592
Views
1
CrossRef citations to date
0
Altmetric
Data Science, Quality & Reliability

A scalable Bayesian framework for large-scale sensor-driven network anomaly detection

&
Pages 445-462 | Received 17 Jun 2021, Accepted 16 Jan 2022, Published online: 06 Apr 2022

References

  • Akoglu, L. , Tong, H. and Koutra, D. (2015) Graph based anomaly detection and description: A survey. Data Mining and Knowledge Discovery, 29 (3), 626–688.
  • Alghuried, A. and Moghaddass, R. (2020) Anomaly detection in large-scale networks: A state-space decision process. Journal of Quality Technology , 54 , 1–28.
  • Antonelli, D. , Bruno, G. and Chiusano, S. (2013) Anomaly detection in medical treatment to discover unusual patient management. IIE Transactions on Healthcare Systems Engineering, 3 (2), 69–77.
  • Asadzadeh, P. , Kulik L. , Tanin E. and Wirth, A. (2011) On optimal arrangements of binary sensors. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 6899 , 168–187.
  • Bhuyan, M.H. , Bhattacharyya, D.K . and Kalita, J.K. (2013) Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys & Tutorials, 16 (1), 303–336.
  • Chandola, V. , Banerjee, A. and Kumar, V. (2009) Anomaly detection: A survey. ACM Computing Surveys (CSUR ), 41 (3), 1–58.
  • Chen, J. , Cao, K. , Li, K. and Sun, Y. (2011) Distributed sensor activation algorithm for target tracking with binary sensor networks. Cluster Computing , 14 (1), 55–64.
  • Cooper, G.E. (1990) The computational complexity of probabilistic inference using Bayesian belief networks. Artificial Intelligence, 42 (2-3), 393–405.
  • Djuric, P.M. , Vemula, M. and Bugallo, M.F. (2008) Target tracking by particle filtering in binary sensor networks. IEEE Transactions on Signal Processing, 56 (6), 2229–2238.
  • Gonzalez, J. , Low, Y. , Gretton, A. and Guestrin, C. (2011) Parallel Gibbs sampling: From colored fields to thin junction trees, in Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics , 11-13 April, Fort Lauderdale, FL, USA (vol. 15, pp. 324–332).
  • Guerriero, M. , Willett, P. and Glaz, J. (2009) Distributed target detection in sensor networks using scan statistics. IEEE Transactions on Signal Processing , 57 (7), 2629–2639.
  • Hooi, B. , Eswaran, D. , Song, H.A. , Pandey, A. , Jereminov, M. , Pileggi, L. and Faloutsos, C. (2019) GridWatch: Sensor placement and anomaly detection in the electrical grid. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 11051, 71–86.
  • Janakiram, D., Kumar, A. V. U. P., & Reddy V. A. M. (2006). Outlier detection in wireless sensor networks using bayesian belief networks. In 2006 1st International conference on communication systems software & middleware, New Delhi, India (pp. 1-6), doi: 10.1109/COMSWA.2006.1665221.
  • Kim, T.-Y. and Cho, S.-B. (2018) Web traffic anomaly detection using c-lstm neural networks. Expert Systems with Applications, 106 , 66–76.
  • Krishnan, V.K. , Bugbee, B. , Elgindy, T. , Palmintier, B.S. , Mateo, C. , Postigo, F. , Gomez San Roman, T. , Duenas, P. and Lacroix, J.-S. (2020) Realistic synthetic distribution grids: Summary of validation results. NREL PR-5D00-75723.
  • Kwisthout, J. (2011) Most probable explanations in Bayesian networks: Complexity and tractability. International Journal of Approximate Reasoning, 52 (9), 1452–1469.
  • Lacave, C. and Díez, F.J. (2002) A review of explanation methods for Bayesian networks. The Knowledge Engineering Review, 17 (2), 107–127.
  • Li, Z. and D’Ambrosio, B. (1993) An efficient approach for finding the MPE in belief networks, in Uncertainty in Artificial Intelligence , Elsevier, pp. 342–349.
