Computer Science ›› 2020, Vol. 47 ›› Issue (2): 227-232.doi: 10.11896/jsjkx.190600147

• Computer Network • Previous Articles     Next Articles

Communication Satellite Fault Detection Based on Recurrent Neural Network

LIU Yun1,2,YIN Chuan-huan1,2,HU Di3,ZHAO Tian3,LIANG Yu3   

  1. (School of Computer and Information Technology,Beijing 100044,China)1;
    (Beijing Key Laboratory of Traffic Data Analysis and Mining,Beijing 100044,China)2;
    (China Academy of Space Technology,Beijing 100094,China)3
  • Received:2019-06-26 Online:2020-02-15 Published:2020-03-18
  • About author:LIU Yun,born in 1995,postgraduate.His main research interests include machine learning and anomaly detection;YIN Chuan-huan,born in 1976,associate professor.His main research interests include SVM,machine learning and network security (intrusion detection).
  • Supported by:
    This work was supported by the Fundamental Research Funds for the Central Universities of Ministry of Education of China (2018JBZ006).

Abstract: With the rapid development of modern spaceindustry,the structure of communication satellites is becoming more and more complex,while its faults are gradually increasing,and fault detection of communication satellites has become a key issue in the current aerospace field.At present,the detection of faults by major space agencies is still based on simple upper and lower threshold’s detection.The method is too simple and can only detect a small number of specific faults.Early studies using traditional machine learning for detection can only detect faults in quantitative characteristics.Aiming at the problem that traditional machine learning algorithms are difficult to effectively learn the trend of telemetry data,this paper proposed a thresholding methodbased on long-short-time memory network.LSTM prediction model is used to learn the trend change of the satellite telemetry data,and at the same time to maximize the correlation coefficient and the F1 score,to determine the appropriate threshold for the fault determination of the multi-dimensional telemetry data.This method can effectively judge the fault by the trend of the satellite telemetry data.The experimental data is based on the 24D communication satellite telemetry data provided by a space agency for 2 years.The core model LSTM network is trained on NVIDIA GTX TITAN X.The final model accuracy is 99.34%,the precision is 81.93%,and the recall rate was 94.62%.At the same time,compared with the traditional machine learning algorithm and the LSTM-based non-threshold method,the accuracy of the model is significantly higher.The experimental results show that the LSTM network can efficiently learn the trend characteristics of satellite telemetry data.At the same time,using the appropriate method to select the threshold value,it can effectively detect the faultsof the communication satellite which successfully solve the problem of communication satellite fault detection in the aerospace field.

Key words: Telemetry data, Fault detection, Machine learning, Long short-term memory Network, Thresholding

CLC Number: 

