We present a novel anomaly-based detection approach capable of detecting botnet Command and Control traffic in an enterprise network by estimating the trustworthiness of the traffic destinations. A traffic flow is classified as anomalous if its destination identifier does not origin from: human input, prior traffic from a trusted destination, or a defined set of legitimate applications. This allows for real-time detection of diverse types of Command and Control traffic. The detection approach and its accuracy are evaluated by experiments in a controlled environment.
DOCUMENT
The maturing field of Wireless Sensor Networks (WSN) results in long-lived deployments that produce large amounts of sensor data. Lightweight online on-mote processing may improve the usage of their limited resources, such as energy, by transmitting only unexpected sensor data (anomalies). We detect anomalies by analyzing sensor reading predictions from a linear model. We use Recursive Least Squares (RLS) to estimate the model parameters, because for large datasets the standard Linear Least Squares Estimation (LLSE) is not resource friendly. We evaluate the use of fixed-point RLS with adaptive thresholding, and its application to anomaly detection in embedded systems. We present an extensive experimental campaign on generated and real-world datasets, with floating-point RLS, LLSE, and a rule-based method as benchmarks. The methods are evaluated on prediction accuracy of the models, and on detection of anomalies, which are injected in the generated dataset. The experimental results show that the proposed algorithm is comparable, in terms of prediction accuracy and detection performance, to the other LS methods. However, fixed-point RLS is efficiently implementable in embedded devices. The presented method enables online on-mote anomaly detection with results comparable to offline LS methods. © 2013 IEEE.
DOCUMENT
In recent years, drones have increasingly supported First Responders (FRs) in monitoring incidents and providing additional information. However, analysing drone footage is time-intensive and cognitively demanding. In this research, we investigate the use of AI models for the detection of humans in drone footage to aid FRs in tasks such as locating victims. Detecting small-scale objects, particularly humans from high altitudes, poses a challenge for AI systems. We present first steps of introducing and evaluating a series of YOLOv8 Convolutional Neural Networks (CNNs) for human detection from drone images. The models are fine-tuned on a created drone image dataset of the Dutch Fire Services and were able to achieve a 53.1% F1-Score, identifying 439 out of 825 humans in the test dataset. These preliminary findings, validated by an incident commander, highlight the promising utility of these models. Ongoing efforts aim to further refine the models and explore additional technologies.
MULTIFILE
Abstract: The key challenge of managing Floating Production Storage and Offloading assets (FPSOs) for offshore hydrocarbon production lies in maximizing the economic value and productivity, while minimizing the Total Cost of Ownership and operational risk. This is a comprehensive task, considering the increasing demands of performance contracting, (down)time reduction, safety and sustainability while coping with high levels of phenomenological complexity and relatively low product maturity due to the limited amount of units deployed in varying operating conditions. Presently, design, construction and operational practices are largely influenced by high-cycle fatigue as a primary degradation parameter. Empirical (inspection) practices are deployed as the key instrument to identify and mitigate system anomalies and unanticipated defects, inherently a reactive measure. This paper describes a paradigm-shift from predominant singular methods into a more holistic and pro-active system approach to safeguard structural longevity. This is done through a short review of several synergetic Joint Industry Projects (JIP’s) from different angles of incidence on enhanced design and operations through coherent a-priori fatigue prediction and posteriori anomaly detection and -monitoring.
DOCUMENT
Anomaly detection is a key factor in the processing of large amounts of sensor data from Wireless Sensor Networks (WSN). Efficient anomaly detection algorithms can be devised performing online node-local computations and reducing communication overhead, thus improving the use of the limited hardware resources. This work introduces a fixed-point embedded implementation of Online Sequential Extreme Learning Machine (OS-ELM), an online learning algorithm for Single Layer Feed forward Neural Networks (SLFN). To overcome the stability issues introduced by the fixed precision, we apply correction mechanisms previously proposed for Recursive Least Squares (RLS). The proposed implementation is tested extensively with generated and real-world datasets, and compared with RLS, Linear Least Squares Estimation, and a rule-based method as benchmarks. The methods are evaluated on the prediction accuracy and on the detection of anomalies. The experimental results demonstrate that fixed-point OS-ELM can be successfully implemented on resource-limited embedded systems, with guarantees of numerical stability. Furthermore, the detection accuracy of fixed-point OS-ELM shows better generalization properties in comparison with, for instance, fixed-point RLS. © 2013 IEEE.
