Network Society 61: 32–48. doi:10.1016/j.neunet.2014.10.001.
  • Huang, G.-B., L. Chen, and C.-K. Siew. 2006. “Universal Approximation Using Incremental Constructive Feedforward Networks with Hidden Nodes.” IEEE Transactions on Neural Networks 17 (4): 879–892. doi:10.1109/TNN.2006.875977.
  • Huang, G.-B., Q.-Y. Zhu, and C.-K. Siew. 2006a. “Extreme Learning Machine: Theory and Applications.” Neurocomputing 70 (1): 489–501. doi:10.1016/j.neucom.2005.12.126.
  • IBM. “IBM Analytics.”, Accessed 27 June 2017. https://www.ibm.com/analytics/us/en/technology/hadoop/big-data-analytics/
  • Inoue, J., Y. Yamagata, Y. Chen, C. M. Poskitt, and J. Sun. 2017. “Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning.” https://arxiv.org/pdf/1709.05342.pdf.
  • Izquierdo, J., P. A. López, F. J. Martínez, and R. Pérez. 2007. “Fault Detection in Water Supply Systems Using Hybrid (theory and Data-Driven) Modelling.” Mathematical and Computer Modelling 46 (3): 341–350. doi:10.1016/j.mcm.2006.11.013.
  • Janakiraman, V. M., and D. Nielsen. 2016. “Anomaly Detection in Aviation Data Using Extreme Learning Machines.” In 2016 International Joint Conference on Neural Networks (IJCNN), Vancouver, BC, Canada July 24-29. doi: 10.1109/IJCNN.2016.7727444.
  • Kozik, R., M. Choraś, W. Hołubowicz, and R. Renk. 2017. “Extreme Learning Machines for Web Layer Anomaly Detection.” In Image Processing and Communications Challenges, edited by R. Choraś, 226–233. Vol. 525. Springer, Cham, Switzerland.
  • LeCun, Y., Y. Bengio, and G. Hinton. 2015. “Deep Learning.” Nature 521 (7553): 436. doi:10.1038/nature14539.
  • LeCun, Y., L. Bottou, Y. Bengio, and P. Haffner. 1998. “Gradient-Based Learning Applied to Document Recognition.” Proceedings of the IEEE 86 (11, Nov 11): 2278–2324. doi:10.1109/5.726791.
  • Martinelli, M., E. Tronci, G. Dipoppa, and C. Balducelli. 2004. “Electrical Power System Anomaly Detection Using Neural Networks.” In International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, 1242–1248, Wellington, New Zealand, September 20-25.
  • Muharemi, F., D. Logofătu, C. Andersson, and F. Leon. 2018. “Approaches to Building A Detection Model for Water Quality: A Case Study”. In Modern Approaches for Intelligent Information and Database Systems, edited by A. Sieminski, A. Kozierkiewicz, M. Nunez, and Q. Ha, 173–183, Vol. 769. Springer, Cham, Switzerland.
  • Muharemi, F., D. Logofătu, and F. Leon. 2019. “Machine Learning Approaches for Anomaly Detection of Water Quality on a Real-World Data Set.” Journal of Information and Telecommunication 1–14. doi:10.1080/24751839.2019.1565653.
  • Murray, R., T. Haxton, R. Janke, W. E. Hart, J. Berry, and C. Philips. 2010. Sensor Network Design for Drinking Water Contamination Warning Systems. U.S. Environmental Protection Agenc, Washingto, DC, EPA/600/R-09/141
  • Murray, S., M. Ghazali, and E. A. McBean. 2012. “Real-Time Water Quality Monitoring: Assessment of Multisensor Data Using Bayesian Belief Networks.” Journal of Water Resources Planning and Management 138 (1): 63–70. doi:10.1061/(ASCE)WR.1943-5452.0000163.
  • Ng, A. 2011. Sparse Autoencoder. Accessed 25 March 2018. https://web.stanford.edu/class/cs294a/sparseAutoencoder.pdf.
  • NHMRC, N. R. M. M. C. 2011. Australian Drinking Water Guidelines Paper 6 National Water Quality Management Strategy. Canberra: Commonwealth of Australia: National Health and Medical Research Council, National Resource Management Ministerial Council.
  • Patcha, A., and J.-M. Park. 2007. “An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends.” Computer Networks 51 (12): 3448–3470. doi:10.1016/j.comnet.2007.02.001.
