<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Politeknik Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-9429</issn>
                                                                                            <publisher>
                    <publisher-name>Gazi University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.2339/politeknik.1379049</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Machine Learning (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Makine Öğrenme (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Anomaly Detection with Gradient Boosting Regressor on HVAC Systems</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="tr">
                                    <trans-title>HVAC Sistemlerinde Gradyan Arttırma Regresyonu ile Anomali Tespiti</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-4279-0648</contrib-id>
                                                                <name>
                                    <surname>Adak</surname>
                                    <given-names>Muhammed Fatih</given-names>
                                </name>
                                                                    <aff>SAKARYA ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-3228-7494</contrib-id>
                                                                <name>
                                    <surname>Kibar</surname>
                                    <given-names>Refik</given-names>
                                </name>
                                                                    <aff>SAKARYA UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-9859-6855</contrib-id>
                                                                <name>
                                    <surname>Ovaz</surname>
                                    <given-names>Kevser</given-names>
                                </name>
                                                                    <aff>Rochester Institute of Technology of Dubai</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20241212">
                    <day>12</day>
                    <month>12</month>
                    <year>2024</year>
                </pub-date>
                                        <volume>27</volume>
                                        <issue>6</issue>
                                        <fpage>2117</fpage>
                                        <lpage>2125</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20231020">
                        <day>10</day>
                        <month>20</month>
                        <year>2023</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20231212">
                        <day>12</day>
                        <month>12</month>
                        <year>2023</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1998, Journal of Polytechnic</copyright-statement>
                    <copyright-year>1998</copyright-year>
                    <copyright-holder>Journal of Polytechnic</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>HVAC systems are important in buildings due to their significant energy consumption, impact on indoor air quality, and role in occupant comfort. Optimizing the operation and control of these systems is crucial for improving energy efficiency and reducing costs. Anomaly detection in HVAC systems aims to optimize energy consumption, improve thermal comfort and indoor air quality, detect and isolate sensor faults, and, more importantly, detect cyber-attacks. By analyzing system data for unusual patterns or unauthorized access attempts, anomaly detection can play a vital role in safeguarding HVAC systems against cyber threats. Detecting and isolating potential cyber-attacks can prevent disruptions in building operations, protect sensitive data, and ensure the continued functionality of HVAC systems securely and reliably. In this study, Gradient Boosting Regressor is used to improve the anomaly detection capabilities of HVAC systems. Traditional anomaly detection methods often struggle to adapt to the dynamic nature of HVAC systems and may generate false alarms or miss critical issues. To address these challenges, we propose the application of Gradient Boosting Regressor, a powerful machine learning technique, to enhance anomaly detection accuracy and reliability. We evaluate the model&#039;s performance using real-world HVAC data, comparing it with existing anomaly detection methods. The results demonstrate significant improvements in the system&#039;s ability to identify anomalies accurately while minimizing false alarms. This research advances HVAC system security by providing a more robust and adaptive anomaly detection solution. Integrating Gradient Boosting Regressor into the cybersecurity framework of HVAC systems offers improved protection against cyber threats, thereby enhancing the resilience and reliability of critical infrastructures.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="tr">
