Next Article in Journal
A Unified Internal Flow Model with Fluid Momentum for General Application in Shipflooding and Beyond
Next Article in Special Issue
Improving Maritime Domain Awareness in Brazil through Computer Vision Technology
Previous Article in Journal
Robust Adaptive Backstepping Motion Control of Underwater Cable-Driven Parallel Mechanism Using Improved Linear Model Predictive Control
Previous Article in Special Issue
A Network Model for Identifying Key Causal Factors of Ship Collision
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Maritime Anomaly Detection for Vessel Traffic Services: A Survey

Sea Traffic and Nautical Solutions, Fraunhofer Center for Maritime Logistics and Services CML, Blohmstraße 32, 21079 Hamburg, Germany
*
Author to whom correspondence should be addressed.
J. Mar. Sci. Eng. 2023, 11(6), 1174; https://doi.org/10.3390/jmse11061174
Submission received: 12 April 2023 / Revised: 29 May 2023 / Accepted: 30 May 2023 / Published: 3 June 2023
(This article belongs to the Special Issue Maritime Security and Risk Assessments)

Abstract

:
A Vessel Traffic Service (VTS) plays a central role in maritime traffic safety. Regulations are given by the International Maritime Organization (IMO) and Guidelines by the International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA). Accordingly, VTS facilities utilize communication and sensor technologies such as an Automatic Identification System (AIS), radar, radio communication and others. Furthermore, VTS operators are motivated to apply Decision Support Tools (DST), since these can reduce workloads and increase safety. A promising type of DST is anomaly detection. This survey presents an overview of state-of-the-art approaches of anomaly detection for the surveillance of maritime traffic. The approaches are characterized in the context of VTS and, thus, most notably, sorted according to utilized communication and sensor technologies, addressed anomaly types and underlying detection techniques. On this basis, current trends as well as open research questions are deduced.

1. Introduction

Maritime transportation is the backbone of global trade, in value as well as in volume [1]. While navigable waters on the oceans are wide, the bottlenecks of maritime transportation are normally narrow straits, channels and port approaches themselves. Most ports do only provide one approach from port to sea, making the approach itself a critical infrastructure without redundancy [2]. In channels and straits, vessels must follow the water way in a structured manner so as not to expose themselves into risk of hazards, e.g., collisions. This is aggravated by the various meteorological and hydrological conditions under which maritime traffic operates. Thus, accurate traffic information and traffic coordination is needed in those areas, to ensure safe and smooth traffic flows. This task is, nowadays, supported by Vessel Traffic Services (VTS) [3,4]. VTS make use of various communication and sensor technologies to establish an extensive situation awareness. Familiar examples are Automatic Identification System (AIS), radar or radio communication in the very high frequency (VHF) range. Decision Support Tools (DST) help the VTS operators to outsource significant workloads so that tasks such as the anchor watch can be performed by machines instead of humans. Assuming that normal traffic flow is safe and smooth, an anomaly-detecting DST could indicate traffic events that impair traffic flow, in this regard [5].
Anomaly detection is a well-known research field in the scientific community [6] and also in the maritime context specifically [5,7]. Specifically, from the perspective of VTS, this research field seems promising due to the manifold of technologies applicable as data sources. However, as VTS operates within a safety-critical environment, the recommendations and solutions proposed by any DST must be explainable and reliable [5,8]. Further, the addressed anomaly types must suit the VTS traffic scenarios, too. Lastly, requirements related to VTS operation, such as real-time capability, must be taken into account as well.
In this survey, we review the recent literature on maritime anomaly-detection approaches from the point of view of VTS operations. We do this by collecting literature, selecting relevant publications and classifying them corresponding to data source, detection technique and addressed-anomaly types. These and other classifying dimensions are chosen based on the capabilities and requirements of VTS. To the best of our knowledge, this is the first survey on maritime anomaly detection in which the literature is reviewed according to VTS-relevant properties. This survey may be of relevance for any researcher in the field of surveillance or monitoring of maritime traffic or closely related topics. Closely related topics may be any intermediate step of maritime anomaly detection such as traffic extraction or representation.
This survey is organized as follows: In Section 2, this survey is compared with related work. It is shown how comparable surveys can be distinguished and on what other authors focus. Subsequently, in Section 3, the reader is introduced to the context and scope of this survey. As a result, the tasks and services, as well as the technological capabilities and application of DST, are explained. The Section closes with an outline of anomaly types and detection techniques. The literature-review process comprising the collection, selection and classification of the literature in this survey is explained in Section 4. Section 5 presents the results of the literature review. Finally, the survey is concluded in Section 6.

2. Related Work

Within recent years, some surveys reviewing anomaly-detection articles in the maritime context have been published. Here, we focus only on recent surveys starting from 2017 (cf. Section 4).
Sidibé and Shu [9] provide a summary of approaches for anomaly detection for the period 2011–2016. This summary comprises approaches which utilize AIS data only. Further, the authors characterize the approaches by their techniques and applied AIS data attributes.
In [10], an overview of AIS-based anomaly-detection techniques is presented as a part of a broader survey. This survey also deals with related topics such as AIS data providers and methods on route estimation or collision risk assessment. The overview on the detection techniques strongly focuses on technical backgrounds.
Riveiro et al. [7] give a holistic overview of anomaly-detection techniques. The authors cover over two decades of literature, i.e., 1996 to 2017. The reviewed approaches are characterized with various properties such as the utilized data, normalcy extraction and representation, the detection technique itself and anomaly types. Particularly worth mentioning is that this survey does not focus on a specific data source such as AIS.
In a study by Yan and Wang, an overview of AIS-based data-driven detection techniques is given [11]. Further the authors distinguish among purely statistical or Machine-Learning-based as well as hybrid techniques.
In [12], the authors introduce a distinction between the detection of events and anomalies. For both, the reviewed approaches are characterized according to their underlying detection techniques. All reviewed approaches rely either on AIS data solely or in combination with other data, e.g., environmental data.
Similarly to the majority of the previously mentioned related work, Dogancay et al. provide an overview of the techniques of anomaly-detection approaches [13]. However, this survey focuses on AIS-based approaches only.
The most recent survey was published by Wolsing et al. in 2022 [14]. Even though this survey focuses on AIS data only, the noteworthy key result of this work is a tabular overview which sorts anomaly-detection approaches from the years 2007 to 2021 by detection techniques, anomaly types, utilized AIS data attributes and more.
Therefore, to the best of our knowledge, this work represents the first survey which reviews maritime anomaly-detection approaches w.r.t. VTS context—more specifically, the Information Service of VTS—and sorts the reviewed literature, accordingly, by relevant properties.

3. Situation Awareness in Vessel Traffic Services

In this section, the reader is introduced to VTS and how its operators build up and maintain their situation awareness about maritime traffic flow. It starts with a brief summary of the historic origin and development of VTS and moves to the service goals and levels. Then, the technological capabilities are briefly introduced and how DST build on them. Finally, the topic of maritime anomaly detection within the scope of this survey is introduced.

3.1. Tasks and Services

After the radio had been employed for a some time already, it was complemented by a novel technology when, in 1948, one of the first harbour surveillance radars was introduced in Liverpool [3,15]. Both technologies, radio and radar, not only offered extended communication and surveillance capabilities but also ensured these during adverse weather conditions. Although initially adapted for efficiency reasons, e.g., to reduce congestion, it was acknowledged that the utilization of these technologies also increased traffic safety. Since the advent of these informal VTS, not only has ship traffic been increasing but also the technological capabilities of VTS. In 2021, the latest guidelines for VTS were outlined in resolution A.1158(32) [4]. According to this resolution, vessel traffic service shall serve three purposes, which are:
1.
“providing timely and relevant information on factors that may influence ship movements and assist onboard decision-making”;
2.
“monitoring and managing ship traffic to ensure the safety and efficiency of ship movements”;
3.
“responding to developing unsafe situations”.
Thereby, VTS operation itself is no longer a pure observer and information provider over a traffic coordinator; rather, it is now a direct shore-based supporter as indicated by their service levels [3,16]:
1.
Information Service (INS);
2.
Traffic Organisation Service;
3.
Navigation Assistance Service.
This study specifically focuses on the INS of VTS.

