Cong Gao, Yuzhe Chen, Yanping Chen, Zhongmin Wang, Hong Xia
{"title":"An improved k-NN anomaly detection framework based on locality sensitive hashing for edge computing environment","authors":"Cong Gao, Yuzhe Chen, Yanping Chen, Zhongmin Wang, Hong Xia","doi":"10.3233/ida-216461","DOIUrl":null,"url":null,"abstract":"Large deployment of wireless sensor networks in various fields bring great benefits. With the increasing volume of sensor data, traditional data collection and processing schemes gradually become unable to meet the requirements in actual scenarios. As data quality is vital to data mining and value extraction, this paper presents a distributed anomaly detection framework which combines cloud computing and edge computing. The framework consists of three major components: k-nearest neighbors, locality sensitive hashing, and cosine similarity. The traditional k-nearest neighbors algorithm is improved by locality sensitive hashing in terms of computation cost and processing time. An initial anomaly detection result is given by the combination of k-nearest neighbors and locality sensitive hashing. To further improve the accuracy of anomaly detection, a second test for anomaly is provided based on cosine similarity. Extensive experiments are conducted to evaluate the performance of our proposal. Six popular methods are used for comparison. Experimental results show that our model has advantages in the aspects of accuracy, delay, and energy consumption.","PeriodicalId":50355,"journal":{"name":"Intelligent Data Analysis","volume":"29 1","pages":"0"},"PeriodicalIF":0.9000,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Intelligent Data Analysis","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/ida-216461","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Large deployment of wireless sensor networks in various fields bring great benefits. With the increasing volume of sensor data, traditional data collection and processing schemes gradually become unable to meet the requirements in actual scenarios. As data quality is vital to data mining and value extraction, this paper presents a distributed anomaly detection framework which combines cloud computing and edge computing. The framework consists of three major components: k-nearest neighbors, locality sensitive hashing, and cosine similarity. The traditional k-nearest neighbors algorithm is improved by locality sensitive hashing in terms of computation cost and processing time. An initial anomaly detection result is given by the combination of k-nearest neighbors and locality sensitive hashing. To further improve the accuracy of anomaly detection, a second test for anomaly is provided based on cosine similarity. Extensive experiments are conducted to evaluate the performance of our proposal. Six popular methods are used for comparison. Experimental results show that our model has advantages in the aspects of accuracy, delay, and energy consumption.
期刊介绍:
Intelligent Data Analysis provides a forum for the examination of issues related to the research and applications of Artificial Intelligence techniques in data analysis across a variety of disciplines. These techniques include (but are not limited to): all areas of data visualization, data pre-processing (fusion, editing, transformation, filtering, sampling), data engineering, database mining techniques, tools and applications, use of domain knowledge in data analysis, big data applications, evolutionary algorithms, machine learning, neural nets, fuzzy logic, statistical pattern recognition, knowledge filtering, and post-processing. In particular, papers are preferred that discuss development of new AI related data analysis architectures, methodologies, and techniques and their applications to various domains.