                            <p>HVAC sistemleri, önemli enerji tüketimleri, iç mekan hava kalitesi üzerindeki etkileri ve bina sakinlerinin konforundaki rolleri nedeniyle binalarda büyük önem taşımaktadır. Bu sistemlerin çalışmasını ve kontrolünü optimize etmek, enerji verimliliğini artırmak ve maliyetleri düşürmek için çok önemlidir. HVAC sistemlerinde anomali tespiti, enerji tüketimini optimize etmeyi, termal konforu ve iç mekan hava kalitesini iyileştirmeyi ve sensör hatalarını tespit edip izole etmeyi, ancak daha da önemlisi siber saldırıları tespit etmeyi amaçlamaktadır. Anomali tespiti, olağandışı modeller veya yetkisiz erişim girişimleri için sistem verilerini analiz ederek, HVAC sistemlerinin siber tehditlere karşı korunmasında hayati bir rol oynayabilir. Potansiyel siber saldırıların tespit edilmesi ve izole edilmesi, bina operasyonlarındaki kesintileri önleyebilir, hassas verileri koruyabilir ve HVAC sistemlerinin güvenilir bir şekilde işlevselliğini sürdürmesini sağlayabilir. Bu çalışmada, HVAC sistemlerinin anomali tespit yeteneklerini geliştirmek için Gradyan Arttırma Regresyonu kullanılmıştır. Geleneksel anomali tespit yöntemleri genellikle HVAC sistemlerinin dinamik yapısına uyum sağlamakta zorlanır ve yanlış alarmlar üretebilir veya kritik sorunları gözden kaçırabilir. Bu zorlukların üstesinden gelmek için, anomali tespit doğruluğunu ve güvenilirliğini artırmak üzere güçlü bir makine öğrenimi tekniği olan Gradyan Arttırma Regresyonu bu çalışmada kullanılmıştır. Modelin performansını ölçmek adına gerçek HVAC verileri kullanılarak anomali tespit yöntemleriyle karşılaştırılmıştır. Sonuçlar, yanlış alarmları en aza indirirken sistemin anormallikleri doğru bir şekilde tanımlama becerisinde önemli gelişmeler olduğunu göstermektedir. Genel olarak, bu araştırma daha sağlam ve uyarlanabilir bir anomali tespit çözümü sağlayarak HVAC sistem güvenliğinin ilerlemesine katkıda bulunmaktadır. Bu çalışma, Gradyan Arttırma Regresyonu&#039;nun HVAC sistemlerinin siber güvenlik çerçevesine entegrasyonu ile siber tehditlere karşı gelişmiş koruma sağlayacağı ve böylece kritik altyapıların esnekliğini ve güvenilirliğini arttıracağını göstermiştir.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>HVAC</kwd>
                                                    <kwd>  Gradient Boosting Regressor</kwd>
                                                    <kwd>  cyber-attack</kwd>
                                                    <kwd>  anomaly detection</kwd>
                                                    <kwd>  time series</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="tr">
                                                    <kwd>HVAC</kwd>
                                                    <kwd>  Gradyan Arttırma Regresyonu</kwd>
                                                    <kwd>  siber saldırı</kwd>
                                                    <kwd>  anomali tespiti</kwd>
                                                    <kwd>  zaman serisi</kwd>
                                            </kwd-group>
                                                                                                        <funding-group specific-use="FundRef">
                    <award-group>
                                                    <funding-source>
                                <named-content content-type="funder_name">Sakarya University Scientific Research Projects Commission (BAPK)</named-content>
                            </funding-source>
                                                                            <award-id>2023-19-43-16</award-id>
                                            </award-group>
                </funding-group>
                                </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Asim, N., Badiei, M., Mohammad, M., Razali, H., Rajabi, A., Chin Haw, L., &amp; Jameelah Ghazali, M. “Sustainability of heating, ventilation and air-conditioning (HVAC) systems in buildings—An overview”. International journal of environmental research and public health, 19(2): (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Pérez-Lombard, L., Ortiz, J., &amp; Pout, C. “A review on buildings energy consumption information.” Energy and buildings, 40(3): 394-398, (2008).</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Xiao, F., &amp; Wang, S. “Progress and methodologies of lifecycle commissioning of HVAC systems to enhance building sustainability.” Renewable and sustainable energy reviews, 13(5): 1144-1149, (2009).</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Ahmad, M. W., Mourshed, M., Yuce, B., &amp; Rezgui, Y. “Computational intelligence techniques for HVAC systems: A review In Building Simulation” 9: 359-398. Tsinghua University Press, (2016).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Reppa, V., Papadopoulos, P., Polycarpou, M. M., &amp; Panayiotou, C. G. “A distributed architecture for HVAC sensor fault detection and isolation.” IEEE Transactions on Control Systems Technology, 23(4): 1323-1337, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Wang, Z., Parkinson, T., Li, P., Lin, B., &amp; Hong, T. “The Squeaky wheel: Machine learning for anomaly detection in subjective thermal comfort votes.” Building and Environment, 151: 219-22, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Novikova, E., Belimova, P., Dzhumagulova, A., Bestuzhev, M., Bezbakh, Y., Volosiuk, A.&amp; Lavrov, A. Usability assessment of the visualization-driven approaches to the HVAC data exploration. In Proceedings of the 30th International Conference on Computer Graphics and Machine Vision 1-12, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Tasfi, N. L., Higashino, W. A., Grolinger, K., &amp; Capretz, M. A. “Deep neural networks with confidence sampling for electrical anomaly detection.” In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) 1038-1045, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Hindy, H., Brosset, D., Bayne, E., Seeam, A., &amp; Bellekens, X. “Improving SIEM for critical SCADA water infrastructures using machine learning.” In International Workshop on Security and Privacy Requirements Engineering, 3-19. Cham: Springer International Publishing, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Nixon, C., Sedky, M., &amp; Hassan, M. “Practical application of machine learning based online intrusion detection to internet of things networks.” In 2019 IEEE Global Conference on Internet of Things (GCIoT) 1-5, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Krishnamurthy, S., Sarkar, S., &amp; Tewari, A. Scalable