Skip to main content
Top
Published in: Knowledge and Information Systems 1/2016

01-04-2016 | Regular Paper

A framework for anomaly detection in maritime trajectory behavior

Author: Po-Ruey Lei

Published in: Knowledge and Information Systems | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Rapid growth in location data acquisition techniques has led to a proliferation of trajectory data related to moving objects. This large body of data has expanded the scope for trajectory research and made it applicable to a more diverse range of fields. However, data uncertainty, which is naturally inherent in the trajectory data, brings the challenge in trajectory data mining and affects the quality of the results. Specifically, unlike trajectory collected from vehicles moving along road networks, trajectory data generated by vessels moving free in maritime space have increased the difficulty of sea traffic analysis and anomalous behavior detection. Furthermore, due to the huge volume and complexity of maritime trajectory data, it is hard to define the abnormality of movement behavior and detect anomalies. Additionally, traditional analysis and evaluation by human intelligence is overloaded with the dramatic increasing in amount of maritime trajectory data and is an inefficient approach. Thus, an effective automated method for mining trajectory data and detecting anomalies would be a valuable contribution to maritime surveillance. This paper explores the maritime trajectory data for anomalous behavior detection. We propose a framework for maritime trajectory modeling and anomaly detection, called MT-MAD. Our model takes into account the fact that anomalous behavior manifests in unusual location points and sub-trajectories in the spatial domain as well as in the sequence and manner in which these locations and sub-trajectories occur. This study therefore began by identifying outlying features required for anomaly detection, including spatial, sequential, and behavioral features. We then explore the movement behavior from historical trajectories and build a maritime trajectory model for anomaly detection. The proposed model accurately describes movement behavior and captures outlying features in trajectory data. We then developed an anomaly detection algorithm based on this model in which an indicator is used to evaluate suspicious behavior and scores trajectory behavior according to the defined outlying features. Experiment results demonstrate that the proposed MT-MAD framework is capable of effectively detecting anomalies in maritime trajectories.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aggarwal C, Yu P (2001) Outlier detection for high dimensional data. In: Proceedings of the SIGMOD, pp 37–46 Aggarwal C, Yu P (2001) Outlier detection for high dimensional data. In: Proceedings of the SIGMOD, pp 37–46
2.
go back to reference Angiulli F, Fassetti F (2009) Dolphin: an efficient algorithm for mining distance-based outliers in very large datasets. Knowl Discov Data 3(1):4 Angiulli F, Fassetti F (2009) Dolphin: an efficient algorithm for mining distance-based outliers in very large datasets. Knowl Discov Data 3(1):4
3.
go back to reference Bremer R (1995) Outliers in statistical data. Technometrics 37(1):117–118CrossRef Bremer R (1995) Outliers in statistical data. Technometrics 37(1):117–118CrossRef
4.
go back to reference Breunig M, Kriegel HP, Ng, RT, Sander J (2000) Lof: identifying density-based local outliers. In: Proceedings of the SIGMOD, pp. 93–104 Breunig M, Kriegel HP, Ng, RT, Sander J (2000) Lof: identifying density-based local outliers. In: Proceedings of the SIGMOD, pp. 93–104
5.
go back to reference Bu Y, Chen L, Fu AWC, Liu D (2009) Efficient anomaly monitoring over moving object trajectory streams. In: Proceedings of the KDD, ACM, pp. 159–168 Bu Y, Chen L, Fu AWC, Liu D (2009) Efficient anomaly monitoring over moving object trajectory streams. In: Proceedings of the KDD, ACM, pp. 159–168
6.
go back to reference Ertoz L, Steinbach M, Kumar V (2003) Finding clusters of different sizes, shapes, and densities in noisy, high dimensional data. In: Proceedings of the SDM, pp. 47–58 Ertoz L, Steinbach M, Kumar V (2003) Finding clusters of different sizes, shapes, and densities in noisy, high dimensional data. In: Proceedings of the SDM, pp. 47–58
7.
go back to reference Giannotti F, Nanni M, Pedreschi D (2006) Efficient mining of temporally annotated sequences. In: Proceedings of the SDM, pp. 346–357 Giannotti F, Nanni M, Pedreschi D (2006) Efficient mining of temporally annotated sequences. In: Proceedings of the SDM, pp. 346–357
8.