3.2. Technologies and Their Operations

In order to fulfil the above-listed services and purposes, VTS can make use of various complementary communication and sensing technologies. They are specified by the International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA) in Guideline G1111 [17]. Table 1 gives an overview of these technologies.
The data and information of the utilized communication and sensing technologies are fused together with the aim of providing holistic situation awareness. Software is used which visualizes the situation awareness in an electronic navigational chart.

3.3. Decision Support

In order to facilitate and enhance the situation awareness further, VTS operators are encouraged to utilize decision support tools, which deliver more elaborate functionalities. Examples of applications of DST are listed in IALA Guideline G1110 [5]. The complexity of DST ranges from simple functionalities such as geographically confined vessel-speed alerts to anomalous-behaviour alerts. Accordingly, the complexity of the technical implementation varies from threshold-based alerts to traffic models build on historical data.
To our knowledge, VTS operators most commonly use rather simple DST such as vessel-speed or -number alerts, anchor watch or geofence-based monitoring of undesired entering or leaving of specified zones. However, these alert systems are highly customizable, so that, e.g., thresholds and geographically confined areas can be defined freely based on situation and experience. More complex DST that are, for example, based on statistical models or Machine-Learning-based systems have not found their way into VTS systems yet.

3.4. Anomaly Types and Detection Techniques

An anomalous pattern, i.e., an anomaly, inherently requires an understanding of the normalcy from which it deviates. In the context of maritime traffic, VTS operators expect certain traffic patterns which they perceive as normal. Therefore, deviating traffic patterns may appear anomalous. Humans perform this reasoning through different approaches such as using formalized rules or simply by experience. Similarly, anomalies can be detected by a machine. The mechanism performing this is called anomaly detection. In the following, we will first describe a variety of anomaly types and subsequently outline briefly anomaly-detection techniques.
In this review, we focus on five generic anomaly types, which are listed in Table 2. This selection is based on our talks with experts in the field of VTS development and operation, other studies [12,20,21] and a preliminary, exploratory investigation of the reviewed literature. These anomaly types, on the one hand, are sufficiently generalized to form the basis for more specific or complex anomaly scenarios and, on the other hand, cover frequent anomaly scenarios which can be addressed by DST [17].
Note that an anomaly detection must not be restricted to the detection of anomalies in the present situation but may also predict upcoming anomalies and their probabilities of occurrence.
The complexity of the an anomaly-detection technique can range from a rule-based system to a system based on a neural network. Generally, multiple techniques can serve an anomaly type. The choice of the technique can be driven by various factors such as the available type and amount of data or computational power. In safety-critical environments such as VTS, in particular, reliability and explainability of the technique play important roles.
In our review, we identified five groups of techniques which are applied for the problem of anomaly detection (cf. Table 3). We define a techniques as groups of methods. It is important to note that a detection approach does not stick to one specific method but can use multiple methods from one or several of the following techniques.
In case an anomaly-detection approach does not fall under the introduced techniques, it is classified as other.

4. Literature Review

In this section, the literature-review process is briefly explained. This includes the collection, selection and classification of the literature. The whole process is depicted in Figure 1.

4.1. Collection

The focus of this literature review lies in the approaches of anomaly detection in the context of maritime traffic surveillance conducted by VTS, specifically, INS. Beyond that, the review is not constrained to specific anomalies, a data source or other dimensions as is done in some related works (cf. Section 2). Accordingly, the scope is set by the definition of the search terms:
  • maritime;
  • (surveillance OR VTS OR monitoring);
  • anomaly detection.
Here, each term is connected by a Boolean AND operator and the words of the VTS-specific term are connected by Boolean OR operators. By doing this, we aim to retrieve a broad variety of literature within our scope. To focus on more recent approaches, the search is confined to literature from the years 2017 to 2022. Initially, the first 100 search results on Google Scholar were collected.

4.2. Selection

Irrelevant publications, i.e., topic out of scope, were dropped. Kept literature was checked for potentially relevant references. These steps were repeated iteratively, as can be seen in Figure 1. This way, we made sure to collect publications which had not been listed in the initial set of 100 search results but had been cited by other publications.
Thesis works were not kept; however, the references on which they were based were kept. Other surveys were not kept either; however, their references were checked for relevance, too. This selection process of the literature was cross-checked internally.

4.3. Classification

The finally obtained publications were compared. To compare the introduced context of the INS of VTS, corresponding classification dimensions were defined. Initially, the following set of classification dimensions was formulated:
  • Data source (i.e., communication and sensor technologies, cf. Table 1);
  • Anomaly types (cf. Table 2);
  • Area types (i.e., physically, regulatory or not constrained)
  • Ship types;
  • Detection techniques (cf. Table 3).
The literature review was then performed using these classification dimensions. During the review process and at its end, the filled classification table was cross-checked internally to make sure that the classification was being performed under common understanding and to check for any flaws.

5. Results

The number of publications which were retrievable with the defined search phrase (cf. Section 4) has increased significantly within recent years, as can be seen in Figure 2. To put this into context: more publications are retrievable from the year 2022 than from the years 2010–2015 combined.
Following the review methodology depicted in Figure 1, in total, 136 publications were collected and screened. From those, 55 passed the selection criteria and cross-checks. These publications were sorted according to the classification explained in Section 4. By doing this, this survey addresses topics in or close to the field of maritime traffic surveillance, monitoring or VTS operations, specifically.
The resulting classification of the publication can be examined in Table 4 for the AIS data source alone and Table 5 for all other data sources and their combinations (with AIS). Multiple publications of the same author and approach are merged into one entry and classified according to the latest publication. As can be seen in the tables, and as stated in Section 4, the classification dimensions area types and ship types were dropped. This is due to the fact that only a small minority of the publications stated that their approaches were clearly addressing specific (or all) area or ship types. The scalability of presented approaches was rarely indicated either. Given that geographical features and maritime traffic can strongly differ among VTS regions, the choice of suitable anomaly-detection approaches is hampered.
In the following subsections, the approaches are presented sequentially from the perspective of the utilized data source, the underlying detection technique and the applicable anomaly type.

5.1. Data Sources

The frequency distribution of the utilized communication and sensor technologies as data sources is depicted in Figure 3. As can be seen, the majority of the proposed approaches utilize AIS solely as data source; however, some make use of AIS and other complementary data sources (cf. Table 4 and Table 5). This may be due to the fact that AIS data is easily accessible, available in large quantities and consistently structured, which makes the research and development of novel anomaly detection techniques feasible [12,14]. Another reason may be that, with AIS, data anomalies can be detected to a large extent.
Out of the 55 screened publications, 42 presented approaches relying on AIS solely. This is hardly surprising, as explained initially. A recent literature review specifically on the application of AIS-based maritime anomaly detection is presented by Wolsing et al. [14]. Some approaches combine AIS and other sources. D’Afflisio et al. propose an approach which relies on positional and kinematic data, which can come from AIS solely or complemented by radar [73,74,75,76]. In [72], Thomopoulos et al. present an anomaly-detection toolbox which fusions vessel data based on AIS, radar and Vessel Monitoring System [72]. In the concept by [69], it is proposed to enhance a vessel’s own situation awareness by complementing ordinary AIS data with additional target vessels’ data, such as from temperature sensors. Another data source is exploited by Mazzarella et al. [70] and Ray [71], who utilize the received signal strength indicator (RSSI) of terrestrial AIS base stations. As VTS maintain their own AIS base stations, the RSSI (or a similar dimension) is a potential data source for anomaly detection. The proposed data sources by [69,70,71] are listed under other in Table 4 and Table 5.
Out of the screened publications, only three utilized approaches are described that rely on data sources other than AIS. This is very striking, due to the availability of other communication and sensor technologies. The approaches from Bauw et al. [77] and Van Loi et al. [78] are both tested on real coastal-surveillance radar datasets. Bauw et al. further specifies that one-dimensional high-resolution range profiles are used in their study. High-resolution satellite-based image data, which includes seashores, rivers and islands, is tested in [79]. Remarkably, no shore-based image data has been applied to the screened approaches. Similarly to the situation with radar-based detection techniques, this is striking, as camera systems are widespread at VTS sites, too.
Czapelewski et al. [80] apply purely synthetic and simplified image data from an aerial view. They intend, however, to extend their approach and experiments on (synthetic) radar data. Due to the very conceptual character of the approach and its current application of synthetic data only, this publication is not listed in the completed classification schemes.
The review from the perspective of data sources indicates, from the variety of communication and sensor technology, that VTS includes (cf. Table 1) a remarkable minority of methods, i.e., only AIS and radar, is considered in maritime anomaly-detection approaches. Notably, no approach was screened within this review which was based on VHF, despite the fact that this communication technology is used widely and provides context information which cannot be obtained by other communication or sensor technology. In addition, that is despite current research and development progress on natural language processing, on the one hand, and the established Standard Marine Communication Phrases (SMCP), on the other hand, which is followed by Gözalan et al. in [81].

