A Toolbox for Realtime Timeseries Anomaly Detection
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216208%3A11320%2F20%3A10422606" target="_blank" >RIV/00216208:11320/20:10422606 - isvavai.cz</a>
Result on the web
<a href="https://doi.org/10.1109/ICSA-C50368.2020.00053" target="_blank" >https://doi.org/10.1109/ICSA-C50368.2020.00053</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/ICSA-C50368.2020.00053" target="_blank" >10.1109/ICSA-C50368.2020.00053</a>
Alternative languages
Result language
angličtina
Original language name
A Toolbox for Realtime Timeseries Anomaly Detection
Original language description
Software architecture practice relies more and more on data-driven decision-making. Data-driven decisions are taken either by humans or by software agents via analyzing streams of timeseries data coming from different running systems. Since the quality of sensed data influences the analysis and subsequent decision-making, detecting data anomalies is an important and necessary part of any data analysis and data intelligence pipeline (such as those typically found in smart and self-adaptive systems). Although a number of data science libraries exist for timeseries anomaly detection, it is both time consuming and hard to plug realtime anomaly detection functionality in existing pipelines. The problem lies with the boilerplate code that needs to be provided for common tasks such as data ingestion, data transformation and preprocessing, invoking of model re-training when needed, and persisting of identified anomalies so that they can be acted upon or further analysed. In response, we created a toolbox for realtime anomaly detection that automates the above common tasks and modularizes the anomaly detection process in a number of clearly defined components. This serves as a plug-in solution for architecting and development of smart systems that have to adapt their behavior at runtime. In this paper, we describe the microservice architecture used by our toolbox and explain how to deploy it for obtaining an out-of-the-box solution for realtime anomaly detection out of ready-to-use components. We also provide an initial assessment of its performance.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
<a href="/en/project/GC20-24814J" target="_blank" >GC20-24814J: FluidTrust – Enabling trust by fluid access control to data and physical resources in Industry 4.0 systems</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2020
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2020)
ISBN
978-1-72817-415-0
ISSN
—
e-ISSN
—
Number of pages
4
Pages from-to
278-281
Publisher name
IEEE
Place of publication
NEW YORK
Event location
Salvador, Brazil
Event date
Mar 16, 2020
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000587897600046