Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anomaly detection method based on cloud edge fusion environment

An anomaly detection and integrated environment technology, applied in the field of the Internet of Things, can solve the problems of invalid data transmission, large energy consumption, and inaccurate detection results, and achieve the effects of expanding the scope, improving accuracy, and reducing resource and energy consumption

Active Publication Date: 2021-12-24
HEBEI UNIV OF TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Many domestic and foreign scholars have conducted a lot of research in the field of anomaly detection by using edge computing. Y.Peng et al. [1] A multi-source and multi-dimensional data anomaly detection model is proposed, and a layered edge computing model is used for anomaly detection. First, a single-source data anomaly detection algorithm based on fuzzy theory is designed. Secondly, a multi-source data anomaly detection algorithm implemented at the base station is proposed. This algorithm detects and comprehensively analyzes sensors with position correlation, but all the data at the sensor end needs to be uploaded to the base station. Instead of selectively uploading to the base station, a lot of energy is consumed in this process
[0004] X.Li, Z.Zhou, etc. [2] A multi-modal anomaly detection scheme is proposed, which divides the attributes that determine anomalies into primary attributes and secondary attributes. The primary attribute is a single attribute instead of multiple attributes. lead to false positives and transmission of large amounts of invalid data
[0005] The aforementioned literatures ignore the anomaly detection of edge nodes associated with abnormal edge nodes, resulting in incomplete anomaly detection and inaccurate detection results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anomaly detection method based on cloud edge fusion environment
  • Anomaly detection method based on cloud edge fusion environment
  • Anomaly detection method based on cloud edge fusion environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0074] In this embodiment, the detection of indoor fire is taken as an example. The multi-attribute abnormal event detection method based on the cloud-edge fusion environment includes the following steps:

[0075] Step 1. Select a set of historical data for detecting indoor fires, and select data points from the historical data of detection equipment in a space area according to the time series at intervals of 1 min to obtain the original attribute information sequence; the attributes include temperature, smoke, CO, CO 2 , O 2 7, heat and watering amount, these 7 attributes are substituted into the multivariate logistic regression model of formula (1), and the regression coefficients of the 7 attributes are solved by maximum likelihood estimation, and temperature, smoke and CO are selected according to the regression coefficients from large to small The three attributes of concentration are used as the main attribute, that is, m=3;

[0076] Step 2. In order to make the edge n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anomaly detection method based on a cloud edge fusion environment. The anomaly detection method comprises the following steps: step 1, screening m main attributes which have a decisive effect on an event; step 2, dividing a detection area into a plurality of sub-areas, and combining neighbor sub-areas to construct a spatial index tree; and querying the main attribute information of the event by using the spatial index tree, sending the main attribute information to the edge node, and performing abnormality judgment; step 3, performing anomaly detection of a single edge node; step 4, performing anomaly detection on the neighbor edge nodes of the abnormal edge nodes by using a social consciousness relationship; and 5, after the edge layer uploads the main attribute information of the abnormal sub-areas to a cloud layer, enabling the cloud to make a decision. According to the method, whether the neighbor edge nodes of the abnormal edge nodes are abnormal or not is judged through interaction existing in the social consciousness relation, the abnormal nodes can be guided to find the neighbor edge nodes which are possibly abnormal, the anomaly detection range is expanded, and the anomaly detection accuracy is further improved.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, and in particular relates to an abnormal detection method based on a cloud-edge fusion environment. Background technique [0002] In order to ensure the safety of people's livelihood and network security, anomaly detection is particularly important in the Internet of Things. Anomaly detection in the Internet of Things environment has become an indispensable task for the development of social security. With the rapid development of Internet of Things technology, smart homes, wearable devices, and external devices for environmental monitoring all provide reliable technical support for anomaly detection. The development of edge computing has brought more convenience to time-critical anomaly detection tasks in the Internet of Things environment. Edge computing mainly processes data through the edge layer close to the data source to reduce the number of devices directly transmitting dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/38H04W24/08H04L29/08H04L12/24G16Y20/10
CPCH04W4/38H04W24/08H04L67/12H04L41/0677G16Y20/10Y02D30/70
Inventor 魏凌霄汤金娥顾军华张亚娟秦泰山卢昕明
Owner HEBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products