  • TP181
[1]PENG X Y,PANG J Y,PENG Y,et al.Overview of anomaly detection of spacecraft telemetry data[J].Chinese Journal of Scientific Instrument,2016,37(9):1929-1945.
[2]GAO Y,YANG T,XU M Q,et al.An unsupervised anomaly detection approach for spacecraft based on normal behavior clustering[C]∥2012 Fifth International Conference on Intelligent Computation Technology and Automation.IEEE,2012:478-481.
[3]MUNIYANDI A P,RAJESWARI R,RAJARAM R.Network anomaly detection by cascading k-Means clustering and C4.5 decision tree algorithm[J].Procedia Engineering,2012,30:174-182.
[4]MÜNZ G,LI S,CARLE G.Traffic anomaly detection using k-means clustering[C]∥GI/ITG Workshop MMBnet.2007:13-14.
[5]ERFANI S M,RAJASEGARAR S,KARUNASEKERA S, et al.High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning[J].Pattern Recognition,2016,58:121-134.
[6]AMER M,GOLDSTEIN M,ABDENNADHER S.Enhancing one-class support vector machines for unsupervised anomaly detection[C]∥Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description.ACM,2013:8-15.
[7]GEORGE A,VIDYAPEETHAM A V.Anomaly detection based on machine learning:dimensionality reduction using PCA and classification using SVM[J].International Journal of Computer Applications,2012,47(21):5-8.
[8]MALHOTRA P,VIG L,SHROFF G,et al.Long short term memory networks for anomaly detection in time series[C]∥23rd European Symposium on Artificial Neural Networks,Computational Intelligence and Machine Learning.2015:89.
[9]NANDURI A,SHERRY L.Anomaly detection in aircraft data using Recurrent Neural Networks (RNN)[C]∥2016 Integrated Communications Navigation and Surveillance (ICNS).IEEE,2016.
[10]SHEIKHAN M,JADIDI Z,FARROKHI A.Intrusion detection using reduced-size RNN based on feature grouping[J].Neural Computing and Applications,2012,21(6):1185-1190.
[11]BONTEMPS L,MCDERMOTT J,LE-KHAC N A.Collective anomaly detection based on long short-term memory recurrent neural networks[C]∥International Conference on Future Data and Security Engineering.Cham:Springer,2016:141-152.
[12]MALHOTRA P,RAMAKRISHNAN A,ANAND G,et al. LSTM-based encoder-decoder for multi-sensor anomaly detection[J].arXiv:1607.00148,2016.
[13]CHENG M,XU Q,LV J,et al.MS-LSTM:A multi-scale LSTM model for BGP anomaly detection[C]∥2016 IEEE 24th International Conference on Network Protocols (ICNP).IEEE,2016:1-6.
[14]HUNDMAN K,CONSTANTINOU V,LAPORTE C,et al.Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding[C]∥Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mi-ning.ACM,2018:387-395.
[15]HOCHREITER S,SCHMIDHUBER J.Long short-term memory[J].Neural Computation,1997,9(8):1735-1780.
[16]CHANDOLA V,BANERJEE A,KUMAR V.Anomaly detec-tion:A survey[J].ACM computing surveys (CSUR),2009,41(3):15.
[17]GOLDSTEIN M,UCHIDA S.A comparative evaluation of unsupervise danomaly detection algorithms for multivariate data[J].PloS One,2016,11(4):e0152173.
[18]LI Q,ZHOU X S,LIN P,et al.Anomaly detection and fault diagnosis technology of spacecraft based on telemetry-mining.[C]∥2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics.IEEE,2010:233-236.
[19]ESKIN E,ARNOLD A,PRERAU M,et al.A geometric framework for unsupervised anomaly detection[M]∥Applications of data mining in computer security.Boston:Springer,MA,2002:77-101.
[20]LIU F T,TING K M,ZHOU Z H.Isolation-based anomaly detection[J].ACM Transactions on Knowledge Discovery from Data,2012,6(1):1-39.
[21]BAY S D,SCHWABACHER M.Mining distance-based outliers in near linear time with randomization and a simple pruning rule[C]∥Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2003:29-38.
[22]IVERSON D.Data mining applications for space mission operations system health monitoring[C]∥SpaceOps 2008 Confe-rence.2008:3212.
[23]KRIEGEL H P,KRÖGER P,SCHUBERT E,et al.LoOP:local outlier probabilities[C]∥Proceedings of the 18th ACM Confe-rence on Information and Knowledge Management.ACM,2009:1649-1652.
[24]PAJOUH H H,JAVIDAN R,KHAYAMI R,et al.A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks[J].IEEE Transactions on Emerging Topics in Computing,2016,7:314-323.
[25]DE VRIES T,CHAWLA S,HOULE M E.Finding local anomalies in very high dimensional space[C]∥2010 IEEE InternationalConference on Data Mining.IEEE,2010:128-137.
[26]CHO K,VAN MERRIËNBOER B,BAHDANAU D,et al.On the properties of neural machine translation:Encoder-decoder approaches[J].arXiv:1409.1259,2014.
[27]DUAN Y,LV Y,WANG F Y.Travel time prediction with LSTM neural network[C]∥2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC).IEEE,2016:1053-1058.
[1] ZHANG Yu-shuai, ZHAO Huan, LI Bo. Semantic Slot Filling Based on BERT and BiLSTM [J]. Computer Science, 2021, 48(1): 247-252.
[2] LI Yin, LI Bi-xin. Memory Leak Test Acceleration Based on Script Prediction and Reconstruction [J]. Computer Science, 2020, 47(9): 31-39.
[3] DING Yu, WEI Hao, PAN Zhi-song, LIU Xin. Survey of Network Representation Learning [J]. Computer Science, 2020, 47(9): 52-59.
[4] SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya. NFV Memory Resource Management in 5G Communication Network [J]. Computer Science, 2020, 47(9): 246-251.
[5] WANG Hui, LE Zi-chun, GONG Xuan, WU Yu-kun, ZUO Hao. Review of Link Prediction Methods Based on Feature Classification [J]. Computer Science, 2020, 47(8): 302-312.
[6] YUAN Ye, HE Xiao-ge, ZHU Ding-kun, WANG Fu-lee, XIE Hao-ran, WANG Jun, WEI Ming-qiang, GUO Yan-wen. Survey of Visual Image Saliency Detection [J]. Computer Science, 2020, 47(7): 84-91.
[7] PENG Wei, HU Ning and HU Jing-Jing. Overview of Research on Image Steganalysis Algorithms [J]. Computer Science, 2020, 47(6A): 325-331.
[8] BAO Zhen-shan, GUO Jun-nan, XIE Yuan and ZHANG Wen-bo. Model for Stock Price Trend Prediction Based on LSTM and GA [J]. Computer Science, 2020, 47(6A): 467-473.
[9] ZHU Lin-li, HUA Gang, GAO Wei. Stability Analysis of Ontology Learning Algorithm in Decision Graph Setting [J]. Computer Science, 2020, 47(5): 43-50.
[10] JIAN Song-lei, LU Kai. Survey on Representation Learning of Complex Heterogeneous Data [J]. Computer Science, 2020, 47(2): 1-9.
[11] LIU Miao-miao,HU Qing-cui,GUO Jing-feng,CHEN Jing. Survey of Link Prediction Algorithms in Signed Networks [J]. Computer Science, 2020, 47(2): 21-30.
[12] YANG Li, MA Jia-jia, JIANG Hua-xi, MA Xiao-xiao, LIANG Geng, ZUO Chun. Requirements Modeling and Decision-making for Machine Learning Systems [J]. Computer Science, 2020, 47(12): 42-49.
[13] WANG Ying, ZHENG Li-wei, ZHANG Yu-yao, ZHANG Xiao-yun. Software Requirement Mining Method for Chinese APP User Review Data [J]. Computer Science, 2020, 47(12): 56-64.
[14] GUO Mao-zu, YANG Shuai, ZHAO Ling-ling. Transcriptome Analysis Method Based on RNA-Seq [J]. Computer Science, 2020, 47(11A): 35-39.
[15] JING Li, LI Man-man, HE Ting-ting. Sentiment Classification of Network Reviews Combining Extended Dictionary and Self-supervised Learning [J]. Computer Science, 2020, 47(11A): 78-82.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .