2021
DOI: 10.3390/s21144946
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Machine Learning Algorithms for Anomaly Detection on Edge Devices

Abstract: The Internet of Things (IoT) consists of small devices or a network of sensors, which permanently generate huge amounts of data. Usually, they have limited resources, either computing power or memory, which means that raw data are transferred to central systems or the cloud for analysis. Lately, the idea of moving intelligence to the IoT is becoming feasible, with machine learning (ML) moved to edge devices. The aim of this study is to provide an experimental analysis of processing a large imbalanced dataset (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 21 publications
(24 reference statements)
0
3
0
Order By: Relevance
“…erefore, the parts that should belong to the background, such as the audience and the field line, are also mistaken for the moving target. In addition, a tennis video consists of multiple shots, the shots are frequently changed, and the number of frames in a single shot or in a scene is not enough, so the update cycle of the background is not long enough, and the situation shown in Figure 5(a) often occurs (the game scene appears before the close-up shot is updated), which is also one of the reasons for the inaccuracy of the background image [20].…”
Section: Moving Target Extraction Based On Correlation Filteringmentioning
confidence: 99%
“…erefore, the parts that should belong to the background, such as the audience and the field line, are also mistaken for the moving target. In addition, a tennis video consists of multiple shots, the shots are frequently changed, and the number of frames in a single shot or in a scene is not enough, so the update cycle of the background is not long enough, and the situation shown in Figure 5(a) often occurs (the game scene appears before the close-up shot is updated), which is also one of the reasons for the inaccuracy of the background image [20].…”
Section: Moving Target Extraction Based On Correlation Filteringmentioning
confidence: 99%
“…In 2021, Huˇc et al [16] proposed an anomaly detection model for edge devices. In the present paper, authors have analyzed different machine learning algorithms and evaluated the performance of the proposed intrusion detection model on a largely imbalanced dataset 'DS2OS'.…”
Section: Related Workmentioning
confidence: 99%
“…Confusion matrix has been shown in figure 13 The proposed Ensemble-based model for IDS shows remarkable performance in terms of accuracy, TPR, and time efficiency. Only the models presented by Huˇc et al [16], Xu and Fan [20], and Mahamed et al [23] have calculated the time efficiency of their models. The model proposed in the present paper shows outstanding performance.…”
Section: ) Overall Performance Of Proposed Idsmentioning
confidence: 99%
“…As the name suggests, this algorithm consists of multiple decision trees that form a forest. This tree-based algorithm has been utilized in many IDS and research papers; some examples of its use and effectiveness can be found, e.g., in [62][63][64]. The model is trained using bagging (bootstrap aggregation) techniques.…”
Section: Classification Modelsmentioning
confidence: 99%