go back to reference Giannotti F, Nanni M, Pinelli F, Pedreschi D (2007) Trajectory pattern mining. In: Proceedings of the KDD, pp. 330–339 Giannotti F, Nanni M, Pinelli F, Pedreschi D (2007) Trajectory pattern mining. In: Proceedings of the KDD, pp. 330–339
9.
go back to reference Guyet T, Quiniou R (2008) Mining temporal patterns with quantitative intervals. In: ICDM workshops, IEEE computer society, pp. 218–227 Guyet T, Quiniou R (2008) Mining temporal patterns with quantitative intervals. In: ICDM workshops, IEEE computer society, pp. 218–227
10.
go back to reference Jeung H, Liu Q, Shen HT, Zhou X (2008) A hybrid prediction model for moving objects. In: Proceedings of the ICDE, pp. 70–79 Jeung H, Liu Q, Shen HT, Zhou X (2008) A hybrid prediction model for moving objects. In: Proceedings of the ICDE, pp. 70–79
11.
go back to reference Jeung H, Shen HT, Zhou X (2007) Mining trajectory patterns using hidden Markov models. In: Proceedings of the DaWaK, pp. 470–480 Jeung H, Shen HT, Zhou X (2007) Mining trajectory patterns using hidden Markov models. In: Proceedings of the DaWaK, pp. 470–480
12.
go back to reference Jiang Y, Zeng C, Xu J, Li T (2014) Real time contextual collective anomaly detection over multiple data streams. In: Proceedings of the ODD, pp. 23–30 Jiang Y, Zeng C, Xu J, Li T (2014) Real time contextual collective anomaly detection over multiple data streams. In: Proceedings of the ODD, pp. 23–30
13.
go back to reference Knorr E, Ng R, Tucakov V (2000) Distance-based outliers: algorithms and applications. VLDB J 8(3):237–253CrossRef Knorr E, Ng R, Tucakov V (2000) Distance-based outliers: algorithms and applications. VLDB J 8(3):237–253CrossRef
14.
go back to reference Laxhammar R (2008) Anomaly detection for sea surveillance. In: Proceedings of the IF, pp. 1–8 Laxhammar R (2008) Anomaly detection for sea surveillance. In: Proceedings of the IF, pp. 1–8
15.
go back to reference Lee J, Han J, Li X (2008) Trajectory outlier detection: partition-and-detect a framework. In: Proceedings of the ICDE, pp. 140–149 Lee J, Han J, Li X (2008) Trajectory outlier detection: partition-and-detect a framework. In: Proceedings of the ICDE, pp. 140–149
16.
go back to reference Lee JG, Han J, Whang KY (2007) Trajectory clustering: a partition-and-group framework. In: Proceedings of the SIGMOD, pp. 593–604 Lee JG, Han J, Whang KY (2007) Trajectory clustering: a partition-and-group framework. In: Proceedings of the SIGMOD, pp. 593–604
17.
go back to reference Lei PR, Shen TJ, Peng WC, Su IJ (2011) Exploring spatial-temporal trajectory model for location prediction. In: Proceedings of the MDM, pp. 58–67 Lei PR, Shen TJ, Peng WC, Su IJ (2011) Exploring spatial-temporal trajectory model for location prediction. In: Proceedings of the MDM, pp. 58–67
18.
go back to reference Li Z, Ding B, Han J, Kays R (2010) Swarm: mining relaxed temporal moving object clusters. In: Proceedings of the VLDB Endow, pp. 723–734 Li Z, Ding B, Han J, Kays R (2010) Swarm: mining relaxed temporal moving object clusters. In: Proceedings of the VLDB Endow, pp. 723–734
19.
go back to reference Lu EHC, Chen CY, Tseng VS (2012) Personalized trip recommendation with multiple constraints by mining user check-in behaviors. In: Proceedings of the GIS, pp. 209–218 Lu EHC, Chen CY, Tseng VS (2012) Personalized trip recommendation with multiple constraints by mining user check-in behaviors. In: Proceedings of the GIS, pp. 209–218
20.
go back to reference Monreale A., Pinelli F, Trasarti R, Giannotti F (2009) Wherenext: A location predictor on trajectory pattern mining. In: Proceedings of the KDD, pp. 637–646 Monreale A., Pinelli F, Trasarti R, Giannotti F (2009) Wherenext: A location predictor on trajectory pattern mining. In: Proceedings of the KDD, pp. 637–646
21.
go back to reference Morzy M (2007) Mining frequent trajectories of moving objects for location prediction. In: Proceedings of the MLDM, pp. 667–680 Morzy M (2007) Mining frequent trajectories of moving objects for location prediction. In: Proceedings of the MLDM, pp. 667–680
22.
go back to reference Papadimitriou S, Kitagawa H, Gibbons P, Faloutsos C (2003) Loci: Fast outlier detection using the local correlation integral. In: Proceedings of the ICDE, pp. 315–326 Papadimitriou S, Kitagawa H, Gibbons P, Faloutsos C (2003) Loci: Fast outlier detection using the local correlation integral. In: Proceedings of the ICDE, pp. 315–326
23.
go back to reference Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large data sets. In: Proceedings of the SIGMOD, pp. 427–438 Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large data sets. In: Proceedings of the SIGMOD, pp. 427–438
24.