  • Perelman, L., J. Arad, M. Housh, and A. Ostfeld. 2012. “Event Detection in Water Distribution Systems from Multivariate Water Quality Time Series.” Environmental Science & Technology 46 (15): 8212. doi:10.1021/es3014024.
  • Pimentel, M. A. F., D. A. Clifton, L. Clifton, and L. Tarassenko. 2014. “A Review of Novelty Detection.” Signal Processing 99: 215–249. doi:10.1016/j.sigpro.2013.12.026.
  • Raciti, M., J. Cucurull, and S. Nadjm-Tehrani. 2012. “Anomaly Detection in Water Management Systems.” In Critical Infrastructure Protection, edited by J. Lopez, R. Setola, S. D. Wolthusen, 98–119. Vol. 7130. Berlin, Heidelberg: Springer Berlin Heidelberg.
  • Rosenblatt, F. 1957. The Perceptron A Perceiving and Recognizing Automation. Buffalo, New York: Cornell Aeronautical Laboratory .
  • Rumelhart, D. E., G. E. Hinton, and R. J. Williams. 1986. “learning Internal Representations by Error Propagation.” Chap. 8 in Parallel Distributed Processing: Explorations in the Microstructure of Cognition, edited by D. E. Rumelhart, E. David, McClelland, L. James and PDP Research Group, 318–362. Vol. 1. Cambridge MA USA: MIT Press.
  • Salakhutdinov, R., and G. Hinton. 2009. “Deep Boltzmann Machines.” In 12th International Conference on Artificial Intelligence and Statistics (AISTATS) 2009, April 15, Volume 5 of JMLR: W&CP5. Clearwater Beach, Florida, USA.
  • Sensus. 2012. Smart Water Network. Accessed 12 March 2018. https://sensus.com/internet-of-things/smart-water/
  • Shalyga, D., P. Filonov, and A. Lavrentyev. 2018. “Anomaly Detection for Water Treatment System Based on Neural Network with Automatic Architecture Optimization.”. https://arxiv.org/abs/1807.07282
  • South African, D. W. A. 2017. Water Quality Management in South Africa. Accessed 12 March 2018. http://www.dwa.gov.za/default.aspx
  • SPOTSeven Lab. “GECCO Challenge 2017 - Monitoring of Drinking-Water Quality.” Accessed 26 February 2019. http://www.spotseven.de/gecco/gecco-challenge/gecco-challenge-2017/
  • Srivastava, R. K., K. Greff, and J. Schmidhuber. 2015. https://arxiv.org/abs/1507.06228
  • Sun, S., W. Chen, L. Wang, X. Liu, and T.-Y. Liu. 2015. “On the Depth of Deep Neural Networks: A Theoretical View”. http://arxiv.org/abs/1506.05232
  • Taormina, R., and S. Galelli. 2018. “Deep-Learning Approach to the Detection and Localization of Cyber-Physical Attacks on Water Distribution Systems.” Journal of Water Resources Planning and Management 144 (10): 4018065. doi:10.1061/(ASCE)WR.1943-5452.0000983.
  • Taormina, R., S. Galelli, N. O. Tippenhauer, E. Salomons, A. Ostfeld, D. G. Eliades, M. Aghashahi, et al. 2018. “Battle of the Attack Detection Algorithms: Disclosing Cyber Attacks on Water Distribution Networks.” Journal of Water Resources Planning and Management 144 (8): 4018048. doi:10.1061/(ASCE)WR.1943-5452.0000969.
  • Tian, Z. X., J. P. Jiang, L. Guo, and P. Wang. 2012. “Anomaly Detection of Municipal Wastewater Treatment Plant Operation Using Support Vector Machine.” IET. doi:10.1049/cp.2012.1030.
  • Tissera, M. D., and M. D. McDonnell 2015. “Deep Extreme Learning Machines for Classification.” In Proceedings in Adaptation, Learning and Optimization, edited by J. Cao, K. Mao, E. Cambria, Z. Man, K-A. Toh, Vol. 3. Cham, Switzerland: Springer.
  • UN. 2015. Sustainable Development Goals: 17 Goals to Transform our World. Accessed 21 February 2018. https://www.un.org/sustainabledevelopment/home/
  • Vincent, P., H. Larochelle, I. Lajoie, Y. Bengio, and P.-A. Manzagol. 2010. “Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion.” Journal of Machine Learning Research 11: 3371–3408.