5.2. Anomaly Types

The screened publications were classified according to the anomaly types (cf. Table 2) which they aim to detect. The majority of the publications, viz. 33, covers one specific anomaly type. The remaining 22 publications cover two or three anomaly types (cf. Table 4 and Table 5). The most common combinations of addressed anomaly types cover, at least, either route deviation, kinematic deviation or both. The frequency distribution of the addressed anomaly types is depicted in Figure 4.
Tyasayumranani describes, in [59], an approach to detect whether a ship is being steered under the influence of alcohol. This complex detection is based on the detection of kinematic deviations, route deviations and collision risk. In [28,34], the authors present an approach to detect information inconsistency in the form of AIS reporting gaps due to potentially intentional AIS switch-off. Singh and Heymann describe approaches which shall be able to classify whether AIS reporting gaps are intentional or due to power outages [57,58]. Utilizing the RSSI through an AIS base station (cf. Section 5.1), Mazzarella et al. [70] and Ray [71] demonstrate the detection of AIS switch-off. Furthermore, Mazzarella et al. [70] and Thomopoulos et al. [72] outline a logic-based formalism which is able to detect falsified AIS messages. AIS spoofing is another scenario of information inconsistency and is covered extensively by the work of d’Afflisio et al. [73,74,75,76]. In [49], the author compares the outcome of different techniques (cf. Section 5.3) to detect spoofing committed by fishing vessels. In some approaches, inconsistency refers to invalid positional or kinematic data based on simple projections [32,33,42], taking a vessel’s manoeuvrability into account [29] or detecting implausible value changes [61]. Another form of inconsistency detection is described by Yan et al. [63] and Zhou et al. [66]. Based on different approaches, both compare the detected ship type with the actually reported one and, so, potentially detect information inconsistency. Close-approaches scenarios are defined by [28] as imminent collisions between vessels or the grounding of a vessel. Patroumpas et al. formalize scenarios such as fast or close approaches to detect suspicious interactions such as package picking [54]. Based on radar-range profiles, Bauw et al. demonstrate, in [77], the detection of the visit of unusual ship types, e.g., fishing vessels, in areas where, normally, tankers and container and cargo vessels operate. This is the only publication which covers the anomaly type of zone entry in our review.
It seems that there is already a variety of anomaly scenarios covered by the reviewed literature. The complexity level, ranging from the detection of simple kinematic deviation to that of hiding activities via switched-off AIS, varies, too. Taking into account the differences in the areas and traffic patterns that VTS oversee, most probably some addressed anomaly scenarios may be used universally, where others may need more customized detections, e.g., specific environmental or geographical conditions.

5.3. Anomaly-Detection Techniques

In Section 3.4, the techniques are explained according to the screened publications that have been sorted into each technique. Figure 5 illustrates the frequency distribution of the techniques applied to solve the different problem types of anomaly detection. It shall be noted, however, that the counts of the usages of specific technique types may be biased since some technique types may cover more potential approaches than others.
Remarkably, descriptive statistics is used most often followed by approaches which are based on clustering or neural networks. In [45,49,57,70,77], the authors compare the outcome of various techniques within specific anomaly-detection scenarios. Bauw et al. applies unsupervised approaches, notably, Support Vector Machine (SVM), Isolation forest, Local Outlier Factor, Convolutional Autoencoder and a semi-supervised NN-based classification approach proposed by Ruff et al. [77,82]. In the context of route deviation, Karataş compares the precision of numerous approaches, e.g., based on decision tree, random forest, and density-based spatial clustering of applications with noise (DBSCAN) in combination with classification and long short-term memory (LSTM), and states that decision-tree-based approaches perform the best in his context [45]. Krüger investigates the precision of AIS-spoofing detection with classification methods such as random forest, decision tree or k-nearest neighbours (kNN) algorithms and a fuzzy rules-based method [49]. In the context of detection of intentional AIS on–off switching, Mazzarella et al. compare the detection precision using SVM and a historically based spatial distribution to model the AIS-base-station RSSI [70]. In a similar context, Singh and Heymann compare the effectiveness at detecting whether, more specifically, AIS on–off switching occurs intentionally or due to a power outage by applying approaches such as Naive Bayes, SVM, kNN, decision tree, random forest and linear regression and NN [57].
As can be seen in Figure 6, the applied technique type is associated with the addressed anomaly type. The anomaly-types route deviation and kinematic deviation are covered by the commonly applied techniques descriptive statistics, clustering or NN-based classification.
Most detection techniques which are based on descriptive statistics consider, somehow, outliers in the (spatio-temporal) distribution of the vessels’ attributes [27,32,33,46,59,72]. Outliers can be defined with, e.g., distance to the mean or standard deviations. Commonly used attributes are, particularly, the vessels’ position, speed and course. Abreu et al. propose an approach based on visual analytics [25,26]: For visually selected spatial subtrajectories, a score indicating the degree of anomaly is calculated. Analogously to the approaches mentioned before, the calculation is based on the statistical deviation from the mean of given attributes. Implementation of anomaly-detection techniques based on descriptive statistics are very obvious in the age of big data. VTS are able to record data which is produced by their communication and sensor technologies. This data can serve as a solid basis for the aforementioned and other data-driven techniques.
Numerous approaches apply clustering, another data-driven technique, before proceeding with other techniques such as descriptive statistics or NN-based classification. This way, most authors try to reduce the amount of data while still keeping information about relevant traffic patterns, e.g., stopping or turning points. In [30,40,41,42,43,48,56,64], the authors apply DBSCAN as a clustering algorithm to vessels’ positional or kinematic AIS data. Zhao et al. use these clusters as training data for a Recurrent Neural Network (RNN), i.e., an LSTM [64]. The authors highlight that this method requires high data quality, which is a challenging task in a real-time environment such as VTS. It shall be mentioned that adjustment of the parameters of the DBSCAN clustering algorithm is known to be arbitrary [53]. Against the background of scalability and explainability of anomaly-detection techniques in safety-critical environments, the application of the DBSCAN clustering algorithm, however, is disputable.
Since NN are universal function approximators, they can process various data types and address a broad range of problem types in general. Due to the advent of big data, especially the availability of AIS data, NN can be trained intensely. A commonly addressed anomaly type is route deviation; however, the precise NN classes applied vary. Eljabu et al. trained a Graph Convolution Network which models the spatio-temporal vessel traffic network and demonstrates that it is able to identify anomalous route behavior [31]. In order to detect kinematic anomalies, Hu et al. apply a Variational Autoencoder and show that it outperforms other approaches, e.g., decision tree, SVM and LSTM [44]. In the work of Nguyen et al., an RNN is trained to detect kinematic and route deviations. It does so by learning the stochastic representation of given routes and detecting improbable events which can be anomalies [50,51,52,53]. A similar approach applying a Bayesian RNN is followed by Xia et al. [62]. Both working groups state that RNN are able to learn vessel behaviour patterns based on AIS data without preliminary traffic extraction and claim promising results. The literature shows that the results of NN-based anomaly detection are promising. Be that as it may, the decision finding process of NN-based systems intrinsically lack explainability [12,83,84]. Due to this, the application of NN in safety-critical environments such as VTS is problematic.
Forti et al. and d’Afflisio et al. base their work on the Ornstein–Uhlenbeck mean-reverting stochastic process [22]. However, both working groups have extended their approaches differently. Forti et al. cover route-deviation detection and demonstrate the capabilities of their approach [35,36,39] by applying it on the real-world scenario of the blocking of the Suez canal. They state that their approach would have been capable of predicting this anomaly early [38]. D’Afflisio, on the other hand, integrate a hypothesis testing framework and they aim at detecting AIS spoofing and stealth deviations [73,74,75,76]. Beyond that, inconsistency anomalies can be detected by other techniques. Some examples are rule-based approaches with predetermined thresholds [28,29,33,47,71,72], statistical approaches with data-driven thresholds [33,70,72] or those based on cross-checking data values using pre-trained classification models, e.g., SVM or random forest [63,70], or even NN, as performed by Wang [61]. The latter author further proposes a rare behaviour factor which can be used by (VTS) operators to tune the sensitivity of the anomaly detection [60]. The rule-based or statistically driven techniques offer a comprehensible decision process of anomaly detection. However, these techniques can only uncover anomalies which are predefined by experts and covered by statistical data. Furthermore, it shall be mentioned that anomaly-detection techniques based on statistical data assume that statistically frequent values (or events) correspond to normalcy. However, statistically rare values (or events) can be normal, too, and vice versa.
Two anomaly-detection techniques are sorted under other in the tabular overview (cf. Table 4 and Table 5). A unique approach within the scope of this review is followed by Guo et al. who deduce a vessel’s manoeuvrability from its trajectory through kinematic interpolation of the AIS track [42]. An AIS data point that does not follow the ship’s manoeuvrability is a potential anomaly. Another unconventional approach is the utilization of convex hulls, which is carried out by [28,67].

