Professional Documents
Culture Documents
Dani 2015
Dani 2015
Monitoring System
Mohamed Cherif DANI Cassiano FREIXO François-Xavier JOLLOIS
Airbus Airbus Paris Descartes University
LIPADE Descartes University Toulouse, 31707 Paris, 75005
0033-561 933-333 0033-561 933-333 0033-017-653-4827
mohamed-cherif.dani@airbus.com cassiano.freixo@airbus.com francois-xavier.jollois@parisdescartes.fr
Mohamed NADIF
Paris Descartes University
Paris, 75005
0033-183-945-808
mohamed.nadif@parisdescartes.fr
Abstract—Anomaly detection is an important field for the an- gistic data, maintenance reports, sensors, etc.) implies a high
ticipation of aircraft maintenance operations, working as an complexity of understanding and improving the maintenance
enabler of diagnostic and prognostic functions. A method has process, the vast majority of airlines are limited to look back
been implemented to detect abnormal data in Aircraft Condi- for the cause of the failure that already happened. ACMS uses
tion Monitoring System (ACMS) records. Rather than using predefined conditions (triggers, also known as exceedance
already known and usual detection triggers which are partial
detectors and insensitive to new flight and system conditions, detection) to detect incident (anomalies). A priori knowledge
this method automatically extracts abnormal data points with- of the system is required and a list of parameters with the
out requiring any a priori information about the system and its characteristics of each parameter needs to be specified in ad-
conditions. To accomplish this objective, we propose to combine vance by the expert (system designer, maintenance engineer,
a segmentation based and density clustering approaches for etc), or by airlines to program effective triggers, but in some
detecting and filtering anomalies. This method was applied on cases the triggers are not reliable, for example, the Rotary
A340 ACMS data recordings. The detection logics associated Variable Differential Transducer sensor measures the position
with the new anomalies can be used as new detection conditions of the nose wheels during steering operation. This sensor
to be potentially implemented onboard, further extending legacy could change behavior unexpectedly after a maintenance
detection capabilities.
action, water accumulation, sensor problems, etc., resulting
unverified triggers or continuous false alarm.
1
The Kmeans algorithm is commonly used on several times are generated and data are recorded. The ACMS Reports are
for detection anomalies, depending on the domain area (fraud the basis for the aircraft monitoring function, which collect
detection, intrusion, aerospace, etc.). Several case studies and parameters upon detection of predefined system conditions.
reviews have been proposed. For instance, Gerhard [10] built These can be either very typical conditions (e.g. for per-
normal and abnormal clusters and then computes the mini- formance monitoring used for trend reports) or abnormal
mum distance between new arrival points and cluster centers. conditions (event reports for trouble shooting), to support
Gupta [11] used also Kmeans PCA-based similarity measures system performance trending, assessment and/or to get in-
for multivariate time series anomaly detection, minimum advance indications of incipient system failures.
information about data are required to be able to distinguish
between abnormal and normal data. In such approaches all
data points should belong to a cluster.
The Symbolic Aggregate approXimation (SAX) [12], based
on symbolic representation of a time series, is used by many
algorithms for anomaly detection and unusual time series
subsequence. In order to find the most distant subsequence,
the algorithm maps all segments produced by PAA algorithm
[13], replaces segments by symbols (alphabet) and then mea-
sures the distance between symbols, in order to find the most
distant subsequences.
Time series
The analysis in time series data inspects the irregularities f1 t111 . . . t11w ...... tm m
11 . . . t1w
across the time. The nature of data and anomalies define the .. ..
approach to apply. Two main types of anomaly detection for . .
time series exist in data mining community. The single time fx t1x1 . . . t1xw ...... tm m
series also known as univariate time series and multivariate x1 . . . txw
time series. .. ..
. .
A Single time series T = t1 , . . . , tm (univariate time series) .. ..
is a set of observations recorded sequentially over equal time . .
increments, for example a financial time series or sensors
data. In the aircraft single time series corresponds to data fn t1n1 . . . t1nw ...... tm
n1 . . . tm
mw
coming from single sensor. Multivariate time series is a set
of single time series generated simultaneously with the same
time range. Table 1. Data representation.
4. A NOMALY DETECTION
Anomaly detection consists in detecting abnormal data that
do not belong with normal behavior. We noticed that most
of measured parameters in ACMS have the same behavior.
In fact, data that recur for several flights will be clustered as Figure 9. dimension representation of DBSCAN with
normal. eps=0.5 (outliers = non colored data, clusters = colors).
The approach that we propose is performed in two stages. We
summarize data by the segmentation approach proposed in
section 3, where each segment contains a value that represents We used PCA (Principal component analysis) for visualizing
the original data. we transfer then the problem of collective clusters. Technically the majority of data belong to the
detection (subsequences) to point anomaly detection. DB- normal groups, since the sensor is supposed to have a normal
SCAN is applied to the parameters of the same type only. We behavior. We have an efficient results when the number of
5
flights is high. Otherwise, we are confronted to huge number Detection Using K-Means Clustering,
of false alarms when we don’t have enough flight data. In [11] M. Gupta, H. C., A. B. Sharma, Jiang, G. (2013). Con-
the figure the uncolored segments do not belong to any of the text aware time series anomaly detection for complex
normal cluster. systems.
