Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Anomaly detection

Discipline
Institution
Publication Year
Publication
File Type

Articles 1 - 29 of 29

Full-Text Articles in Engineering

Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei May 2024

Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei

Doctoral Dissertations and Master's Theses

Progress in the development of wireless network technology has played a crucial role in the evolution of societies and provided remarkable services over the past decades. It remotely offers the ability to execute critical missions and effective services that meet the user's needs. This advanced technology integrates cyber and physical layers to form cyber-physical systems (CPS), such as the Unmanned Aerial System (UAS), which consists of an Unmanned Aerial Vehicle (UAV), ground network infrastructure, communication link, etc. Furthermore, it plays a crucial role in connecting objects to create and develop the Internet of Things (IoT) technology. Therefore, the emergence of …


Water Data Science: Data Driven Techniques, Training, And Tools For Improved Management Of High Frequency Water Resources Data, Amber Spackman Jones May 2024

Water Data Science: Data Driven Techniques, Training, And Tools For Improved Management Of High Frequency Water Resources Data, Amber Spackman Jones

All Graduate Theses and Dissertations, Fall 2023 to Present

Electronic sensors can measure water and climate conditions at high frequency and generate large quantities of observed data. This work addresses data management challenges associated with the volume and complexity of high frequency water data. We developed techniques for automatically reviewing data, created materials for training water data managers, and explored existing and emerging technologies for sensor data management.

Data collected by sensors often include errors due to sensor failure or environmental conditions that need to be removed, labeled, or corrected before the data can be used for analysis. Manual review and correction of these data can be tedious and …


Intelligent Wide-Area Monitoring Systems Using Deep Learning, Mustafa Matar Jan 2023

Intelligent Wide-Area Monitoring Systems Using Deep Learning, Mustafa Matar

Graduate College Dissertations and Theses

Scientific advancements based on the wide-area measurements as a way to monitor systems, are fundamental in reliable operation of different types of complex networks. These advanced measurement units capable of real-time wide-area monitoring, which enables capture system dynamic behavior. Therefore, advanced technology is urgently necessary to analyze substantial streaming data from these networks and handle system uncertainties. As an example, uncertainties in power systems due to renewable energy and demand response. Power system operation, and planning have become more complex and vulnerable to extreme weather and natural disasters. Thus, increasing power system resilience has gained more attention.Machine Learning (ML), and …


Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams Jan 2023

Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams

Browse all Theses and Dissertations

Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …


A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham Jan 2023

A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham

Browse all Theses and Dissertations

The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …


Malware Detection Using Electromagnetic Side-Channel Analysis, Matthew A. Bergstedt Mar 2022

Malware Detection Using Electromagnetic Side-Channel Analysis, Matthew A. Bergstedt

Theses and Dissertations

Many physical systems control or monitor important applications without the capacity to monitor for malware using on-device resources. Thus, it becomes valuable to explore malware detection methods for these systems utilizing external or off-device resources. This research investigates the viability of employing EM SCA to determine whether a performed operation is normal or malicious. A Raspberry Pi 3 was set up as a simulated motor controller with code paths for a normal or malicious operation. While the normal path only calculated the motor speed before updating the motor, the malicious path added a line of code to modify the calculated …


Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee Dec 2021

Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee

Dissertations

People nowadays use the Internet to project their assessments, impressions, ideas, and observations about various subjects or products on numerous social networking sites. These sites serve as a great source of gathering information for data analytics, sentiment analysis, natural language processing, etc. The most critical challenge is interpreting this data and capturing the sentiment behind these expressions. Sentiment analysis is analyzing, processing, concluding, and inferencing subjective texts with the views. Companies use sentiment analysis to understand public opinions, perform market research, analyze brand reputation, recognize customer experiences, and study social media influence. According to the different needs for aspect granularity, …


Unsupervised Learning For Anomaly Detection In Remote Sensing Imagery, Husam A. Alfergani Sep 2021

Unsupervised Learning For Anomaly Detection In Remote Sensing Imagery, Husam A. Alfergani

Theses and Dissertations

Landfill fire is a potential hazard of waste mismanagement, and could occur both on and below the surface of active and closed sites. Timely identification of temperature anomalies is critical in monitoring and detecting landfill fires, to issue warnings that can help extinguish fires at early stages. The overarching objective of this research is to demonstrate the applicability and advantages of remote sensing data, coupled with machine learning techniques, to identify landfill thermal states that can lead to fire, in the absence of onsite observations. This dissertation proposed unsupervised learning techniques, notably variational auto-encoders (VAEs), to identify temperature anomalies from …


Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya Apr 2021

Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya

Engineering Management & Systems Engineering Theses & Dissertations

The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …


Automated Intelligent Cueing Device To Improve Ambient Gait Behaviors For Patients With Parkinson's Disease, Nader Naghavi Dec 2020