anomaly detection and isolation in cyber-physical systems using bayesian networks. In Dynamic Systems and Control Conference 46193, V002T26A006. American Society of Mechanical Engineers, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	Bazlur Rashid, A. N. M., Ahmed, M., &amp; Pathan, A. S. K. “Infrequent pattern detection for reliable network traffic analysis using robust evolutionary computation”, Sensors, 21(9), (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	Jadidi, Z., Pal, S., Hussain, M., &amp; Nguyen Thanh, K. “Correlation-Based Anomaly Detection in Industrial Control Systems”. Sensors, 23(3): 1561, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Wang, Z., Parkinson, T., Li, P., Lin, B., &amp; Hong, T. “The Squeaky wheel: Machine learning for anomaly detection in subjective thermal comfort votes.” Building and Environment, 151: 219-227, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	J. Vijayan, &quot;With the Internet of Things, smart buildings pose big risk,&quot; Computer World, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	Khan, I. U., Aslam, N., AlShedayed, R., AlFrayan, D., AlEssa, R., AlShuail, N. A., &amp; Al Safwan, A. “A proactive attack detection for heating, ventilation, and air conditioning (HVAC) system using explainable extreme gradient boosting model (XGBoost)”. Sensors, 22(23): 9235, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Elnour, M., Meskin, N., Khan, K., &amp; Jain, R. “HVAC system attack detection dataset.” Data in Brief, 37: 107166, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Elnour, M., Meskin, N., Khan, K., &amp; Jain, R. “Application of data-driven attack detection framework for secure operation in smart buildings”. Sustainable Cities and Society, 69: 102816, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	A. Blázquez-García, A. Conde, U. Mori, and J. A. Lozano, “A review on outlier/anomaly detection in time series data”, ACM Computing Surveys, 54(3): 1-33, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Akpinar, M., Adak, M. F., &amp; Guvenc, G. “SVM-based anomaly detection in remote working: Intelligent software SmartRadar.” Applied Soft Computing, 109: 107457, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	Neter, J., Wasserman, W., &amp; Kutner, M. H. “Applied linear regression models.” Richard D. Irwin (1983).</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	Komarasamy G and Ravishankar T.N., &quot;The Application of Decision Tree Method for Data Mining&quot; Technoarete Transactions on Intelligent Data Mining and Knowledge Discovery, 2(3), (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	Sapri, F. E., Nordin, N. S., Hasan, S. M., Yaacob, W. F. W., &amp; Nasir, S. A. M. “Decision tree model for non-fatal road accident injury.” International Journal on Advanced Science, Engineering and Information Technology, 7(1): 63-70, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	Zhang, M., Rong, J., Liu, S., Zhang, B., Zhao, Y., Wang, H., &amp; Ding, H. “Factors related to self-rated health of older adults in rural China: A study based on decision tree and logistic regression model.” Frontiers in Public Health, 10: 952714, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	Chen, D., Hu, F., Nian, G., &amp; Yang, T. Deep residual learning for nonlinear regression. Entropy, 22(2): 193, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26]	Cover, T. “Estimation by the nearest neighbor rule.” IEEE Transactions on Information Theory, 14(1), 50-55 (1968).</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	Han, J., Pei, J., &amp; Tong, H. “Data mining: concepts and techniques. Morgan kaufmann”, MK Press, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	Fazakas-Anca, I. S., Modrea, A., &amp; Vlase, S. “Determination of Reactivity Ratios from Binary Copolymerization Using the k-Nearest Neighbor Non-Parametric Regression.” Polymers, 13(21): 3811, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29]	Breiman L., &quot;Random Forests,&quot; Mach Learn, 45(1), 5–32, (2001).</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	Xing, F., Luo, R., Liu, M., Zhou, Z., Xiang, Z., &amp; Duan, X. “A new random forest algorithm-based prediction model of post-operative mortality in geriatric patients with hip fractures.” Frontiers in Medicine, 9: 829977, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31]	Freund Y. and Schapire R. E., &quot;A Short Introduction to Boosting,&quot; Journal of Japanese Society for Artificial Intelligence, 14(5): 771–780, (1999).</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32]	Schapire R. E., &quot;The boosting approach to machine learning: An overview&quot;, Nonlinear estimation and classification, 149–171, (2003).</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">[33]	Chandola, V., Banerjee, A., &amp; Kumar, V. “Anomaly detection: A survey.” ACM computing surveys (CSUR), 41(3): 1-58, (2009).</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">[34]	Canizo, M., Triguero, I., Conde, A., &amp; Onieva, E. “Multi-head CNN–RNN for multi-time series anomaly detection: An industrial case study”, Neurocomputing, 363: 246-260, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">[35]	Ahmed, M., &amp; Pathan, A. S. K. “Deep learning for collective anomaly detection”, International Journal of Computational Science and Engineering, 21(1): 137-145, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">[36]	Ahmed, M., &amp; Mahmood, A. N. “Network traffic pattern analysis using improved information theoretic co-clustering based collective anomaly detection”, In International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm Beijing, China, Revised Selected Papers, Part II 10 204-219. Springer International Publishing, (2015).</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
