skip to main content
research-article

An Energy-efficient And Trustworthy Unsupervised Anomaly Detection Framework (EATU) for IIoT

Authors Info & Claims
Published:29 November 2022Publication History
Skip Abstract Section

Abstract

Many anomaly detection techniques have been adopted by Industrial Internet of Things (IIoT) for improving self-diagnosing efficiency and infrastructures security. However, they are usually associated with the issues of computational-hungry and “black box.” Thus, it becomes important to ensure that the detection is not only accurate but also energy-efficient and trustworthy. In this article, we propose an Energy-efficient And Trustworthy Unsupervised anomaly detection framework (EATU) for IIoT. The framework consists of two levels of feature extraction: (1) Autoencoder-based feature extraction and (2) Efficient DeepExplainer-based explainable feature selection. We propose an Efficient DeepExplainer model based on perturbation-focused sampling, which demonstrates the most computational efficiency among state-of-the-art explainable models. With the important features selected by Efficient DeepExplainer, the rationale of why an anomaly detection decision was made is given, enhancing the trustworthiness of the detection as well as improving the accuracy of anomaly detection. Three real-world IIoT datasets with high-dimensional features are used to validate the effectiveness of the proposed framework. Extensive experimental results demonstrate that in comparison with the state-of-the-art, our framework has the attributes of improved accuracy, trustworthiness (in terms of correctness and stability of the explanation), and energy-efficiency (in terms of wall-clock-time and resource usage).