6. Conclusions

To ensure safe and smooth maritime traffic, its surveillance is performed by VTS for specific regions such as port or channel areas. VTS operators make use of various DST in order to reduce their workload and increase maritime-traffic safety. The DST themselves can utilize a variety of communication and sensor technologies and resulting data at VTS sites. One application of DST is the detection of anomalies in maritime traffic.
In this survey, the state-of-the-art of anomaly-detection approaches are presented. For this purpose, 136 publications from the years 2017 to 2022 were collected and screened for relevance. Therefrom, 55 publications were classified as relevant (cf. Section 4) and, subsequently, further investigated. Noteworthily, the number of relevant publications increases significantly for later years, as can be seen in Figure 2.
The proposed approaches are presented from the perspectives of the data sources (cf. Section 5.1), detectable anomaly types (cf. Section 5.2) and anomaly-detection techniques (cf. Section 5.3). The results can be summarized as follows:
  • The primary data source used as a base for anomaly detection is AIS. The widespread application of this data source can be explained by its ubiquity, standardized structure and sufficient coverage of relevant maritime traffic information. Only few approaches utilize other data sources. However, despite the contextual information, VHF has not been used in any approach.
  • The served anomaly scenarios can be grouped into five generic anomaly types. Most approaches aim at detecting either route or kinematic deviations, or information consistency. However, the precisely served anomaly scenario can be very specific and, for example, cover detection of intentional AIS switch-off, unusual ship visits or a ship being steered under the influence of alcohol.
  • The underlying detection techniques are manifold and can range from rather simple and transparent approaches such as measures from descriptive statistics or rule-based systems to more complex and intransparent approaches, e.g., based on NN. The applied detection techniques are connected to the aimed anomaly detection type. For example, approaches for the detection of implausible kinematic or route deviation are often based on measures from descriptive statistics.
Finally, it is worth mentioning that almost all publications focus on specific anomaly scenarios. The approaches presented by Nguyen et al. [53] and Thomopoulos et al. [72] are part of holistic systems. However, none of the investigated approaches are applied operatively at VTS sites, yet.

7. Discussion

Despite all the approaches outlined in science, monitoring a VTS area is still a manual task for the VTS operators and, subsequently, connected with challenges to human observation capabilities and the ever-increasing volume of communication and sensor data. DST are under development, as outlined before; however, they are not used widely spread in current VTS operations. The authors assume that this is due to a variety of reasons, namely:
1.
Transparency of and trust in DST decision-making;
2.
Real-time capabilities;
3.
Scattered national solutions;
4.
Geographical scalability of approaches and training data sets.
As a first step, the potential lack of trust of the VTS operators in DST decision-making capabilities must be addressed. Specifically, with approaches not based on descriptive statistics or rule-based systems, the decision-finding is not clear to the operator due to a lack of explainability. Humans, then, tend not to trust the respective DST. Most of the solutions discussed above are concepts, prototypes or case studies which have never been integrated or tested within the operators’ daily working systems. This advanced prototyping and testing, which could help to close that trust gap, is also challenging, as not all VTS are computationally equipped to allow for higher levels of anomaly detection in real-time, given the existing computational power installed. Further, some interfaces to third-party computational systems cannot be realized due to security considerations, since VTS are considered critical infrastructure. As VTS systems are often national solutions for one coastal state resulting nationally in a bilateral monopoly structure as well as different interpretations of normality based on the geographical region, the scalability of research and development efforts is not a given. This makes development more challenging and rather expensive. Furthermore, the step from descriptive or rule-based DST towards other techniques outlined in this survey would require data-quality measures such as properly annotated training data sets, which go beyond pure AIS traffic tracking. According to the best knowledge, those set are not publicly available and significant efforts are needed to generate such sets, even though initial approaches to automatically annotate AIS data sets exists, such as, e.g., by Constapel et al. in [85] for COLREGs information.
Despite those implementation hurdles, DST capabilities for VTS operations are continuously progressing and have reached a state that allows a constantly more in-depth monitoring of maritime traffic than can be realistically achieved by human observation only. Safe but realistic test environments are needed to ensure early human-oriented testing by VTS operators, such as, e.g., achieved by the European Maritime Simulator Network within the STM Validation project [86]. Such environments can help to safely test DST to achieve trust and acceptance by the VTS operators in advance, to overcome one of the implementation hurdles for innovative DST in VTS. Additionally, integration of VHF information into DST must be further investigated, as there is still relevant contextual information missing for the DST given the currently considered data sources, which is AIS mainly.
In summary, the following future work is required, according to the authors’ opinion, to facilitate DST in daily VTS operations:
1.
Integration of VHF data into DST to bridge the missing data gap;
2.
Generation and availability of annotated and approved training data to bridge the training and testing gap;
3.
System integration of realistic test beds for operators under operational conditions to bridge the human–machine trust gap.
This would help DST to reach their full potential in assisting the VTS operators in their tasks by relieving them from routine, but still complex, monitoring tasks. They could then focus on ensuring safe and smooth maritime traffic in critical situations.

Author Contributions

Conceptualization, T.S., M.C. and H.-C.B.; methodology, T.S., Y.K. and M.C.; literature review, T.S., Y.K. and H.-C.B.; supervision, M.C.; validation, T.S.; visualization, T.S.; writing—original draft preparation, T.S.; writing—review and editing, M.C. and H.-C.B.; discussion H.-C.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research is part of the project LEAS (https://www.cml.fraunhofer.de/en/researchprojects/LEAS.html, accessed on 1 June 2023). The project is funded by the German Federal Ministry of Education and Research (BMBF) within the programm “Research for Civil Security 2018-2023” under grant number 13N16246 managed by VDI Technologiezentrum.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AISAutomatic identification system
COLREGsConvention on the International Regulations for Preventing Collisions at Sea
DBSCANDensity-based spatial clustering of applications with noise
DSTDecision support tool
IALAInternational Association of Marine Aids to Navigation and Lighthouse Authorities
IMOInternational Maritime Organization
INSInformation Service
kNNk-nearest neighbours
LSTMLong short-term memory
MLMachine learning
NNNeural network
RNNRecurrent neural network
RSSIReceived signal strength indicator
SMCPStandard marine communication phrases
SVMSupport vector machine
VHFVery high frequency
VTSVessel traffic service