  • Marinescu, R. and Dechter, R. (2012) Best-first and/or search for most probable explanations. arXiv preprint arXiv:1206.5268.
  • Mengshoel, O.J. , Wilkins, D.C. and Roth, D. (2010) Initialization and restart in stochastic local search: Computing a most probable explanation in Bayesian networks. IEEE Transactions on Knowledge and Data Engineering, 23 (2), 235–247.
  • Murugan, K. and Suresh, P. (2017, 02) Ensemble of ADA booster with SVM classifier for anomaly intrusion detection in wireless ad hoc network. Indian Journal of Science and Technology, 10 , 1–10.
  • Neapolitan, R.E., 2004. Learning bayesian networks (Vol. 38). Upper Saddle River: Pearson Prentice Hall
  • Noble, C.C. and Cook, D.J. (2003) Graph-based anomaly detection, in Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Association for Computing Machinery, New York, NY, USA, pp. 631–636.
  • Ostfeld, A. et al. (2008) The battle of the water sensor networks (bwsn): A design challenge for engineers and algorithms. Journal of Water Resources Planning and Management, 134 (6), 556–568.
  • Pearl, J. (1988) Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan kaufmann.
  • Popat, R.R. and Chaudhary, J. (2018) A survey on credit card fraud detection using machine learning, in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) , IEEE, Tirunelveli, India, pp. 1120–1125.
  • Ranshous, S. , Shen, S. , Koutra, D. , Harenberg, S. , Faloutsos, C. and Samatova, N.F. (2015) Anomaly detection in dynamic networks: A survey. Wiley Interdisciplinary Reviews: Computational Statistics, 7 (3), 223–247.
  • Speakman, S. , McFowland, I. and Neill, D. (2015) Scalable detection of anomalous patterns with connectivity constraints. Journal of Computational and Graphical Statistics, 24 (4), 1014–1033.
  • Stojanovic, L. , Dinic, M. , Stojanovic, N. and Stojadinovic, A. (2016) Big-data-driven anomaly detection in industry (4.0): An approach and a case study, in 2016 IEEE International Conference on Big Data (Big Data), IEEE Press, Piscataway, NJ, pp. 1647–1652.
  • Sy, B.K. (1992) Reasoning MPE to multiply connected belief networks using message passing, in AAAI , Taylor & Francis, pp. 570–576.
  • Tuptuk, N. , Hazell, P. , Watson, J. and Hailes, S. (2021) A systematic review of the state of cyber-security in water systems. Water (Switzerland), 13 (1).
  • Wang, T.-C. , Phoa, F. and Lin, Y.-L. (2017) Network exploration by complements of graphs with graph coloring. Journal of Advanced Statistics , 2(2), 78–95.
  • Wang, Z. , Bulut, E. and Szymanski, B.K. (2010) Distributed energy-efficient target tracking with binary sensor networks. ACM Transactions on Sensor Networks (TOSN ), 6 (4), 1–32.
  • Yu, R. , Qiu, H. , Wen, Z. , Lin, C. and Liu, Y. (2016) A survey on social media anomaly detection. arXiv:1601.01102 18 (1), 1–14.
  • Yuan, C. and Lu, T.-C. (2007) Finding explanations in Bayesian networks, in The 18th International Workshop on Principles of Diagnosis , DX-07, Nashville, TN, USA, pp. 414–419.
  • Yuan, Y. , Dehghanpour, K. , Bu, F. and Wang, Z. (2020) Outage detection in partially observable distribution systems using smart meters and generative adversarial networks. IEEE Transactions on Smart Grid, 11 (6), 5418–5430.
  • Zhang, Y. , Chen, B. and Yu, L. (2020) Distributed fusion Kalman filtering under binary sensors. International Journal of Robust and Nonlinear Control, 30 (6), 2570–2578.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.