Log in

Real-time anomaly detection system within the scope of smart factories

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Anomaly detection is the process of identifying patterns that move differently from normal in a certain order. This process is considered one of the necessary measures for the safety of intelligent production systems. This study proposes a real-time anomaly detection system capable of using and analyzing data in smart production systems consisting of interconnected devices. Synthetic data were preferred in the study because it has difficulties such as high cost and a long time to obtain real anomaly data naturally for learning and testing processes. In order to obtain the necessary synthetic data, a simulation was developed by taking the popcorn production systems as an example. Multi-class anomalies were defined in the obtained data set, and the analysis performances were tested by creating learning models with AutoML libraries. In the field of production systems, while studies on anomaly detection generally focus on whether there is an anomaly in the system, it is aimed to determine which type of anomaly occurs in which device, together with the detection of anomaly by using multi-class tags in the data of this study. As a result of the tests, the Auto-Sklearn library presented the learning models with the highest performance on all data sets. As a result of the study, a real-time anomaly detection system was developed on dynamic data by using the obtained learning models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Data availability

The data used in anomaly detection, generated for analysis during the current study, are available from the corresponding author on reasonable request.

References

  1. Nguyen VQ, van Ma L, Kim J (2018) LSTM-based anomaly detection on big data for smart factory monitoring. J Digit Contents Soc 19(4):789–799. https://doi.org/10.9728/DCS.2018.19.4.789

    Article  Google Scholar 

  2. Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. Procedia Comput Sci 60(1):708–713. https://doi.org/10.1016/J.PROCS.2015.08.220

    Article  Google Scholar 

  3. Hwang G, Kang S, Dweekat AJ, Park J, Chang TW (2018) An IoT data anomaly response model for smart factory performance measurement. Int J Ind EngTheory Appl Pract 25(5):702–718

    Google Scholar 

  4. Maier A, Schriegel S, Niggemann O (2017) Big data and machine learning for the smart factory: solutions for condition monitoring, diagnosis and optimization. In: Jeschke S, Brecher C, Song H, Rawat D (eds) Industrial internet of things. Springer Series in Wireless Technology Springer, Cham, pp 473–485. https://doi.org/10.1007/978-3-319-42559-7_18

    Chapter  Google Scholar 

  5. Kroll B, Schaffranek D, Schriegel S, Niggemann O (2014) System modeling based on machine learning for anomaly detection and predictive maintenance in industrial plants. In Paper presented at the 19th IEEE international conference on emerging technologies and factory automation (ETFA), Barcelona, Spain, Doi: https://doi.org/10.1109/ETFA.2014.7005202

  6. Ahmed M, Mahmood AN, Islam MR (2016) A survey of anomaly detection techniques in financial domain. Future Gener Comput Syst 55:278–288. https://doi.org/10.1016/J.FUTURE.2015.01.001

    Article  Google Scholar 

  7. Kaur R, Singh S (2016) A survey of data mining and social network analysis based anomaly detection techniques. Egypt Inform J 17(2):199–216. https://doi.org/10.1016/J.EIJ.2015.11.004

    Article  Google Scholar 

  8. Hayes MA, Capretz MAM (2014) Contextual anomaly detection in big sensor data. Paper presented at the 2014 IEEE international congress on big data. Anchorage, AK, USA, pp 64–71. https://doi.org/10.1109/BIGDATA.CONGRESS.2014.19

    Chapter  Google Scholar 

  9. Ahmed M, Mahmood AN (2014) Network Traffic Analysis Based on Collective Anomaly Detection. In Paper presented at the 2014 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014, Hangzhou China, pp 1141–1146, doi: https://doi.org/10.1109/ICIEA.2014.6931337

  10. Ahmed M (2018) Collective anomaly detection techniques for network traffic analysis. Ann Data Sci 5(4):497–512. https://doi.org/10.1007/S40745-018-0149-0/FIGURES/10

    Article  Google Scholar 

  11. Mehrotra KG, Mohan CK, Huang H (2017) Anomaly detection algorithms and principles. Springer International Publishing, Cham, Switzerland. https://doi.org/10.1007/978-3-319-67526-8

    Book  Google Scholar 

  12. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection : a survey. ACM Comput Surv 41(3):1–58. https://doi.org/10.1145/1541880.1541882

    Article  Google Scholar 

  13. Zhang W, Yang Q, Geng Y (2009) A survey of anomaly detection methods in networks. In Paper presented at the 1st international symposium on computer network and multimedia technology, Wuhan, China, pp 1–3, Doi: https://doi.org/10.1109/CNMT.2009.5374676

  14. Ahmed M, Naser MA, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31. https://doi.org/10.1016/J.JNCA.2015.11.016

    Article  Google Scholar 

  15. Bellala G, Marwah M, Shah A, Arlitt M, Bash C (2012) A finite state machine-based characterization of building entities for monitoring and control. In Paper presented at the 4th ACM workshop on embedded systems for energy efficiency in buildings, Ontario, Canada, pp 153–160, doi: https://doi.org/10.1145/2422531.2422559.