References

  1. Wan, Z.; Chen, J.; Makhloufi, A.E.; Sperling, D.; Chen, Y. Four Routes to Better Maritime Governance. Nature 2016, 540, 27–29. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Burmeister, H.C. Ensuring Navigational Safety and Mitigate Maritime Traffic Risks While Designing Port Approaches and Ship Maneuvering Areas. In Handbook of Terminal Planning; Böse, J.W., Ed.; Springer International Publishing: Cham, Switzerland, 2020; pp. 269–286. [Google Scholar] [CrossRef]
  3. VTS Manual; Technical report; International Association of Marine Aids to Navigation and Lighthouse Authorities: Saint-Germain-en-Laye, France, 2021.
  4. Resolution A.1158(32), Guidelines for Vessel Traffic Services; Technical report; International Maritime Organization: London, UK, 2021.
  5. G1110 Use of Decision Support Tools for VTS Personnel; Technical report; International Association of Marine Aids to Navigation and Lighthouse Authorities: Saint-Germain-en-Laye, France, 2022.
  6. Chandola, V.; Banerjee, A.; Kumar, V. Anomaly Detection: A Survey. ACM Comput. Surv. 2009, 41, 15:1–15:58. [Google Scholar] [CrossRef]
  7. Riveiro, M.; Pallotta, G.; Vespe, M. Maritime Anomaly Detection: A Review. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2018, 8, e1266. [Google Scholar] [CrossRef] [Green Version]
  8. G1141 Operational Procedure for Delivering VTS; Technical report; International Association of Marine Aids to Navigation and Lighthouse Authorities: Saint-Germain-en-Laye, France, 2022.
  9. Sidibé, A.; Shu, G. Study of Automatic Anomalous Behaviour Detection Techniques for Maritime Vessels. J. Navig. 2017, 70, 847–858. [Google Scholar] [CrossRef]
  10. Tu, E.; Zhang, G.; Rachmawati, L.; Rajabally, E.; Huang, G.B. Exploiting AIS Data for Intelligent Maritime Navigation: A Comprehensive Survey from Data to Methodology. IEEE Trans. Intell. Transp. Syst. 2017, 19, 1559–1582. [Google Scholar] [CrossRef]
  11. Yan, R.; Wang, S. Study of Data-Driven Methods for Vessel Anomaly Detection Based on AIS Data. In Smart Transportation Systems 2019; Springer: Singapore, 2019; pp. 29–37. [Google Scholar] [CrossRef]
  12. May Petry, L.; Soares, A.; Bogorny, V.; Brandoli, B.; Matwin, S. Challenges in Vessel Behavior and Anomaly Detection: From Classical Machine Learning to Deep Learning. In Advances in Artificial Intelligence, Proceedings of the 33rd Canadian Conference on Artificial Intelligence, Canadian AI 2020, Ottawa, ON, Canada, 13–15 May 2020; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer International Publishing: Cham, Switzerland; pp. 401–407. [CrossRef]
  13. Dogancay, K.; Tu, Z.; Ibal, G. Research into Vessel Behaviour Pattern Recognition in the Maritime Domain: Past, Present and Future. Digit. Signal Process. 2021, 119, 103191. [Google Scholar] [CrossRef]
  14. Wolsing, K.; Roepert, L.; Bauer, J.; Wehrle, K. Anomaly Detection in Maritime AIS Tracks: A Review of Recent Approaches. J. Mar. Sci. Eng. 2022, 10, 112. [Google Scholar] [CrossRef]
  15. Vessel Traffic Services. Available online: https://www.imo.org/en/OurWork/Safety/Pages/VesselTrafficServices.aspx (accessed on 1 June 2023).
  16. G1089 Provision of a VTS; Technical report; International Association of Marine Aids to Navigation and Lighthouse Authorities: Saint-Germain-en-Laye, France, 2022.
  17. G1111 Preparation of Operational and Technical Performance Requirements for VTS Systems; Technical report; International Association of Marine Aids to Navigation and Lighthouse Authorities: Saint-Germain-en-Laye, France, 2022.
  18. Skolnik, M.I. Introduction to Radar Systems, 3rd ed.; McGraw-Hill Electrical Engineering Series; McGraw Hill: Boston, MA, USA; Burr Ridge, IL, USA; Dubuque, IA, USA, 2001. [Google Scholar]
  19. Resolution MSC.74(69), Adoption of New and Amended Performance Standards; Technical report; International Maritime Organization: London, UK, 1998.
  20. Lane, R.O.; Nevell, D.A.; Hayward, S.D.; Beaney, T.W. Maritime Anomaly Detection and Threat Assessment. In Proceedings of the 2010 13th International Conference on Information Fusion, Edinburgh, UK, 26–29 July 2010; pp. 1–8. [Google Scholar] [CrossRef]
  21. van Laere, J.; Nilsson, M. Evaluation of a Workshop to Capture Knowledge from Subject Matter Experts in Maritime Surveillance. In Proceedings of the 2009 12th International Conference on Information Fusion, Seattle, WA, USA, 6–9 July 2009; pp. 171–178. [Google Scholar]
  22. d’Afflisio, E. Maritime Anomaly Detection Based on Statistical Methodologies: Theory and Applications. Ph.D. Thesis, Università degli Studi di Firenze, Florence, Italy, 2022. [Google Scholar]
  23. Russell, S.; Norvig, P. Artificial Intelligence, A Modern Approach, 4th ed.; Pearson series in artificial intelligence; Pearson: Hoboken, NJ, USA, 2021. [Google Scholar]
  24. Alzubaidi, L.; Zhang, J.; Humaidi, A.J.; Al-Dujaili, A.; Duan, Y.; Al-Shamma, O.; Santamaría, J.; Fadhel, M.A.; Al-Amidie, M.; Farhan, L. Review of Deep Learning: Concepts, CNN Architectures, Challenges, Applications, Future Directions. J. Big Data 2021, 8, 53. [Google Scholar] [CrossRef]
  25. Abreu, F.H.O.; Soares, A.; Paulovich, F.V.; Matwin, S. A Trajectory Scoring Tool for Local Anomaly Detection in Maritime Traffic Using Visual Analytics. ISPRS Int. J. Geoinf. 2021, 10, 412. [Google Scholar] [CrossRef]
  26. Abreu, F.H.; Soares, A.; Paulovich, F.V.; Matwin, S. Local Anomaly Detection in Maritime Traffic Using Visual Analytics. In Proceedings of the CEUR Workshop Proceedings, Nicosia, Cyprus, 23–26 March 2021; Volume 2841. [Google Scholar]
  27. Cai, C.; Chen, R.; Liu, A.D.; Roberts, F.S.; Xie, M. iGroup Learning and iDetect for Dynamic Anomaly Detection with Applications in Maritime Threat Detection. In Proceedings of the 2018 IEEE International Symposium on Technologies for Homeland Security (HST), Woburn, MA, USA, 23–24 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
  28. Chatzikokolakis, K.; Zissis, D.; Vodas, M.; Tsapelas, G.; Mouzakitis, S.; Kokkinakos, P.; Askounis, D. BigDataOcean Project: Early Anomaly Detection from Big Maritime Vessel Traffic Data. In Proceedings of the 18th International Conference on Computer and IT Applications in the Maritime Industries, Tullamore, Ireland, 25–27 March 2019. [Google Scholar]
  29. Chen, S.; Huang, Y.; Lu, W. Anomaly Detection and Restoration for AIS Raw Data. Wirel. Commun. Mob. Comput. 2022, 2022, 5954483. [Google Scholar] [CrossRef]
  30. Daranda, A.; Dzemyda, G. Navigation Decision Support: Discover of Vessel Traffic Anomaly According to the Historic Marine Data. Int. J. Comput. Commun. Control 2020, 15, 1–9. [Google Scholar] [CrossRef] [Green Version]
  31. Eljabu, L.; Etemad, M.; Matwin, S. Anomaly Detection in Maritime Domain Based on Spatio-Temporal Analysis of AIS Data Using Graph Neural Networks. In Proceedings of the 2021 5th International Conference on Vision, Image and Signal Processing (ICVISP), Kuala Lumpur, Malaysia, 18–20 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 142–147. [Google Scholar] [CrossRef]
  32. Filipiak, D.; Stróżyna, M.; Krzysztof, W. Anomaly Detection in the Maritime Domain: Comparison of Traditional and Big Data Approach. In Proceedings of the NATO IST-160-RSM Specialists’ Meeting on Big Data & Artificial Intelligence for Military Decision Making, Bordeaux, France, 30 May–1 June 2018; pp. 1–13. [Google Scholar] [CrossRef]
  33. Filipiak, D.; Stróżyna, M.; Węcel, K.; Abramowicz, W. Big Data for Anomaly Detection in Maritime Surveillance: Spatial AIS Data Analysis for Tankers. Marit. Tech. J. 2019, 215, 5–28. [Google Scholar] [CrossRef] [Green Version]
