An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems

Abstract

Anomaly detection is an important aspect of data mining, where the main objective is to identify anomalous or unusual data from a given dataset. However, there is no formal categorization of application-specific anomaly detection techniques for big data and this ignites a confusion for the data miners. In this paper, we categorise anomaly detection techniques based on nearest neighbours, clustering and statistical approaches and investigate the performance analysis of these techniques in critical infrastructure applications such as SCADA systems. Extensive experimental analysis is conducted to compare representative algorithms from each of the categories using seven benchmark datasets (both real and simulated) in SCADA systems. The effectiveness of the representative algorithms is measured through a number of metrics. We highlighted the set of algorithms that are the best performing for SCADA systems.

Authors and Affiliations

Mohiuddin Ahmed, Adnan Anwar, Abdun Naser Mahmood, Zubair Shah, Michael J. Maher

Keywords

Related Articles

Scalable SOCP-based localization technique for wireless sensor network

Node localization is one of the essential requirements to most applications of wireless sensor networks. This paper presents a detailed implementation of a centralized localization technique for WSNs based on Second Orde...

Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things

There has been tremendous growth in the application of the Internet of Things (IoT) in our daily lives. Yet with this growth has come numerous security concerns and privacy challenges for both the users and the systems....

Uplink Performance of Cell-Free Massive MIMO with Access Point Selections

Cell-free massive multiple-input multiple-output (MIMO), in which a massive number of access points (APs) distributed over a large area serve a smaller number of users in the same time and frequency resources, inherits a...

Bandit Learning with Concurrent Transmissions for Energy-Efficient Flooding in Sensor Networks

Concurrent transmissions, a novel communication paradigm, has been shown to e ectively accomplish a reliable and energy-eÿcient flooding in low-power wireless networks. With multiple nodes exploiting a receive-and-forwar...

Mobile Application Search: A QoS-Aware and Tag-Based Approach

The availability of enormous numbers of mobile applications (apps) is driving demand for the means to search for, recommend, and manage apps. Existing search engines provide basic search functionalities that enable users...

Download PDF file
  • EP ID EP46025
  • DOI http://dx.doi.org/10.4108/inis.2.3.e5
  • Views 442
  • Downloads 0

How To Cite

Mohiuddin Ahmed, Adnan Anwar, Abdun Naser Mahmood, Zubair Shah, Michael J. Maher (2015). An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2(3), -. https://europub.co.uk/articles/-A-46025