  • Wang, Y., D. Li, Y. Du, and Z. Pan. 2015. “Anomaly Detection in Traffic Using L1-Norm Minimization Extreme Learning Machine.” Neurocomputing 149: 415–425. doi:10.1016/j.neucom.2014.04.073.
  • Waterwise Rand water. 2017. Waterborne Diseases Factsheet. Accessed 12 February 2018. http://www.waterwise.co.za/site/water/diseases/waterborne.html
  • Wu, C., and Y. Guo. 2015. “Adaptive Anomalies Detection with Deep Network”. In Proceeding of the Seventh International Conference on Advanced Cognitive Technologies and Applications (CONGNITIVE 2015), Nice, France, March 22-27.
  • Wu, Y., and S. Liu. 2017. “A Review of Data-Driven Approaches for Burst Detection in Water Distribution Systems.” Urban Water Journal 14 (9): 972–983. doi:10.1080/1573062X.2017.1279191.
  • Wu, Z. Y., M. El-Maghraby, and S. Pathak. 2015. “Applications of Deep Learning for Smart Water Networks.” Procedia Engineering 119: 479–485. doi:10.1016/j.proeng.2015.08.870.
  • Yang, Z., Y. Liu, D. Hou, T. Feng, Y. Wei, J. Zhang, P. Huang, and G. Zhang. 2014.“Water Quality Event Detection Based on Multivariate Empirical Mode Decomposition.” In 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2014, San Diego, CA, USA, October 5-8, 2663–2668. doi: 10.1109/SMC.2014.6974329
  • Yolacan, E. N., and D. R. Kaeli. 2016. “A Framework for Studying New Approaches to Anomaly Detection.” International Journal of Information Security Science 5 (2): 39–50.
  • Yuan, Y., and K. Jia. 2015. “A Water Quality Assessment Method Based on Sparse Autoencoder.” In 2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Ningbo, China, September 19-22, 1–4. doi: 10.1109/ICSPCC.2015.7338853
  • Zhai, S., Y. Cheng, W. Lu, and Z. Zhang. 2016. “Deep Structured Energy Based Model for Anomaly Detection.” arXiv Preprint arXiv 1605: 07717.
  • Zhang, D., T. Sullivan, C. C. B. Burghina, K. Murphy, K. McGuinness, N. E. O’Connor, A. F. Smeaton, and F. Regan. 2014. “Detection and Classification of Anomalous Events in Water Quality Datasets within a Smart City-Smart Bay Project.” International Journal on Advances in Intelligent Systems 7 (1&2): 167–178.
  • Zhang, J., X. Zhu, Y. Yue, and P. W. H. Wong. 2017. “A Real-Time Anomaly Detection Algorithm/Or Water Quality Data Using Dual Time-Moving Windows.” In 2017 Seventh International Conference on Innovative Computing Technology (INTECH), Luton, UK, August 16-18, 36–41. doi: 10.1109/INTECH.2017.8102421
  • Zhang, Y., W. Li, P. Zhou, J. Yang, and X. Shi. 2016. “Big Sensor Data: A Survey.” In Internet and Distributed Computing Systems, edited by W. Li, S. Ali, G. Lodewijks, G. Fortino, G.D. Fatta, Z. Yin, M. Pathan, A. Guerrieri and Q. Wang, 155–166. Vol. 9864. Cham, Switzerland: Springer.
  • Zhao, H., D. Hou, P. Huang, and G. Zhang. 2014. “Water Quality Event Detection in Drinking Water Network.” Water, Air, & Soil Pollution 225 (11): 1–15. doi:10.1007/s11270-014-2183-7.
  • Zohrevand, Z., U. Glasser, H. Y. Shahir, M. A. Tayebi, and R. Costanzo. 2016.“Hidden Markov Based Anomaly Detection for Water Supply Systems”. In 2016 IEEE International Conference on Big Data (Big Data), Wadhington, DC, December 5-8, 1551–1560. doi:10.1109/BigData.2016.7840763.
  • Zulkifli, S. N., H. A. Rahim, and W.-J. Lau. 2017. “Detection of Contaminants in Water Supply: A Review on State-Of-the-Art Monitoring Technologies and Their Applications.” Sensors and Actuators B 255: 2657–2689. doi:10.1016/j.snb.2017.09.078.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.