  34. Ford, J.H.; Peel, D.; Kroodsma, D.; Hardesty, B.D.; Rosebrock, U.; Wilcox, C. Detecting Suspicious Activities at Sea Based on Anomalies in Automatic Identification Systems Transmissions. PLoS ONE 2018, 13, e0201640. [Google Scholar] [CrossRef] [PubMed]
  35. Forti, N.; Millefiori, L.M.; Braca, P. Hybrid Bernoulli Filtering for Detection and Tracking of Anomalous Path Deviations. In Proceedings of the 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; pp. 1178–1184. [Google Scholar] [CrossRef]
  36. Forti, N.; Millefiori, L.M.; Braca, P. Unsupervised Extraction of Maritime Patterns of Life from Automatic Identification System Data. In Proceedings of the OCEANS 2019-Marseille, Marseille, France, 17–20 June 2019; pp. 1–5. [Google Scholar] [CrossRef]
  37. Forti, N.; Millefiori, L.M.; Braca, P.; Willett, P. Random Finite Set Tracking for Anomaly Detection in the Presence of Clutter. In Proceedings of the IEEE National Radar Conference - Proceedings, Florence, Italy, 21–25 September 2020; Volume 2020. [Google Scholar] [CrossRef]
  38. Forti, N.; d’Afflisio, E.; Braca, P.; Millefiori, L.M.; Willett, P.; Carniel, S. Maritime Anomaly Detection in a Real-World Scenario: Ever Given Grounding in the Suez Canal. IEEE Trans. Intell. Transp. Syst. 2021, 23, 13904–13910. [Google Scholar] [CrossRef]
  39. Forti, N.; Millefiori, L.M.; Braca, P.; Willett, P. Bayesian Filtering for Dynamic Anomaly Detection and Tracking. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 1528–1544. [Google Scholar] [CrossRef]
  40. Fu, P.; Wang, H.; Liu, K.; Hu, X.; Zhang, H. Finding Abnormal Vessel Trajectories Using Feature Learning. IEEE Access 2017, 5, 7898–7909. [Google Scholar] [CrossRef]
  41. Goodarzi, M.; Shaabani, M. Maritime Traffic Anomaly Detection from Spatio-temporal AIS Data. In Proceedings of the Second International Management Conference and Fuzzy Systems; 2019; pp. 1–8. [Google Scholar]
  42. Guo, S.; Mou, J.; Chen, L.; Chen, P. An Anomaly Detection Method for AIS Trajectory Based on Kinematic Interpolation. J. Mar. Sci. Eng. 2021, 9, 609. [Google Scholar] [CrossRef]
  43. Han, X.; Armenakis, C.; Jadidi, M. DBscan Optimization for Improving Marine Trajectory Clustering and Anomaly Detection. Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. 2020, 43, 455–461. [Google Scholar] [CrossRef]
  44. Hu, J.; Kaur, K.; Lin, H.; Wang, X.; Hassan, M.M.; Razzak, I.; Hammoudeh, M. Intelligent Anomaly Detection of Trajectories for IoT Empowered Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2022, 24, 2382–2391. [Google Scholar] [CrossRef]
  45. Karataş, G.B.; Karagoz, P.; Ayran, O. Trajectory Pattern Extraction and Anomaly Detection for Maritime Vessels. IEEE Internet Things J. 2021, 16, 100436. [Google Scholar] [CrossRef]
  46. Keane, K.R. Detecting Motion Anomalies. In Proceedings of the 8th ACM SIGSPATIALWorkshop on GeoStreaming, IWGS’17, Redondo Beach, CA, USA, 7–10 November 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 21–28. [Google Scholar] [CrossRef]
  47. Kontopoulos, I.; Chatzikokolakis, K.; Zissis, D.; Tserpes, K.; Spiliopoulos, G. Real-Time Maritime Anomaly Detection: Detecting Intentional AIS Switch-Off. IJBDI 2020, 7, 85. [Google Scholar] [CrossRef]
  48. Kontopoulos, I.; Varlamis, I.; Tserpes, K. Uncovering Hidden Concepts from AIS Data: A Network Abstraction of Maritime Traffic for Anomaly Detection. In Multiple-Aspect Analysis of Semantic Trajectories: First International Workshop, MASTER 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, 16 September 2019; Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer International Publishing: Cham, Switzerland, 2020; Volume 11889. [Google Scholar] [CrossRef] [Green Version]
  49. Krüger, M. Detection of AIS Spoofing in Fishery Scenarios. In Proceedings of the 2019 22th International Conference on Information Fusion (FUSION), Ottawa, ON, Canada, 2–5 July 2019; pp. 1–7. [Google Scholar] [CrossRef]
  50. Nguyen, D.; Vadaine, R.; Hajduch, G.; Garello, R.; Fablet, R. Multi-Task Learning for Maritime Traffic Surveillance from AIS Data Streams. In Proceedings of the IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA), Turin, Italy, 1–3 October 2018; pp. 1–3. [Google Scholar]
  51. Nguyen, D.; Vadaine, R.; Hajduch, G.; Garello, R.; Fablet, R. A Multi-Task Deep Learning Architecture for Maritime Surveillance Using AIS Data Streams. In Proceedings of the 2018 IEEE 5th International Conference on Data Science and Advanced Analytics, DSAA 2018, Turin, Italy, 1–4 October 2018; pp. 331–340. [Google Scholar] [CrossRef] [Green Version]
  52. Nguyen, D.; Simonin, M.; Hajduch, G.; Vadaine, R.; Tedeschi, C.; Fablet, R. Detection of Abnormal Vessel Behaviours from AIS Data Using GeoTrackNet: From the Laboratory to the Ocean. arXiv 2020. [Google Scholar] [CrossRef]
  53. Nguyen, D.; Vadaine, R.; Hajduch, G.; Garello, R.; Fablet, R. GeoTrackNet–A Maritime Anomaly Detector Using Probabilistic Neural Network Representation of AIS Tracks and A Contrario Detection. IEEE Trans. Intell. Transp. Syst. 2021, 23, 5655–5667. [Google Scholar] [CrossRef]
  54. Patroumpas, K.; Alevizos, E.; Artikis, A.; Vodas, M.; Pelekis, N.; Theodoridis, Y. Online Event Recognition from Moving Vessel Trajectories. GeoInformatica 2017, 21, 389–427. [Google Scholar] [CrossRef] [Green Version]
  55. Roberts, S.A. A Shape-Based Local Spatial Association Measure (LISShA): A Case Study in Maritime Anomaly Detection. Geogr. Anal. 2019, 51, 403–425. [Google Scholar] [CrossRef]
  56. Rong, H.; Teixeira, A.; Guedes Soares, C. Data Mining Approach to Shipping Route Characterization and Anomaly Detection Based on AIS Data. Ocean Eng. 2020, 198, 106936. [Google Scholar] [CrossRef]
  57. Singh, S.K.; Heymann, F. On the Effectiveness of AI-Assisted Anomaly Detection Methods in Maritime Navigation. In Proceedings of the 2020 IEEE 23rd International Conference on Information Fusion (FUSION), Rustenburg, South Africa, 6–9 July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–7. [Google Scholar] [CrossRef]
  58. Singh, S.K.; Heymann, F. Machine Learning-Assisted Anomaly Detection in Maritime Navigation Using AIS Data. In Proceedings of the 2020 IEEE/ION Position, Location and Navigation Symposium (PLANS), Portland, OR, USA, 20–23 April 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 832–838. [Google Scholar] [CrossRef]
  59. Tyasayumranani, W.; Hwang, T.; Hwang, T.; Youn, I.H. Anomaly Detection Model of Small-Scaled Ship for Maritime Autonomous Surface Ships’ Operation. J. Int. Marit. Saf. Environ. Aff. Shipp. 2022, 6, 224–235. [Google Scholar] [CrossRef]
  60. Wang, F.; Lei, Y.; Liu, Z.; Wang, X.; Ji, S.; Tung, A.K. Fast and Parameter-Light Rare Behavior Detection in Maritime Trajectories. Inf. Process. Manag. 2020, 57, 102268. [Google Scholar] [CrossRef]
  61. Wang, Y. Application of Neural Network in Abnormal AIS Data Identification. In Proceedings of the 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, China, 27–29 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 173–179. [Google Scholar] [CrossRef]
  62. Xia, Z.; Gao, S. Analysis of Vessel Anomalous Behavior Based on Bayesian Recurrent Neural Network. In Proceedings of the 2020 IEEE 5th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA), Chengdu, China, 10–13 April 2020; pp. 393–397. [Google Scholar] [CrossRef]
  63. Yan, Z.; Song, X.; Zhong, H.; Yang, L.; Wang, Y. Ship Classification and Anomaly Detection Based on Spaceborne AIS Data Considering Behavior Characteristics. Sensors 2022, 22, 7713. [Google Scholar] [CrossRef]
  64. Zhao, L.; Shi, G. Maritime Anomaly Detection Using Density-based Clustering and Recurrent Neural Network. J. Navig. 2019, 72, 894–916. [Google Scholar] [CrossRef]
  65. Zhen, R.; Jin, Y.; Hu, Q.; Shao, Z.; Nikitakos, N. Maritime Anomaly Detection within Coastal Waters Based on Vessel Trajectory Clustering and Naïve Bayes Classifier. J. Navig. 2017, 70, 648–670. [Google Scholar] [CrossRef]
