{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:05:53Z","timestamp":1760234753936,"version":"build-2065373602"},"reference-count":16,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Isabel Praca","award":["SPET\u2013PTDC\/EEI-EEE\/029165\/2017"],"award-info":[{"award-number":["SPET\u2013PTDC\/EEI-EEE\/029165\/2017"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The biggest problem with conventional anomaly signal detection using features was that it was difficult to use it in real time and it requires processing of network signals. Furthermore, analyzing network signals in real-time required vast amounts of processing for each signal, as each protocol contained various pieces of information. This paper suggests anomaly detection by analyzing the relationship among each feature to the anomaly detection model. The model analyzes the anomaly of network signals based on anomaly feature detection. The selected feature for anomaly detection does not require constant network signal updates and real-time processing of these signals. When the selected features are found in the received signal, the signal is registered as a potential anomaly signal and is then steadily monitored until it is determined as either an anomaly or normal signal. In terms of the results, it determined the anomaly with 99.7% (0.997) accuracy in f(4)(S0) and in case f(4)(REJ) received 11,233 signals with a normal or 171anomaly judgment accuracy of 98.7% (0.987).<\/jats:p>","DOI":"10.3390\/s21124237","type":"journal-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T13:29:58Z","timestamp":1624282198000},"page":"4237","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Influence of Features on Accuracy of Anomaly Detection for an Energy Trading System"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4604-1735","authenticated-orcid":false,"given":"Hoon","family":"Ko","sequence":"first","affiliation":[{"name":"Instituto Superior de Engenharia do Porto, Instituto Politecnico do Porto, R. Dr. Antonio Bernardino de Almeida, 431, 4249-015 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5210-9601","authenticated-orcid":false,"given":"Kwangcheol","family":"Rim","sequence":"additional","affiliation":[{"name":"College of Basic & General Education, Chosun University, 309 Pilmundae-ro, Dong-Gu, Gwangju 61452, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[{"name":"Instituto Superior de Engenharia do Porto, Instituto Politecnico do Porto, R. Dr. Antonio Bernardino de Almeida, 431, 4249-015 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ko, H., and Praca, I. (2021). Design of a Secure Energy Trading Model Based on a Blockchain. Sustainability, 13.","key":"ref_1","DOI":"10.3390\/su13041634"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TSG.2020.3010230","article-title":"Intrusion Detection for Cybersecurity of Smart Meters","volume":"12","author":"Sun","year":"2020","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"4921","DOI":"10.1109\/JIOT.2019.2893866","article-title":"From cloud down to things: An overview of machine learning in internet of things","volume":"6","author":"Samie","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"4829","DOI":"10.1109\/JIOT.2018.2846040","article-title":"Securing the internet of things in the age of machine learning and software-defined networking","volume":"5","author":"Restuccia","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e1306","DOI":"10.1002\/widm.1306","article-title":"Machine learning in cybersecurity: A review","volume":"9","author":"Handa","year":"2019","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"ref_6","first-page":"311","article-title":"Machine learning and deep learning techniques on wireless networks","volume":"12","author":"Sarao","year":"2019","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","article-title":"A survey of intrusion detection in Internet of Things","volume":"84","author":"Miani","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Alabadi, M., and Celik, Y. (2020, January 26\u201328). Anomaly Detection for Cyber-Security Based on Convolution Neural Network: A survey. Proceedings of the 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey.","key":"ref_8","DOI":"10.1109\/HORA49412.2020.9152899"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"12103","DOI":"10.1109\/ACCESS.2018.2805680","article-title":"A survey on security threats and defensive techniques of machine learning: A data driven view","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","article-title":"Machine learning and deep learning methods for cybersecurity","volume":"6","author":"Xin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"496376","DOI":"10.1155\/2014\/496376","article-title":"Adaptive EWMA Method based on abnormal network traffic for LDoS attacks","volume":"2014","author":"Tang","year":"2014","journal-title":"Math. Probl. Eng."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.apenergy.2014.10.055","article-title":"Urban energy consumption: Different insights from energy flow analysis, input\u2014Output analysis and ecological network analysis","volume":"138","author":"Chen","year":"2015","journal-title":"Appl. Energy"},{"doi-asserted-by":"crossref","unstructured":"Kotenko, I., Saenko, I., Lauta, O., and Kribel, A. (2020). An Approach to Detecting Cyber Attacks against Smart Power Grids Based on the Analysis of Network Traffic Self-Similarity. Energies, 13.","key":"ref_13","DOI":"10.3390\/en13195031"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/79.671131","article-title":"Obtaining order in a world of chaos [signal processing]","volume":"15","author":"Abarbanel","year":"1998","journal-title":"IEEE Signal Process. Mag."},{"doi-asserted-by":"crossref","unstructured":"Pedraza, A., Deniz, O., and Bueno, G. (2020). Approaching Adversarial Example Classification with Chaos Theory. Entropy, 22.","key":"ref_15","DOI":"10.3390\/e22111201"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s10994-014-5473-9","article-title":"Analysis of network traffic features for anomaly detection","volume":"101","author":"Iglesias","year":"2015","journal-title":"Mach. Learn."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/12\/4237\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:19:59Z","timestamp":1760163599000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/12\/4237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":16,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["s21124237"],"URL":"https:\/\/doi.org\/10.3390\/s21124237","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,6,21]]}}}