  16. Wu H, Shen Y, **ao X, Hecker A, Fitzek FHP (2021) In-network processing acoustic data for anomaly detection in smart factory. In Paper presented at the IEEE Gobal Communication Conference, Madrid, Spain.

  17. Antoniadis I, Vercruyssen V, Davis J (2022) Systematic evaluation of cash search strategies for unsupervised anomaly detection. Proc Mach Learn Res 183:8–22

    Google Scholar 

  18. Lam J, Abbas R (2020) Machine learning based anomaly detection for 5G networks, ar**v - CS - Cryptography and Security, 1–12, doi: https://doi.org/10.48550/arxiv.2003.03474.

  19. Truong A, Walters A, Goodsitt J, Hines K, Bruss CB, Farivar R (2019) Towards automated machine learning: evaluation and comparison of AutoML approaches and tools. In Paper Presented at the International Conference on Tools with Artificial Intelligence (ICTAI), Portland, OR, USA, pp 1471–1479, doi: https://doi.org/10.1109/ICTAI.2019.00209.

  20. Tien CW, Huang TY, Chen PC, Wang JH (2021) Using autoencoders for anomaly detection and transfer learning in IoT. Computers 10(7):88–102. https://doi.org/10.3390/COMPUTERS10070088

    Article  Google Scholar 

  21. Kim D, Cha J, Oh S, Jeong J (2021) AnoGAN-based anomaly filtering for intelligent edge device in smart factory. In Paper presetented at the 15th International Conference on Ubiquitous Information Management and Communication (IMCIM 2021), Seoul, Korea (South), pp 1–6, doi: https://doi.org/10.1109/IMCOM51814.2021.9377409.

  22. Huong TT, Bac TP, Long DM, Luong TD, Dan NM, Quang LA, Cong LT, Thang BD, Tran KP (2021) Detecting cyberattacks using anomaly detection in industrial control systems: a federated learning approach. Comput Ind 132:103509. https://doi.org/10.1016/J.COMPIND.2021.103509

    Article  Google Scholar 

  23. Savic M, Lukic M, Danilovic D, Bodroski Z, Bajovic D, Mezei I, Vukobratovic D, Skrbic S, Jakovetic D (2021) Deep learning anomaly detection for cellular IoT with applications in smart logistics. IEEE Access 9:59406–59419. https://doi.org/10.1109/ACCESS.2021.3072916

    Article  Google Scholar 

  24. Rousopoulou V et al (2022) Cognitive analytics platform with AI solutions for anomaly detection. Comput Ind 134:103555. https://doi.org/10.1016/J.COMPIND.2021.103555

    Article  Google Scholar 

  25. Huong TT et al (2022) Federated learning-based explainable anomaly detection for industrial control systems. IEEE Access 10:53854–53872. https://doi.org/10.1109/ACCESS.2022.3173288

    Article  Google Scholar 

  26. Pelchen T, Thiele G, Vick A, Schade D, Krüger J, Radke M (2022) Learning demonstrator for anomaly detection in distributed energy generation. In 12th Conference on Learning Factories (CLF 2022), pp 1–6

  27. Li Z, Duan M, **ao B, Yang S (2022) A novel anomaly detection method for digital twin data using deconvolution operation with attention mechanism. IEEE Trans Industr Inform. https://doi.org/10.1109/TII.2022.3231923

    Article  Google Scholar 

  28. Gao H, Qiu B, Barroso RJD, Hussain W, Xu Y, Wang X (2022) TSMAE: a novel anomaly detection approach for internet of things time series data using memory-augmented autoencoder. IEEE Trans Netw Sci Eng. https://doi.org/10.1109/TNSE.2022.3163144

    Article  Google Scholar 

  29. Aguilar DL, Perez MAM, Loyola-Gonzalez O, Choo KKR, Bucheli-Susarrey E (2023) Towards an interpretable autoencoder: a decision tree-based autoencoder and its application in anomaly detection. IEEE Trans Dependable Secure Comput 20(2):1048–1059. https://doi.org/10.1109/TDSC.2022.3148331

    Article  Google Scholar 

  30. Babulak E, Wang M (2010) Discrete event simulation. In: Goti A (ed) Discrete event simulations. Intech Open Science, Rijeka, pp 1–10

    Google Scholar 

  31. Yılmaz R (2011) Mekanik Uygulamalar: temel Formüller, İstanbul: Yılmaz Redüktör, 9.

  32. GenelMekanik (2020) How to Calculate Pump Power, General Encyclopedia of Mechanics. https://genelmekanik.com/index.php/2020/08/17/pompa-gucu-nasil-hesaplanir/. Accessed 15 Jul 2022

  33. Kotthoff L, Thornton C, Hoos HH, Hutter F, Leyton-Brown K (2017) Auto-WEKA 2.0: automatic model selection and hyperparameter optimization in WEKA. J Mach Learn Res 18:1–5. https://doi.org/10.1007/978-3-030-05318-5_4