  66. Zhou, Y.; Wright, J.; Maskell, S. A Generic Anomaly Detection Approach Applied to Mixture-of-unigrams and Maritime Surveillance Data. In Proceedings of the 2019 Symposium on Sensor Data Fusion: Trends, Solutions, Applications, SDF 2019, Bonn, Germany, 15–17 October 2019. [Google Scholar] [CrossRef]
  67. Zissis, D.; Chatzikokolakis, K.; Spiliopoulos, G.; Vodas, M. A Distributed Spatial Method for Modeling Maritime Routes. IEEE Access 2020, 8, 47556–47568. [Google Scholar] [CrossRef]
  68. Zor, C.; Kittler, J. Maritime Anomaly Detection in Ferry Tracks. In Proceedings of the 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, USA, 5–9 March 2017; pp. 2647–2651. [Google Scholar] [CrossRef] [Green Version]
  69. Coleman, J.; Kandah, F.; Huber, B. Behavioral Model Anomaly Detection in Automatic Identification Systems (AIS). In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; pp. 0481–0487. [Google Scholar] [CrossRef]
  70. Mazzarella, F.; Vespe, M.; Alessandrini, A.; Tarchi, D.; Aulicino, G.; Vollero, A. A Novel Anomaly Detection Approach to Identify Intentional AIS On-off Switching. Expert Syst. Appl. 2017, 78, 110–123. [Google Scholar] [CrossRef]
  71. Ray, C. Data Variety and Integrity Assessment for Maritime Anomaly Detection. In Proceedings of the International Conference on Big Data and Cyber-Security Intelligence, Las Vegas, NV, USA, 12–14 December 2018. [Google Scholar]
  72. Thomopoulos, S.C.A.; Rizogannis, C.; Thanos, K.G.; Dimitros, K.; Panou, K.; Zacharakis, D. OCULUS Sea™ Forensics: An Anomaly Detection Toolbox for Maritime Surveillance. In Lecture Notes in Business Information Processing; Springer: Cham, Switzerland, 2019; Volume 373, pp. 485–495. [Google Scholar] [CrossRef]
  73. d’Afflisio, E.; Braca, P.; Millefiori, L.M.; Willett, P. Detecting Anomalous Deviations from Standard Maritime Routes Using the Ornstein–Uhlenbeck Process. IEEE Trans. Signal Process. 2018, 66, 6474–6487. [Google Scholar] [CrossRef] [Green Version]
  74. d’Afflisio, E.; Braca, P.; Millefiori, L.M.; Willett, P. Maritime Anomaly Detection Based on Mean-Reverting Stochastic Processes Applied to a Real-World Scenario. In Proceedings of the 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1171–1177. [Google Scholar] [CrossRef] [Green Version]
  75. d’Afflisio, E.; Braca, P.; Willett, P. Malicious AIS Spoofing and Abnormal Stealth Deviations: A Comprehensive Statistical Framework for Maritime Anomaly Detection. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 2093–2108. [Google Scholar] [CrossRef]
  76. d’Afflisio, E.; Braca, P.; Chisci, L.; Battistelli, G.; Willett, P. Maritime Anomaly Detection of Malicious Data Spoofing and Stealth Deviations from Nominal Route Exploiting Heterogeneous Sources of Information. In Proceedings of the 2021 IEEE 24th International Conference on Information Fusion (FUSION), Sun City, South Africa, 1–4 November 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–7. [Google Scholar] [CrossRef]
  77. Bauw, M.; Velasco-Forero, S.; Angulo, J.; Adnet, C.; Airiau, O. From Unsupervised to Semi-Supervised Anomaly Detection Methods for HRRP Targets. In Proceedings of the 2020 IEEE Radar Conference (RadarConf20), Florence, Italy, 21–25 September 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar]
  78. Van Loi, N.; Kien, T.T.; Hop, T.V.; Van Khuong, N. Abnormal Moving Speed Detection Using Combination of Kernel Density Estimator and DBSCAN for Coastal Surveillance Radars. In Proceedings of the 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 27–28 February 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 143–147. [Google Scholar] [CrossRef]
  79. Fahn, C.; Ling, J.; Yeh, M.; Huang, P.; Wu, M. Abnormal Maritime Activity Detection in Satellite Image Sequences Using Trajectory Features. IJFCC 2019, 8, 29–33. [Google Scholar] [CrossRef]
  80. Czaplewski, B.; Dzwonkowski, M. A Novel Approach Exploiting Properties of Convolutional Neural Networks for Vessel Movement Anomaly Detection and Classification. ISA Trans. 2022, 119, 1–16. [Google Scholar] [CrossRef]
  81. Gözalan, A.; John, O.; Lübcke, T.; Maier, A.; Reimann, M.; Richter, J.G.; Zverev, I. Assisting Maritime Search and Rescue (SAR) Personnel with AI-Based Speech Recognition and Smart Direction Finding. J. Mar. Sci. Eng. 2020, 8, 818. [Google Scholar] [CrossRef]
  82. Ruff, L.; Vandermeulen, R.A.; Görnitz, N.; Binder, A.; Müller, E.; Müller, K.R.; Kloft, M. Deep Semi-Supervised Anomaly Detection. In Proceedings of the International Conference on Learning Representations, Addis Ababa, Ethiopia, 26–30 April 2020. [Google Scholar] [CrossRef]
  83. Samek, W.; Müller, K.R. Towards Explainable Artificial Intelligence. In Explainable AI: Interpreting, Explaining and Visualizing Deep Learning; Springer: Cham, Switzerland, 2019; Volume 11700, pp. 5–22. [Google Scholar] [CrossRef] [Green Version]
  84. Wang, Y.; Chung, S.H. Artificial Intelligence in Safety-Critical Systems: A Systematic Review. Ind. Manag. Data Syst. 2021, 122, 442–470. [Google Scholar] [CrossRef]
  85. Constapel, M.; Koch, P.; Burmeister, H.C. On the Implementation of a Rule-Based System to Perform Assessment of COLREGs Onboard Maritime Autonomous Surface Ships. J. Phys. Conf. Ser. 2022, 2311, 012033. [Google Scholar] [CrossRef]
  86. Burmeister, H.C.; Scheidweiler, T.; Reimann, M.; Jahn, C. Assessing Safety Effects of Digitization with the European Maritime Simulator Network EMSN: The Sea Traffic Management Case. TransNav. Int. J. Mar. Navig. Saf. Sea Transp. 2020, 14, 91–96. [Google Scholar] [CrossRef]
Figure 1. Literature-review process comprising collection, selection and classification steps.
Figure 1. Literature-review process comprising collection, selection and classification steps.
Jmse 11 01174 g001
Figure 2. Counts of publications retrievable with the defined search phrase via Google Scholar. The deep black bars are the years that are within the scope of this survey.
Figure 2. Counts of publications retrievable with the defined search phrase via Google Scholar. The deep black bars are the years that are within the scope of this survey.
Jmse 11 01174 g002
Figure 3. Counts of utilized data sources, i.e., communication and sensor types, as data sources in reviewed approaches. Data sources are abbreviated as follows: AIS (A), camera (C), radar (R) and other (O). Abbreviations are concatenated when data sources are combined.
Figure 3. Counts of utilized data sources, i.e., communication and sensor types, as data sources in reviewed approaches. Data sources are abbreviated as follows: AIS (A), camera (C), radar (R) and other (O). Abbreviations are concatenated when data sources are combined.
Jmse 11 01174 g003
Figure 4. Counts of addressed anomaly types in reviewed approaches.
Figure 4. Counts of addressed anomaly types in reviewed approaches.
Jmse 11 01174 g004
Figure 5. Counts of underlying techniques of reviewed approaches.
Figure 5. Counts of underlying techniques of reviewed approaches.
Jmse 11 01174 g005
Figure 6. Counts of detection techniques combined with anomaly types.
Figure 6. Counts of detection techniques combined with anomaly types.
Jmse 11 01174 g006
Table 1. Overview of communication and sensor technologies of VTS as defined by IALA in Guideline G1111 [17].
Table 1. Overview of communication and sensor technologies of VTS as defined by IALA in Guideline G1111 [17].
TechnologyDescription
RadarA radar system emits electro-magnetive waves and detects the echo signal of reflected waves by targets such as vessels [18]. Direction and distance to the target as well as its motion direction and velocity can be deduced.