Automated Intelligent Cueing Device To Improve Ambient Gait Behaviors For Patients With Parkinson's Disease, Nader Naghavi

Doctoral Dissertations

Freezing of gait (FoG) is a common motor dysfunction in individuals with Parkinson’s disease (PD). FoG impairs walking and is associated with increased fall risk. Although pharmacological treatments have shown promise during ON-medication periods, FoG remains difficult to treat during medication OFF state and in advanced stages of the disease. External cueing therapy in the forms of visual, auditory, and vibrotactile, has been effective in treating gait deviations. Intelligent (or on-demand) cueing devices are novel systems that analyze gait patterns in real-time and activate cues only at moments when specific gait alterations are detected. In this study we developed methods …


Structured Deep Learning: Theory And Applications, Fangqi Zhu Aug 2020

Structured Deep Learning: Theory And Applications, Fangqi Zhu

Electrical Engineering Dissertations

The increasing amount of data generation has boosted the broad range of research in big data and artificial intelligence. Besides the success of the deep learning in wide range of research area, it meets its pitfalls on the following three problems: * Data hungry: current models often require to feed GB, TB even PB level of data, which is easily overfit. * Hard to generalize: deep learning constructs representations that memorize their training data rather than generalize to unseen scenarios * Missing critical information: o -the-self deep learning framework may not fully utilize the underlying information of the data We …


Novel Estimation And Detection Techniques For 5g Networks, Anas Saci Jun 2020

Novel Estimation And Detection Techniques For 5g Networks, Anas Saci

Electronic Thesis and Dissertation Repository

The thesis presents several detection and estimation techniques that can be incorporated into the fifth-generation (5G) networks. First, the thesis presents a novel system for orthogonal frequency division multiplexing (OFDM) to estimate the channel blindly. The system is based on modulating particular pairs of subcarriers using amplitude shift keying (ASK) and phase-shift keying (PSK) adjacent in the frequency domain, which enables the realization of a decision-directed (DD) one-shot blind channel estimator (OSBCE). The performance of the proposed estimator is evaluated in terms of the mean squared error (MSE), where an accurate analytical expression is derived and verified using Monte Carlo …


Hierarchical Anomaly Detection For Time Series Data, Ryan E. Sperl Jan 2020

Hierarchical Anomaly Detection For Time Series Data, Ryan E. Sperl

Browse all Theses and Dissertations

With the rise of Big Data and the Internet of Things, there is an increasing availability of large volumes of real-time streaming data. Unusual occurrences in the underlying system will be reflected in these streams, but any human analysis will quickly become out of date. There is a need for automatic analysis of streaming data capable of identifying these anomalous behaviors as they occur, to give ample time to react. In order to handle many high-velocity data streams, detectors must minimize the processing requirements per value. In this thesis, we have developed a novel anomaly detection method which makes use …


Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick Aug 2019

Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick

Boise State University Theses and Dissertations

Monitoring large-scale networks for malicious activities is increasingly challenging: the amount and heterogeneity of traffic hinder the manual definition of IDS signatures and deep packet inspection. In this thesis, we propose MINOS, a novel fully unsupervised approach that generates an anomaly score for each host allowing us to classify with high accuracy each host as either infected (generating malicious activities), attacked (under attack), or clean (without any infection). The generated score of each hour is able to detect the time frame of being attacked for an infected or attacked host without any prior knowledge. MINOS automatically creates a personalized traffic …


Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo Jun 2019

Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo

Electronic Thesis and Dissertation Repository

The enormous development in the connectivity among different type of networks poses significant concerns in terms of privacy and security. As such, the exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation in high-dimension has begun to pose significant challenges for data management and security. Handling redundant and irrelevant features in high-dimensional space has caused a long-term challenge for network anomaly detection. Eliminating such features with spectral information not only speeds up the classification process, but …


Cyber Data Anomaly Detection Using Autoencoder Neural Networks, Spencer A. Butt Mar 2018

Cyber Data Anomaly Detection Using Autoencoder Neural Networks, Spencer A. Butt

Theses and Dissertations

The Department of Defense requires a secure presence in the cyber domain to successfully execute its stated mission of deterring war and protecting the security of the United States. With potentially millions of logged network events occurring on defended networks daily, a limited staff of cyber analysts require the capability to identify novel network actions for security adjudication. The detection methodology proposed uses an autoencoder neural network optimized via design of experiments for the identification of anomalous network events. Once trained, each logged network event is analyzed by the neural network and assigned an outlier score. The network events with …


Anomaly Inference Based On Heterogeneous Data Sources In An Electrical Distribution System, Yachen Tang Jan 2018