    Article  MathSciNet  Google Scholar 

  34. Gijsbers P, LeDell E, Thomas J, Poirier S, Bischl B, Vanschoren J (2019) An Open Source AutoML Benchmark, Paper presented at the 6th ICML Workshop on Automated Machine Learning, Long Beach, California, pp 1–8

  35. Zöller MA, Huber MF (2021) Benchmark and survey of automated machine learning frameworks. J Artif Intell Res 70:409–472. https://doi.org/10.1613/JAIR.1.11854

    Article  MathSciNet  MATH  Google Scholar 

  36. Yao Q et al (2018) Taking human out of learning applications: a survey on automated machine learning. ar**v - CS - Cryptography and Security, 1–12, doi: https://doi.org/10.48550/ar**v.1810.13306

  37. He X, Zhao K, Chu X (2021) AutoML: a survey of the state-of-the-art. Knowl Based Syst 212:106622. https://doi.org/10.1016/j.knosys.2020.106622

    Article  Google Scholar 

  38. ** H, Song Q, Hu X (2019) Auto-Keras: an efficient neural architecture search system. In Paper presented at the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage AK, pp 1946–1956, doi: https://doi.org/10.1145/3292500.3330648.

  39. Feurer M, Klein A, Eggensperger K, Springenberg JT, Blum M, Hutter F (2019) Auto-sklearn: efficient and robust automated machine learning. In: Hutter F, Kotthoff L, Vanschoren J (eds) Automated machine learning: methods systems, challenges. Springer, Cham, pp 113–134. https://doi.org/10.1007/978-3-030-05318-5_6

    Chapter  Google Scholar 

  40. Gain U, Hotti V (1828) (2021), Low-code AutoML-augmented data pipeline: a review and experiments. J Phys: Confe Ser 1:012015. https://doi.org/10.1088/1742-6596/1828/1/012015

    Article  Google Scholar 

  41. Özdemir Ş, Örslü S (2019) Makine Öğrenmesinde Yeni Bir Bakış Açısı : otomatik Makine Öğrenmesi ( AutoML ). J Inform Syst Manage Res 1(1):23–29

    Google Scholar 

  42. Ferreira L, Pilastri A, Martins CM, Pires PM, Cortez P (2021) A comparison of AutoML tools for machine learning, deep learning and XGBoost. In Paper Presented at the International Joint Conference on Neural Networks, Shenzhen, China, pp 1–8, doi: https://doi.org/10.1109/IJCNN52387.2021.9534091.

  43. Fabris F, Freitas AA (2019) Analysing the overfit of the auto-sklearn automated machine learning tool. In: Nicosia G, Pardalos P, Umeton R, Giuffrida G, Sciacca V (eds) Machine learning, optimization, and data science. Springer, Cham, pp 508–520. https://doi.org/10.1007/978-3-030-37599-7_42

    Chapter  Google Scholar 

  44. van Eeden WA, Luo C, van Hemert AM, Carlier IVE, Penninx BW, Wardenaar KJ, Hoos H, Giltaya EJ (2021) Predicting the 9-year course of mood and anxiety disorders with automated machine learning: a comparison between auto-sklearn, naïve Bayes classifier, and traditional logistic regression. Psychiatry Res 299:113823. https://doi.org/10.1016/J.PSYCHRES.2021.113823

    Article  Google Scholar 

  45. Munjal A, Khandia R, Gautam B (2020) A machine learning approach for selection of polycystic ovarian syndrome (Pcos) attributes and comparing different classifier performance with the help of wekaand pycaret. Int J Scı Res 9(12):59–63. https://doi.org/10.36106/IJSR/5416514

    Article  Google Scholar 

  46. Avendano JC, Otero LD, Otero C (2021) Application of statistical machine learning algorithms for classification of bridge deformation data sets. In Paper Presented at the 15th Annual IEEE International Systems Conference, Vancouver, BC, pp 1–7, doi: https://doi.org/10.1109/SysCon48628.2021.9447056.

  47. Tanha J, van Someren M, Afsarmanesh H (2017) Semi-supervised self-training for decision tree classifiers. Int J Mach Learn Cybern 8(1):355–370. https://doi.org/10.1007/S13042-015-0328-7/TABLES/11

    Article  Google Scholar 

  48. Breiman L (2001) Random Forests. Mach Learn 45(1):5–32. https://doi.org/10.1023/A:1010933404324

    Article  MATH  Google Scholar 

  49. Belgiu M, Drăgu L (2016) Random forest in remote sensing: a review of applications and future directions. ISPRS J Photogramm Remote Sens 114:24–31. https://doi.org/10.1016/J.ISPRSJPRS.2016.01.011

    Article  Google Scholar 

Download references

Acknowledgements

We wish to thank the reviewers for many helpful comments and suggestions.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed significantly to the development of the simulation and the writing of the article. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Cihan Bayraktar.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bayraktar, C., Karakaya, Z. & Gökçen, H. Real-time anomaly detection system within the scope of smart factories. J Supercomput 79, 14707–14742 (2023). https://doi.org/10.1007/s11227-023-05236-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05236-w

Keywords

Navigation