go back to reference Ristic B, La Scala B, Morelande M, Gordon N (2008) Statistical analysis of motion patterns in ais data: Anomaly detection and motion prediction. In: Proceedings of the IF, pp. 1–7 Ristic B, La Scala B, Morelande M, Gordon N (2008) Statistical analysis of motion patterns in ais data: Anomaly detection and motion prediction. In: Proceedings of the IF, pp. 1–7
25.
go back to reference Ron D, Singer Y, Tishby N (1996) The power of amnesia: learning probabilistic automata with variable memory length. Machine learn 25(2):117–149CrossRefMATH Ron D, Singer Y, Tishby N (1996) The power of amnesia: learning probabilistic automata with variable memory length. Machine learn 25(2):117–149CrossRefMATH
26.
go back to reference Shie BE, Hsiao HF, Tseng V (2013) Efficient algorithms for discovering high utility user behavior patterns in mobile commerce environments. Knowl Inf Syst 37(2):363–387CrossRef Shie BE, Hsiao HF, Tseng V (2013) Efficient algorithms for discovering high utility user behavior patterns in mobile commerce environments. Knowl Inf Syst 37(2):363–387CrossRef
27.
go back to reference Sun P, Chawla S, Arunasalam B (2006) Mining for outliers in sequential databases. In: Proceedings of the SDM, pp. 94–106 Sun P, Chawla S, Arunasalam B (2006) Mining for outliers in sequential databases. In: Proceedings of the SDM, pp. 94–106
28.
go back to reference Tsai H, Yang D, Peng W, Chen M (2007) Exploring group moving pattern for an energy-constrained object tracking sensor network. In: Proceedings of the PAKDD, pp. 825–832 Tsai H, Yang D, Peng W, Chen M (2007) Exploring group moving pattern for an energy-constrained object tracking sensor network. In: Proceedings of the PAKDD, pp. 825–832
29.
go back to reference Uddin M, Ravishankar C, Tsotras V (2011) Finding regions of interest from trajectory data. In: Proceedings of the MDM, vol. 1, pp. 39–48 Uddin M, Ravishankar C, Tsotras V (2011) Finding regions of interest from trajectory data. In: Proceedings of the MDM, vol. 1, pp. 39–48
30.
go back to reference Vespe M, Pallottaand G, Visentini I, Bryan K, Braca P (2012) Maritime trajectory mining for anomaly detection. In: Proceedings of the PRMS Vespe M, Pallottaand G, Visentini I, Bryan K, Braca P (2012) Maritime trajectory mining for anomaly detection. In: Proceedings of the PRMS
31.
go back to reference Wei LY, Peng WC, Lee WC (2013) Exploring pattern-aware travel routes for trajectory search. ACM Trans. Intell. Syst. Technol 4(3):48:1–48:25CrossRef Wei LY, Peng WC, Lee WC (2013) Exploring pattern-aware travel routes for trajectory search. ACM Trans. Intell. Syst. Technol 4(3):48:1–48:25CrossRef
32.
go back to reference Wei LY, Zheng Y, Peng WC (2012) Constructing popular routes from uncertain trajectories. In: Proceedings of the KDD, pp. 195–203 Wei LY, Zheng Y, Peng WC (2012) Constructing popular routes from uncertain trajectories. In: Proceedings of the KDD, pp. 195–203
33.
go back to reference Xue AY, Zhang R, Zheng Y, Xie X, Huang J, Xu Z (2013) Destination prediction by sub-trajectory synthesis and privacy protection against such prediction. In: Proceedings of the ICDM Xue AY, Zhang R, Zheng Y, Xie X, Huang J, Xu Z (2013) Destination prediction by sub-trajectory synthesis and privacy protection against such prediction. In: Proceedings of the ICDM
34.
go back to reference Yuan J, Zheng Y, Xie X (2012) Discovering regions of different functions in a city using human mobility and pois. In: Proceedings. of the KDD, pp. 186–194 Yuan J, Zheng Y, Xie X (2012) Discovering regions of different functions in a city using human mobility and pois. In: Proceedings. of the KDD, pp. 186–194
35.
go back to reference Yuan J, Zheng Y, Xie X, Sun G (2011) Driving with knowledge from the physical world. In: Proceedings of the KDD, pp. 316–324 Yuan J, Zheng Y, Xie X, Sun G (2011) Driving with knowledge from the physical world. In: Proceedings of the KDD, pp. 316–324
36.
go back to reference Zhang D, Li N, Zhou Z, Chen C, Sun L, Li S (2011) Ibat: detecting anomalous taxi trajectories from gps traces. In: Proceedings of the Ubicom, pp. 99–108 Zhang D, Li N, Zhou Z, Chen C, Sun L, Li S (2011) Ibat: detecting anomalous taxi trajectories from gps traces. In: Proceedings of the Ubicom, pp. 99–108
Metadata
Title
A framework for anomaly detection in maritime trajectory behavior
Author
Po-Ruey Lei
Publication date
01-04-2016
Publisher
Springer London
Published in
Knowledge and Information Systems / Issue 1/2016
Print ISSN: 0219-1377
Electronic ISSN: 0219-3116
DOI
https://doi.org/10.1007/s10115-015-0845-4

Other articles of this Issue 1/2016

Knowledge and Information Systems 1/2016 Go to the issue

Premium Partner