DOCUMENT
The Heating Ventilation and Air Conditioning (HVAC) sector is responsible for a large part of the total worldwide energy consumption, a significant part of which is caused by incorrect operation of controls and maintenance. HVAC systems are becoming increasingly complex, especially due to multi-commodity energy sources, and as a result, the chance of failures in systems and controls will increase. Therefore, systems that diagnose energy performance are of paramount importance. However, despite much research on Fault Detection and Diagnosis (FDD) methods for HVAC systems, they are rarely applied. One major reason is that proposed methods are different from the approaches taken by HVAC designers who employ process and instrumentation diagrams (P&IDs). This led to the following main research question: Which FDD architecture is suitable for HVAC systems in general to support the set up and implementation of FDD methods, including energy performance diagnosis? First, an energy performance FDD architecture based on information embedded in P&IDs was elaborated. The new FDD method, called the 4S3F method, combines systems theory with data analysis. In the 4S3F method, the detection and diagnosis phases are separated. The symptoms and faults are classified into 4 types of symptoms (deviations from balance equations, operating states (OS) and energy performance (EP), and additional information) and 3 types of faults (component, control and model faults). Second, the 4S3F method has been tested in four case studies. In the first case study, the symptom detection part was tested using historical Building Management System (BMS) data for a whole year: the combined heat and power plant of the THUAS (The Hague University of Applied Sciences) building in Delft, including an aquifer thermal energy storage (ATES) system, a heat pump, a gas boiler and hot and cold water hydronic systems. This case study showed that balance, EP and OS symptoms can be extracted from the P&ID and the presence of symptoms detected. In the second case study, a proof of principle of the fault diagnosis part of the 4S3F method was successfully performed on the same HVAC system extracting possible component and control faults from the P&ID. A Bayesian Network diagnostic, which mimics the way of diagnosis by HVAC engineers, was applied to identify the probability of all possible faults by interpreting the symptoms. The diagnostic Bayesian network (DBN) was set up in accordance with the P&ID, i.e., with the same structure. Energy savings from fault corrections were estimated to be up to 25% of the primary energy consumption, while the HVAC system was initially considered to have an excellent performance. In the third case study, a demand-driven ventilation system (DCV) was analysed. The analysis showed that the 4S3F method works also to identify faults on an air ventilation system.
DOCUMENT
The security of online assessments is a major concern due to widespread cheating. One common form of cheating is impersonation, where students invite unauthorized persons to take assessments on their behalf. Several techniques exist to handle impersonation. Some researchers recommend use of integrity policy, but communicating the policy effectively to the students is a challenge. Others propose authentication methods like, password and fingerprint; they offer initial authentication but are vulnerable thereafter. Face recognition offers post-login authentication but necessitates additional hardware. Keystroke Dynamics (KD) has been used to provide post-login authentication without any additional hardware, but its use is limited to subjective assessment. In this work, we address impersonation in assessments with Multiple Choice Questions (MCQ). Our approach combines two key strategies: reinforcement of integrity policy for prevention, and keystroke-based random authentication for detection of impersonation. To the best of our knowledge, it is the first attempt to use keystroke dynamics for post-login authentication in the context of MCQ. We improve an online quiz tool for the data collection suited to our needs and use feature engineering to address the challenge of high-dimensional keystroke datasets. Using machine learning classifiers, we identify the best-performing model for authenticating the students. The results indicate that the highest accuracy (83%) is achieved by the Isolation Forest classifier. Furthermore, to validate the results, the approach is applied to Carnegie Mellon University (CMU) benchmark dataset, thereby achieving an improved accuracy of 94%. Though we also used mouse dynamics for authentication, but its subpar performance leads us to not consider it for our approach.
DOCUMENT
Ambient monitoring systems offer great possibilities for health trend analysis in addition to anomaly detection. Health trend analysis helps care professionals to evaluate someones functional health and direct or evaluate the choice of interventions. This paper presents one case study of a person that was followed with an ambient monitoring system for almost three years and another of a person that was followed for over a year. A simple algorithm is applied to make a location based data representation. This data is visualized for care professionals, and used for inspecting the regularity of the pattern with means of principal component analysis (PCA). This paper provides a set of tools for analyzing longitudinal behavioral data for health assessments. We advocate a standardized data collection procedure, particularly the health metrics that could be used to validate health focused sensor data analyses.
DOCUMENT
Brochure from the Inauguration of Klaas Dijkstra, professor Computer Vision and Data Science
DOCUMENT
This paper outlines an investigation into the updating of fatigue reliability through inspection data by means of structural correlation. The proposed methodology is based on the random nature of fatigue fracture growth and the probability of damage detection and introduces a direct link between predicted crack size and inspection results. A distinct focus is applied on opportunities for utilizing inspection information for the updating of both inspected and uninspected (or uninspectable) locations.
DOCUMENT