Anomaly Inference Based On Heterogeneous Data Sources In An Electrical Distribution System, Yachen Tang

Dissertations, Master's Theses and Master's Reports

Harnessing the heterogeneous data sets would improve system observability. While the current metering infrastructure in distribution network has been utilized for the operational purpose to tackle abnormal events, such as weather-related disturbance, the new normal we face today can be at a greater magnitude. Strengthening the inter-dependencies as well as incorporating new crowd-sourced information can enhance operational aspects such as system reconfigurability under extreme conditions. Such resilience is crucial to the recovery of any catastrophic events. In this dissertation, it is focused on the anomaly of potential foul play within an electrical distribution system, both primary and secondary networks as …


Identifying The Impact Of Noise On Anomaly Detection Through Functional Near-Infrared Spectroscopy (Fnirs) And Eye-Tracking, Ryan Dwight Gabbard Jan 2017

Identifying The Impact Of Noise On Anomaly Detection Through Functional Near-Infrared Spectroscopy (Fnirs) And Eye-Tracking, Ryan Dwight Gabbard

Browse all Theses and Dissertations

Occupational noise frequently occurs in the work environment in military intelligence, surveillance, and reconnaissance (ISR) operations. This impacts cognitive performance by acting as a stressor, potentially interfering with the analysts' decision making process. In this study the effects of different noise stimuli on analysts' performance and workload in anomaly detection were investigated by simulating a noisy work environment. Functional near infrared spectroscopy (fNIRS) was utilized to quantify oxy-hemoglobin (HbO) and deoxy-hemoglobin (HbD) concentration changes in the prefrontal cortex (PFC), as well as behavioral measures which include eye-tracking, reaction time, and accuracy rate. It was found that HbO for some of …


Collective Contextual Anomaly Detection For Building Energy Consumption, Daniel Berhane Araya Aug 2016

Collective Contextual Anomaly Detection For Building Energy Consumption, Daniel Berhane Araya

Electronic Thesis and Dissertation Repository

Commercial and residential buildings are responsible for a substantial portion of total global energy consumption and as a result make a significant contribution to global carbon emissions. Hence, energy-saving goals that target buildings can have a major impact in reducing environmental damage. During building operation, a significant amount of energy is wasted due to equipment and human-related faults. To reduce waste, today's smart buildings monitor energy usage with the aim of identifying abnormal consumption behaviour and notifying the building manager to implement appropriate energy-saving procedures. To this end, this research proposes the \textit{ensemble anomaly detection} (EAD) framework. The EAD is …


Preprocessing Techniques To Support Event Detection Data Fusion On Social Media Data, Brandon T. Davis Jun 2016

Preprocessing Techniques To Support Event Detection Data Fusion On Social Media Data, Brandon T. Davis

Theses and Dissertations

This thesis focuses on collection and preprocessing of streaming social media feeds for metadata as well as the visual and textual information. Today, news media has been the main source of immediate news events, large and small. However, the information conveyed on these news sources is delayed due to the lack of proximity and general knowledge of the event. Such news have started relying on social media sources for initial knowledge of these events. Previous works focused on captured textual data from social media as a data source to detect events. This preprocessing framework postures to facilitate the data fusion …


Autoencoded Reduced Clusters For Anomaly Detection Enrichment (Arcade) In Hyperspectral Imagery, Brenden A. Mclean Mar 2016

Autoencoded Reduced Clusters For Anomaly Detection Enrichment (Arcade) In Hyperspectral Imagery, Brenden A. Mclean

Theses and Dissertations

Anomaly detection in hyper-spectral imagery is a relatively recent and important research area. The shear amount of data available in a many hyper-spectral images makes the utilization of multivariate statistical methods and artificial neural networks ideal for this analysis. Using HYDICE sensor hyper-spectral images, we examine a variety of preprocessing techniques within a framework that allows for changing parameter settings and varying the methodological order of operations in order to enhance detection of anomalies within image data. By examining a variety of different options, we are able to gain significant insight into what makes anomaly detection viable for these images, …


Data Cleaning In The Energy Domain, Hermine Nathalie Akouemo Kengmo Kenfack Apr 2015

Data Cleaning In The Energy Domain, Hermine Nathalie Akouemo Kengmo Kenfack

Dissertations (1934 -)

This dissertation addresses the problem of data cleaning in the energy domain, especially for natural gas and electric time series. The detection and imputation of anomalies improves the performance of forecasting models necessary to lower purchasing and storage costs for utilities and plan for peak energy loads or distribution shortages. There are various types of anomalies, each induced by diverse causes and sources depending on the field of study. The definition of false positives also depends on the context. The analysis is focused on energy data because of the availability of data and information to make a theoretical and practical …


Contextual Anomaly Detection Framework For Big Sensor Data, Michael Hayes Apr 2014