[12] Eamonn Keogh, Jessica Lin, Ada Fu, HOT SAX: Find-
ing the Most Unusual Time Series Subsequence: Algo-
rithms and Applications, ICDM ’05 Proceedings of the
5. CONCLUSION Fifth IEEE International Conference on Data Mining.
The approach that we applied was more sensitive to abnormal [13] Kulahcioglu B., Ozdemir S., Kumova B.I., Application
sequences then other types of anomalies. In our approach we of Symbolic Piecewise Aggregate Approximation (PAA)
assume that normal data have generally the same behaviors Analysis to ECG Signals, The 17th IASTED Interna-
and normal patterns are frequently repetitive from a flight tional Conference on Applied Simulation and Modelling
to other. Given the enormous amount of generated data (ASM 2008) .
containing noise and incomplete data, we used segmentation
approach to simplify the data. APCA with a slight adjustment [14] M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, A density-
was the perfect candidate. Clustering time execution is better based algorithm for discovering clusters in large spatial
using segmentation data than real data. databases with noise, in Proceedings of the 2nd Inter-
national Conference on Knowledge Discovery and Data
With our approach, the potential anomalies are more visible, mining, 1996, pp. 226231.
and the times series are easier to manipulate and visualize. [15] Keogh, E., Chakrabarti, K., Pazzani, M. Mehrotra, S.
The visualization tool helps experts to decide whether each (2001). Locally adaptive dimensionality reduction for
anomaly should be programmed or not, with the possibility indexing large time series databases. In proceedings of
to score or penalize the detection. Then a data base is ACM SIGMOD Conference on Management of Data,
updated, which will allow us to test new algorithms and other May. pp 151-162
approaches.
R EFERENCES B IOGRAPHY [
[1] Manish Gupta and Jing Gao and Charu C. Aggarwal
and Jiawei Han, Outlier Detection for Temporal Data: A Mohamed Cherif DANI Airbus R&D
Survey, 201. engineer in machine learning and e-ops
[2] Chandola, V., Banerjee, A., Kumar, V. (2009). Anomaly maintenance. He received in 2012 a
detection: A survey ACM Computing Surveys, 41(3), 15. master degree in computer science from
Paris Descartes university. He works
[3] Lishuai Li and R. John Hansman, Anomaly detection in actually on Embedded anomaly detec-
airline routine operations using flight data recorder data, tion and Prognostic using data driven
Report No. ICAT-2013-4 June 2013 techniques. In collaboration with Paris
[4] A. N. Srivastava S. Budalakoti and M. E. Otey. Anomaly Descartes University, he is preparing a
detection and diagnosis algorithms for discrete symbol thesis in the automatic and autonomous
sequences with applications to airline safety. IEEE Trans- detection of anomalies in Aircraft.
actions on Systems, Man, and Cybernetics, Part C: Ap-
plications, 39:101113, Jan 2009.
Cassiano FREIXO Prognostic and
[5] C. Brodley et al. T. Lane. Sequence matching and learn- Health Management Expert, Airbus.
ing in anomaly detection for computer security. In AAAI His current research activities include
Workshop: AI Approaches to Fraud Detection and Risk Aeronautical Maintenance, Prognostic
Management, page4349, 1997. Health Monitoring, Maintenance De-
[6] Santanu Das, Bryan L. Matthews, Ashok N. Srivastava, cision Support and Ground Informa-
and Nikunj C. Oza. 2010. Multiple kernel learning for tion Tools (BITE/CMS, MEL). He has
heterogeneous anomaly detection: algorithm and avia- more than seven years of experience in
tion safety case study. In Proceedings of the 16th ACM Technology and Product Development
SIGKDD international conference on Knowledge discov- (Loads Design, Operational Loads Mon-
ery and data mining (KDD ’10). ACM, New York. itoring, Structural Health Monitoring, Prognostic and Health
Monitoring) with Embraer.
[7] B. Scholkopf, J. C. Platt, J. Shawe-taylor, A. J.Smola
and R. C. Williamson, Estimating the Support of a High-
Dimensional Distribution, 2001, Vol. 13, No.7, Neural
Computation, issn 0899-7667, MIT Press, Cambridge,
MA, USA, pages 14431471.
[8] Stan Salvador and Philip Chan and John Brodie, Learning
States and Rules for Time Series Anomaly Detection,
2003.
[9] Stan Salvador and Philip Chan, Determining the num-
ber of clusters/segments in hierarchical clustering-
segmentation algorithm, 2003
[10] Gerhard Munz, Sa Li, Georg Carle, Traffic Anomaly
6
François-Xavier Jollois FX Jollois is an
assistant professor in Computer Science,
at University Paris Descartes, since
September 2004. His research concerns
unsupervised learning, especially clus-
tering, with mixture models approach on
binary, categorical and numerical data.
He uses EM algorithm and its derivative
(CEM, SEM, ...)