Computer Science ›› 2020, Vol. 47 ›› Issue (2): 227-232.doi: 10.11896/jsjkx.190600147

• Computer Network • Previous Articles     Next Articles

Communication Satellite Fault Detection Based on Recurrent Neural Network

LIU Yun1,2,YIN Chuan-huan1,2,HU Di3,ZHAO Tian3,LIANG Yu3   

  1. (School of Computer and Information Technology,Beijing 100044,China)1;
    (Beijing Key Laboratory of Traffic Data Analysis and Mining,Beijing 100044,China)2;
    (China Academy of Space Technology,Beijing 100094,China)3
  • Received:2019-06-26 Online:2020-02-15 Published:2020-03-18
  • About author:LIU Yun,born in 1995,postgraduate.His main research interests include machine learning and anomaly detection;YIN Chuan-huan,born in 1976,associate professor.His main research interests include SVM,machine learning and network security (intrusion detection).
  • Supported by:
    This work was supported by the Fundamental Research Funds for the Central Universities of Ministry of Education of China (2018JBZ006).

Abstract: With the rapid development of modern spaceindustry,the structure of communication satellites is becoming more and more complex,while its faults are gradually increasing,and fault detection of communication satellites has become a key issue in the current aerospace field.At present,the detection of faults by major space agencies is still based on simple upper and lower threshold’s detection.The method is too simple and can only detect a small number of specific faults.Early studies using traditional machine learning for detection can only detect faults in quantitative characteristics.Aiming at the problem that traditional machine learning algorithms are difficult to effectively learn the trend of telemetry data,this paper proposed a thresholding methodbased on long-short-time memory network.LSTM prediction model is used to learn the trend change of the satellite telemetry data,and at the same time to maximize the correlation coefficient and the F1 score,to determine the appropriate threshold for the fault determination of the multi-dimensional telemetry data.This method can effectively judge the fault by the trend of the satellite telemetry data.The experimental data is based on the 24D communication satellite telemetry data provided by a space agency for 2 years.The core model LSTM network is trained on NVIDIA GTX TITAN X.The final model accuracy is 99.34%,the precision is 81.93%,and the recall rate was 94.62%.At the same time,compared with the traditional machine learning algorithm and the LSTM-based non-threshold method,the accuracy of the model is significantly higher.The experimental results show that the LSTM network can efficiently learn the trend characteristics of satellite telemetry data.At the same time,using the appropriate method to select the threshold value,it can effectively detect the faultsof the communication satellite which successfully solve the problem of communication satellite fault detection in the aerospace field.

Key words: Fault detection, Long short-term memory Network, Machine learning, Telemetry data, Thresholding

CLC Number: 

