Figure 8: Labeled anomaly regions. 
The next step was to apply a thresholding 
method in order to identify regions with faulty 
signals. The value of the threshold is determined in 
this case automatically from the histogram of the C1 
values: the threshold value is the lowest point of a 
„valley” that separate the normal and abnormal c1 
values. Figure 8 shows the final result with the 
labeled values. 
4 CONCLUSIONS 
This paper showed that anomaly detection methods 
may be derived from a system identification method. 
The first example considered a system that may be 
described with a first order differential equation. The 
coefficients a and b of the discrete equation show 
variations that can be exploited for anomaly 
detection. The second example considered a system 
where the input signal is not known. In this case an 
autoregression model was computed. Again, one of 
the coefficients of the discrete formula could be used 
for anomaly detection. 
In both cases the actual sequence of processing 
steps needed for an accurate detection had to be 
adjusted with the specific characteristics of the 
analyzed system.  So, from this point of view a 
single method cannot be generally applied to any 
real-life problems. But, with some adjustments the 
proposed method may solve a wider range of 
applications. 
As it was demonstrated, the proposed anomaly 
detection method can detect slight changes in the 
behavior of a given system, that can be interpreted 
as anomalies and which may not be detected by 
more traditional methods or even by a human 
observer. The proposed method also eliminate false 
anomaly alerts which are caused by significant 
changes in the input signal that affect also the 
output; usually other anomaly methods ignore the 
input signal and its effect on the output signal.  
The proposed method is rather simple and may 
be implemented on embedded devices with limited 
computing or storage capabilities, such as 
microcontrollers or DSPs. It is also recommended 
for on-line anomaly detection. 
As future work, we intend to apply pattern 
recognition and classification methods (e.g. neural 
networks and SVM) on the graph of the computed 
model coefficients in order to discriminate between 
normal and abnormal system behaviors.   
ACKNOWLEDGMENT 
The results presented in this paper were obtained 
with the support of the Technical University of Cluj-
Napoca through the research Contract no. 
1995/12.07.2017, Internal Competition CICDI-2017. 
REFERENCES 
Barnett, V. and Lewis, T., 1994 Outliers in Statistical 
Data, New York: John Wiley Sons. 
Chandola, V., Banerjee, A., Kumar, V., 2009. Anomaly 
Detection: A Survey ACM Computing Surveys 41, 3. 
Estevez-Tapiador, J. M., Garcia-Teodoro, P., Diaz-
Verdejo, J. E., 2014 Anomaly detection methods in 
wired networks: a survey and taxonomy, Computer 
Communications, volume 27 
Rassam, M. A.; Zainal, A.; Maarof, M. A., 2013 
Advancements of Data Anomaly Detection Research 
in  Wireless Sensor Networks: A Survey and Open 
Issues. Sensors, 13, 10087-10122. 
Agrawal, S., Agrawal, J., 2015 Survey on Anomaly 
Detection using Data Mining Techniques, 19th 
International Conference on Knowledge Based and 
Intelligent Information and Engineering Systems, ed. 
Elsevier, Procedia Computer Science 60, 708 713 
Gupta, M., Gao, J., Aggarwal, C. C., Han, J., 2014 Outlier 
Detection for Temporal Data: A Survey, IEEE 
Transactions On Knowledge And Data Engineering, 
vol. 25, no. 1 
Cateni, S., Colla, V. and Vannucci, M., 2008 Outlier 
Detection Methods for Industrial Applications, chapter 
in book “Advances in Robotics, Automation and 
Control”, book edited by Jesus Aramburo and Antonio 
Ramirez Trevino, ISBN 978-953-7619-16-9 
Zhang Y., Meratnia N., and Havinga P., 2010 Outlier 
Detection Techniques for Wireless Sensor Networks: 
A Survey, IEEE Communications Surveys and 
Tutorials, vol. 12, no. 2.