Contextual Anomaly Detection Framework For Big Sensor Data, Michael Hayes

Electronic Thesis and Dissertation Repository

Performing predictive modelling, such as anomaly detection, in Big Data is a difficult task. This problem is compounded as more and more sources of Big Data are generated from environmental sensors, logging applications, and the Internet of Things. Further, most current techniques for anomaly detection only consider the content of the data source, i.e. the data itself, without concern for the context of the data. As data becomes more complex it is increasingly important to bias anomaly detection techniques for the context, whether it is spatial, temporal, or semantic. The work proposed in this thesis outlines a contextual anomaly detection …


Ant: A Framework For Increasing The Efficiency Of Sequential Debugging Techniques With Parallel Programs, Jae-Woo Lee Oct 2013

Ant: A Framework For Increasing The Efficiency Of Sequential Debugging Techniques With Parallel Programs, Jae-Woo Lee

Open Access Dissertations

Bugs in sequential programs cost the software industry billions of dollars in lost productivity each year. Even if simple parallel programming models are created, they will not reduce the level of sequential bugs in programs below that of sequential programs. It can be argued that the complexity of current parallel programming models may increase the number of sequential bugs in parallel programs because they distract the programmer from the core logic of the program.

Tools exist that identify statements related to sequential bugs and allow those bugs to be more quickly located and fixed. Their use in parallel programs will …


Rank Based Anomaly Detection Algorithms, Huaming Huang May 2013

Rank Based Anomaly Detection Algorithms, Huaming Huang

Electrical Engineering and Computer Science - Dissertations

Anomaly or outlier detection problems are of considerable importance, arising frequently in diverse real-world applications such as finance and cyber-security. Several algorithms have been formulated for such problems, usually based on formulating a problem-dependent heuristic or distance metric. This dissertation proposes anomaly detection algorithms that exploit the notion of ``rank," expressing relative outlierness of different points in the relevant space, and exploiting asymmetry in nearest neighbor relations between points: a data point is ``more anomalous" if it is not the nearest neighbor of its nearest neighbors. Although rank is computed using distance, it is a more robust and higher level …


Automatic Detection Of Abnormal Behavior In Computing Systems, James Frank Roberts Jan 2013

Automatic Detection Of Abnormal Behavior In Computing Systems, James Frank Roberts

Theses and Dissertations--Computer Science

I present RAACD, a software suite that detects misbehaving computers in large computing systems and presents information about those machines to the system administrator. I build this system using preexisting anomaly detection techniques. I evaluate my methods using simple synthesized data, real data containing coerced abnormal behavior, and real data containing naturally occurring abnormal behavior. I find that the system adequately detects abnormal behavior and significantly reduces the amount of uninteresting computer health data presented to a system administrator.


Cyber Profiling For Insider Threat Detection, Akaninyene Walter Udoeyop Aug 2010

Cyber Profiling For Insider Threat Detection, Akaninyene Walter Udoeyop

Masters Theses

Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century, insiders were often overlooked as suspects for these attacks. The 2010 CERT Cyber Security Watch Survey attributes 26 percent of cyber crimes to insiders. Numerous real insider attack scenarios suggest that during, or directly before the attack, the insider begins to behave abnormally. We introduce a method to detect abnormal behavior by profiling users. We utilize the k-means and kernel density estimation algorithms to learn a user’s normal behavior and establish normal user profiles based …


Anomaly Detection In Unknown Environments Using Wireless Sensor Networks, Yuanyuan Li May 2010

Anomaly Detection In Unknown Environments Using Wireless Sensor Networks, Yuanyuan Li

Doctoral Dissertations

This dissertation addresses the problem of distributed anomaly detection in Wireless Sensor Networks (WSN). A challenge of designing such systems is that the sensor nodes are battery powered, often have different capabilities and generally operate in dynamic environments. Programming such sensor nodes at a large scale can be a tedious job if the system is not carefully designed. Data modeling in distributed systems is important for determining the normal operation mode of the system. Being able to model the expected sensor signatures for typical operations greatly simplifies the human designer’s job by enabling the system to autonomously characterize the expected …


Modeling Scenes And Human Activities In Videos, Arslan Basharat Jan 2009

Modeling Scenes And Human Activities In Videos, Arslan Basharat

Electronic Theses and Dissertations

In this dissertation, we address the problem of understanding human activities in videos by developing a two-pronged approach: coarse level modeling of scene activities and fine level modeling of individual activities. At the coarse level, where the resolution of the video is low, we rely on person tracks. At the fine level, richer features are available to identify different parts of the human body, therefore we rely on the body joint tracks. There are three main goals of this dissertation: (1) identify unusual activities at the coarse level, (2) recognize different activities at the fine level, and (3) predict the …