  • TP181
[1]PENG X Y,PANG J Y,PENG Y,et al.Overview of anomaly detection of spacecraft telemetry data[J].Chinese Journal of Scientific Instrument,2016,37(9):1929-1945.
[2]GAO Y,YANG T,XU M Q,et al.An unsupervised anomaly detection approach for spacecraft based on normal behavior clustering[C]∥2012 Fifth International Conference on Intelligent Computation Technology and Automation.IEEE,2012:478-481.
[3]MUNIYANDI A P,RAJESWARI R,RAJARAM R.Network anomaly detection by cascading k-Means clustering and C4.5 decision tree algorithm[J].Procedia Engineering,2012,30:174-182.
[4]MÜNZ G,LI S,CARLE G.Traffic anomaly detection using k-means clustering[C]∥GI/ITG Workshop MMBnet.2007:13-14.
[5]ERFANI S M,RAJASEGARAR S,KARUNASEKERA S, et al.High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning[J].Pattern Recognition,2016,58:121-134.
[6]AMER M,GOLDSTEIN M,ABDENNADHER S.Enhancing one-class support vector machines for unsupervised anomaly detection[C]∥Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description.ACM,2013:8-15.
[7]GEORGE A,VIDYAPEETHAM A V.Anomaly detection based on machine learning:dimensionality reduction using PCA and classification using SVM[J].International Journal of Computer Applications,2012,47(21):5-8.
[8]MALHOTRA P,VIG L,SHROFF G,et al.Long short term memory networks for anomaly detection in time series[C]∥23rd European Symposium on Artificial Neural Networks,Computational Intelligence and Machine Learning.2015:89.
[9]NANDURI A,SHERRY L.Anomaly detection in aircraft data using Recurrent Neural Networks (RNN)[C]∥2016 Integrated Communications Navigation and Surveillance (ICNS).IEEE,2016.
[10]SHEIKHAN M,JADIDI Z,FARROKHI A.Intrusion detection using reduced-size RNN based on feature grouping[J].Neural Computing and Applications,2012,21(6):1185-1190.
[11]BONTEMPS L,MCDERMOTT J,LE-KHAC N A.Collective anomaly detection based on long short-term memory recurrent neural networks[C]∥International Conference on Future Data and Security Engineering.Cham:Springer,2016:141-152.
[12]MALHOTRA P,RAMAKRISHNAN A,ANAND G,et al. LSTM-based encoder-decoder for multi-sensor anomaly detection[J].arXiv:1607.00148,2016.
[13]CHENG M,XU Q,LV J,et al.MS-LSTM:A multi-scale LSTM model for BGP anomaly detection[C]∥2016 IEEE 24th International Conference on Network Protocols (ICNP).IEEE,2016:1-6.
[14]HUNDMAN K,CONSTANTINOU V,LAPORTE C,et al.Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding[C]∥Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mi-ning.ACM,2018:387-395.
[15]HOCHREITER S,SCHMIDHUBER J.Long short-term memory[J].Neural Computation,1997,9(8):1735-1780.
[16]CHANDOLA V,BANERJEE A,KUMAR V.Anomaly detec-tion:A survey[J].ACM computing surveys (CSUR),2009,41(3):15.
[17]GOLDSTEIN M,UCHIDA S.A comparative evaluation of unsupervise danomaly detection algorithms for multivariate data[J].PloS One,2016,11(4):e0152173.
[18]LI Q,ZHOU X S,LIN P,et al.Anomaly detection and fault diagnosis technology of spacecraft based on telemetry-mining.[C]∥2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics.IEEE,2010:233-236.
[19]ESKIN E,ARNOLD A,PRERAU M,et al.A geometric framework for unsupervised anomaly detection[M]∥Applications of data mining in computer security.Boston:Springer,MA,2002:77-101.
[20]LIU F T,TING K M,ZHOU Z H.Isolation-based anomaly detection[J].ACM Transactions on Knowledge Discovery from Data,2012,6(1):1-39.
[21]BAY S D,SCHWABACHER M.Mining distance-based outliers in near linear time with randomization and a simple pruning rule[C]∥Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2003:29-38.
[22]IVERSON D.Data mining applications for space mission operations system health monitoring[C]∥SpaceOps 2008 Confe-rence.2008:3212.
[23]KRIEGEL H P,KRÖGER P,SCHUBERT E,et al.LoOP:local outlier probabilities[C]∥Proceedings of the 18th ACM Confe-rence on Information and Knowledge Management.ACM,2009:1649-1652.
[24]PAJOUH H H,JAVIDAN R,KHAYAMI R,et al.A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks[J].IEEE Transactions on Emerging Topics in Computing,2016,7:314-323.
[25]DE VRIES T,CHAWLA S,HOULE M E.Finding local anomalies in very high dimensional space[C]∥2010 IEEE InternationalConference on Data Mining.IEEE,2010:128-137.
[26]CHO K,VAN MERRIËNBOER B,BAHDANAU D,et al.On the properties of neural machine translation:Encoder-decoder approaches[J].arXiv:1409.1259,2014.
[27]DUAN Y,LV Y,WANG F Y.Travel time prediction with LSTM neural network[C]∥2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC).IEEE,2016:1053-1058.
[1] LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214.
[2] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[3] LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266.
[4] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[5] ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343.
[6] HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11.
[7] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[8] WANG Shan, XU Chu-yi, SHI Chun-xiang, ZHANG Ying. Study on Cloud Classification Method of Satellite Cloud Images Based on CNN-LSTM [J]. Computer Science, 2022, 49(6A): 675-679.
[9] LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92.
[10] ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99.
[11] WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789.
[12] XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406.
[13] YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515.
[14] XU Jie, ZHU Yu-kun, XING Chun-xiao. Application of Machine Learning in Financial Asset Pricing:A Review [J]. Computer Science, 2022, 49(6): 276-286.
[15] YAO Xiao-ming, DING Shi-chang, ZHAO Tao, HUANG Hong, LUO Jar-der, FU Xiao-ming. Big Data-driven Based Socioeconomic Status Analysis:A Survey [J]. Computer Science, 2022, 49(4): 80-87.
Full text



No Suggested Reading articles found!