REFERENCES

  1. [1] Alvarez-Melis David and Jaakkola Tommi S.. 2018. On the robustness of interpretability methods. arXiv preprint arXiv:1806.08049 (2018).Google ScholarGoogle Scholar
  2. [2] Alvarez-Melis David and Jaakkola Tommi S.. 2018. Towards robust interpretability with self-explaining neural networks. In Proceedings of the 32nd International Conference on Neural Information Processing Systems (NIPS’18). Curran Associates Inc., Red Hook, NY, 77867795.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Antwarg Liat, Shapira Bracha, and Rokach Lior. 2019. Explaining anomalies detected by autoencoders using SHAP. arXiv preprint arXiv:1903.02407 (2019).Google ScholarGoogle Scholar
  4. [4] ask9. 2020. Detecting Anomalies in Wafer Manufacturing. Retrieved from https://www.kaggle.com/arbazkhan971/ anomaly-detection.Google ScholarGoogle Scholar
  5. [5] Boyes Hugh, Hallaq Bil, Cunningham Joe, and Watson Tim. 2018. The industrial internet of things (IIoT): An analysis framework. Comput. Industr. 101 (2018), 112. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Kingma Diederik P. and Welling Max. 2013. Auto-encoding variational Bayes. arXiv preprint arXiv:1312.6114 (2013).Google ScholarGoogle Scholar
  7. [7] Kuncheva Ludmila I. and Faithfull William J.. 2014. PCA feature extraction for change detection in multidimensional unlabeled data. IEEE Trans. Neural Netw. Learn. Syst. 25, 1 (2014), 6980. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Liang Wei, Hu Yiyong, Zhou Xiaokang, Pan Yi, and Wang Kevin I.-K.. 2021. Variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT. IEEE Trans. Industr. Inform. (2021), 11. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Light Roger A.. 2017. Mosquitto: Server and client implementation of the MQTT protocol. J. Open Source Softw. 2, 13 (2017), 265.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Lundberg Scott M. and Lee Su-In. 2017. A unified approach to interpreting model predictions. Adv. Neural inf. Process. Syst. 30 (2017).Google ScholarGoogle Scholar
  11. [11] Lydia E. Laxmi, Jovith A. Arokiaraj, Devaraj A. Francis Saviour, Seo Changho, and Joshi Gyanendra Prasad. 2021. Green energy efficient routing with deep learning based anomaly detection for internet of things (IoT) communications. Mathematics 9, 5 (2021), 500.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] McCann Michael and Johnston Adrian. 2008. SECOM Data Set. Retrieved from http://archive.ics.uci.edu/ml/datasets/ secom.Google ScholarGoogle Scholar
  13. [13] Narkhede Sarang. 2018. Understanding AUC-ROC curve. Towards Data Sci. 26 (2018), 220227.Google ScholarGoogle Scholar
  14. [14] Nguyen Quoc Phong, Lim Kar Wai, Divakaran Dinil Mon, Low Kian Hsiang, and Chan. Mun Choon2019. GEE: A gradient-based explainable variational autoencoder for network anomaly detection. In Proceedings of the IEEE Conference on Communications and Network Security (CNS). 9199. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Qiu Meikang, Sha Edwin H.-M., Liu Meilin, Lin Man, Hua Shaoxiong, and Yang Laurence T.. 2008. Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP. J. Parallel Distrib. Comput. 68, 4 (2008), 443455. DOI:DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Ribeiro Marco Tulio, Singh Sameer, and Guestrin Carlos. 2016. “Why should I trust you?” Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 11351144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Ribeiro Marco Tulio, Singh Sameer, and Guestrin Carlos. 2018. Anchors: High-precision model-agnostic explanations. In Proceedings of the AAAI Conference on Artificial Intelligence.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Rosenberg Eli and Salam Maya. Hacking Attack Woke up Dallas with Emergency Sirens, Officials Say. Retrieved from https://www.nytimes.com/2017/04/08/us/dallas-emergency-sirens-hacking.html.Google ScholarGoogle Scholar
  19. [19] Sarkar Manish and Leong Tze-Yun. 2001. Fuzzy K-means clustering with missing values. In Proceedings of the AMIA Symposium. American Medical Informatics Association, 588.Google ScholarGoogle Scholar
  20. [20] Sater Raed Abdel and Hamza A. Ben. 2021. A federated learning approach to anomaly detection in smart buildings. ACM Trans. Internet Things 2, 4 (2021), 123.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Schockaert Cedric, Macher Vadim, and Schmitz Alexander. 2020. VAE-LIME: deep generative model based approach for local data-driven model interpretability applied to the ironmaking industry. arXiv preprint arXiv:2007.10256 (2020).Google ScholarGoogle Scholar
  22. [22] Sdgs.un.org.2020. THE 17 GOALS | Sustainable Development. Retrieved from https://sdgs.un.org/goals.Google ScholarGoogle Scholar
  23. [23] Sedgwick Philip. 2012. Pearson’s correlation coefficient. Bmj 345 (2012).Google ScholarGoogle Scholar
  24. [24] Shao Zili, Xue C., Zhuge Q., Qiu M., Xiao Bin, and Sha E. H.-M.. 2006. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software. IEEE Trans. Comput. 55, 4 (2006), 443453. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Shrikumar Avanti, Greenside Peyton, Shcherbina Anna, and Kundaje Anshul. 2016. Not just a black box: Learning important features through propagating activation differences. arXiv preprint arXiv:1605.01713 (2016).Google ScholarGoogle Scholar
  26. [26] Slack Dylan, Hilgard Anna, Singh Sameer, and Lakkaraju Himabindu. 2021. Reliable post hoc explanations: Modeling uncertainty in explainability. Adv. Neural Inf. Process. Syst. 34 (2021).Google ScholarGoogle Scholar
  27. [27] Tony Lindgren and Jonas Biteus. 2017. APS Failure at Scania Trucks Data Set. Retrieved from https://archive.ics.uci. edu/ml/datasets/APS+Failure+at+Scania+Trucks##.Google ScholarGoogle Scholar
  28. [28] Wang Bizhu, Sun Yan, and Xu Xiaodong. 2021. A scalable and energy-efficient anomaly detection scheme in wireless SDN-based mMTC networks for IoT. IEEE Internet Things J. 8, 3 (2021), 13881405. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Wang Xiaokang, Yang Laurence T., Chen Xingyu, Han Jian-Jun, and Feng Jun. 2019. A tensor computation and optimization model for cyber-physical-social big data. IEEE Trans. Sustain. Comput. 4, 4 (2019), 326339. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Wang Xiaokang, Yang Laurence T., Ren Lei, Wang Yihao, and Deen M. Jamal. 2022. A tensor-based computing and optimization model for intelligent edge services. IEEE Netw. 36, 1 (2022), 4044. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Wu Yulei, Dai Hong-Ning, and Tang Haina. 2021. Graph neural networks for anomaly detection in industrial internet of things. IEEE Internet Things J. (2021), 11. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Wu Yulei, Dai Hong-Ning, Wang Haozhe, Xiong Zehui, and Guo Song. 2022. A survey of intelligent network slicing management for industrial IoT: Integrated approaches for smart transportation, smart energy, and smart factory. IEEE Commun. Surv. Tutor. 24, 2 (2022), 11751211. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Yu Xingjie and Guo Huaqun. 2019. A survey on IIoT security. In Proceedings of the IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS). 15. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Zhang Dell, Wang Jun, and Zhao Xiaoxue. 2015. Estimating the uncertainty of average F1 scores. In Proceedings of the International Conference on The Theory of Information Retrieval. 317320.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Zhou Luying and Guo Huaqun. 2018. Anomaly detection methods for IIoT networks. In Proceedings of the IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). 214219. DOI:DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Zhou Xiaokang, Liang Wei, Li Weimin, Yan Ke, Shimizu Shohei, and Wang Kevin I.-K.. 2021. Hierarchical adversarial attacks against graph neural network based IoT network intrusion detection system. IEEE Internet Things J. (2021), 11. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Zhou Xiaokang, Xu Xuesong, Liang Wei, Zeng Zhi, and Yan Zheng. 2021. Deep-learning-enhanced multitarget detection for end–edge–cloud surveillance in smart IoT. IEEE Internet Things J. 8, 16 (2021), 1258812596. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Zhou Xiaokang, Yang Xiang, Ma Jianhua, and Wang Kevin I.-K.. 2021. Energy efficient smart routing based on link correlation mining for wireless edge computing in IoT. IEEE Internet Things J. (2021), 11. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Zuo Yuan, Wu Yulei, Min Geyong, Huang Chengqiang, and Pei Ke. 2020. An intelligent anomaly detection scheme for micro-services architectures with temporal and spatial data analysis. IEEE Trans. Cog. Commun. Netw. 6, 2 (2020), 548561. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. An Energy-efficient And Trustworthy Unsupervised Anomaly Detection Framework (EATU) for IIoT

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Sensor Networks
        ACM Transactions on Sensor Networks  Volume 18, Issue 4
        November 2022
        619 pages
        ISSN:1550-4859
        EISSN:1550-4867
        DOI:10.1145/3561986
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 November 2022
        • Online AM: 11 June 2022
        • Accepted: 24 May 2022
        • Revised: 12 April 2022
        • Received: 1 December 2021
        Published in tosn Volume 18, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format