AISAIS is a standardized, automatic communication system which is used over transceivers [17,19]. It is used by vessels, VTS and for (virtual) aids to navigation. Depending on the message type, the message contains static, dynamic and voyage-related information about the sender.
Environmental monitoringVarious relevant environmental conditions can be monitored [17]. Common is the measurement and monitoring of hydrological (e.g., height of tide, current speed or ice coverage) and meteorological (e.g., wind speed, wind direction or visibility) conditions.
Electro-optical systemsElectro-optical systems refer to imaging devices that can be, for example, daylight or night-vision camera surveillance [17]. Usually, the field of view of the utilized cameras is adjustable.
Radio communicationsSpoken communication takes place over VHF radio communication systems [17]. VHF is used to enable real-time situation assessment.
Radio direction findersA radio direction-finder device is able to deduce the bearing to a VHF emitting station. The bearing can be associated with an AIS target in the vicinity.
Long-range sensorsFor situation awareness beyond the operation range of short-range sensors (e.g., radar or AIS), long-range sensors can be applied [17]. Common examples are the so-called long-range identification and tracking system or satellite-based AIS.
Table 2. Considered generic anomaly types in the review classification scheme.
Table 2. Considered generic anomaly types in the review classification scheme.
Anomaly TypeDescription
Kinematic deviationDeviation in a single kinematic parameter, e.g., speed over ground or course over ground.
Route deviationDeviation in a route due to deviation in the sequence of positions.
Collision riskClose approach between vessels or vessels and (abstract) objects. Objects can be visible on water (e.g., bouys) as well as regulatoric (e.g., traffic separation schemes as abstract objects) or physical (e.g., shallow water or coastlines) confinements of the waterway.
Zone entryPenetration of regulatorily or physically defined zones.
InconsistencyInformation inconsistency in the situation awareness either due to sensors providing contrasting information or one sensor providing false data.
Table 3. Considered anomaly-detection techniques in the review classification scheme.
Table 3. Considered anomaly-detection techniques in the review classification scheme.
Detection TechniqueDescription
Descriptive StatisticsDetection techniques based on descriptive statistics are data-driven. They rely on data sets which are used to derive a statistical distribution to model behaviour patterns [6,22]. Here, normalcy is defined as any pattern that is close to the mean behaviour pattern. An anomalous behaviour pattern would be anything that deviates too far from the mean, thus the term outlier. The degree or threshold of an anomaly is given by the distance from the mean.
Stochastic ProcessesBehaviour patterns can be described as stochastic processes. In this case, a model is created which is able to describe the change in a pattern (or a state) over time randomly or due to influential conditions. Generally known approaches that fall into this technique are Markov models or models based on Bayesian statistics [22].
ClusteringThe technique of clustering comprises approaches for the creation of clusters and which are based on Machine Learning (ML). There exists a variety of clustering algorithms which all serve specific purposes [23].
ClassificationClassification can be performed through various approaches. In this review, only ML-based classification approaches are counted as classification approaches. Similarly to clustering, there is a broad variety of classification algorithms [23].
Neural network-basedNeural networks (NN) are universal function approximators and, thus, theoretically can address every problem type. Any NN-based detection approach is considered under this technique [24].
Rule-basedRule-based systems build upon human-made rules. The other aforementioned techniques rely on sets and interactions of rules, too; however, this technique crucially differs in its simpler technical structure and the intuitive explainability of decision processes [12].
Table 4. Screened publications grouped by data sources and denoted according to detection techniques and anomaly types. Data sources are abbreviated as follows: AIS (A), camera (C), radar (R) and other (O). Abbreviations are concatenated when data sources are combined. Filled circle (●) when a technique or feature is used in publication, otherwise empty circle (○).
Table 4. Screened publications grouped by data sources and denoted according to detection techniques and anomaly types. Data sources are abbreviated as follows: AIS (A), camera (C), radar (R) and other (O). Abbreviations are concatenated when data sources are combined. Filled circle (●) when a technique or feature is used in publication, otherwise empty circle (○).
Publication Technique Anomaly
Data SourceAuthorYear Descriptive StatisticsStochastic ProcessesClusteringClassificationNN-BasedRule-BasedOther Route DeviationKinematic DeviationCollision RiskZone EntryInconsistency
AAbreu et al.2021 [25,26]
Cai et al.2018 [27]
Chatzikokolakis et al.2019 [28]
Chen et al.2022 [29]
Daranda and Dzemyda2020 [30]
Eljabu et al.2021 [31]
Filipiak et al.2018 [32]
2019 [33]
Ford et al.2018 [34]
Forti et al.2018–2022 [35,36,37,38,39]
Fu et al.2017 [40]
Goodarzi and Shaabani2019 [41]
Guo et al.2021 [42]
Han et al.2020 [43]
Hu et al.2022 [44]
Karatas et al.2021 [45]
Keane2017 [46]
Kontopoulos et al.2020 [47]
Kontopoulos et al.2020 [48]
Krüger2019 [49]
Nguyen et al.2018–2021 [50,51,52,53]
Patroumpas et al.2017 [54]
Roberts2019 [55]
Rong et al.2020 [56]
Singh and Heymann2020 [57]
Singh and Heymann2020 [58]
Tyasayumranani et al.2022 [59]
Wang et al.2020 [60]
Wang2020 [61]
Xia and Gao2020 [62]
Yan et al.2022 [63]
Zhao and Shi2019 [64]
Zhen et al.2017 [65]
Zhou et al.2019 [66]
Zissis et al.2020 [67]
Zor and Kittler2017 [68]
Table 5. Screened publications grouped by data sources and denoted according to detection techniques and anomaly types. Data sources are abbreviated as follows: AIS (A), camera (C), radar (R) and other (O). Abbreviations are concatenated when data sources are combined. Filled circle (●) when a technique or feature is used in publication, otherwise empty circle (○).
Table 5. Screened publications grouped by data sources and denoted according to detection techniques and anomaly types. Data sources are abbreviated as follows: AIS (A), camera (C), radar (R) and other (O). Abbreviations are concatenated when data sources are combined. Filled circle (●) when a technique or feature is used in publication, otherwise empty circle (○).
Publication Technique Anomaly
Data SourceAuthorYear Descriptive StatisticsStochastic ProcessesClusteringClassificationNN-BasedRule-BasedOther Route DeviationKinematic DeviationCollision RiskZone EntryInconsistency
AOColeman et al.2020 [69]
Mazzarella et al.2017 [70]
Ray2018 [71]
AROThomopoulos et al.2019 [72]
ARd’Afflisio et al.2018 [73,74]
2021 [75,76]
RBauw et al.2020 [77]
Van Loi et al.2020 [78]
CFahn et al.2019 [79]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Stach, T.; Kinkel, Y.; Constapel, M.; Burmeister, H.-C. Maritime Anomaly Detection for Vessel Traffic Services: A Survey. J. Mar. Sci. Eng. 2023, 11, 1174. https://doi.org/10.3390/jmse11061174

AMA Style

Stach T, Kinkel Y, Constapel M, Burmeister H-C. Maritime Anomaly Detection for Vessel Traffic Services: A Survey. Journal of Marine Science and Engineering. 2023; 11(6):1174. https://doi.org/10.3390/jmse11061174

Chicago/Turabian Style

Stach, Thomas, Yann Kinkel, Manfred Constapel, and Hans-Christoph Burmeister. 2023. "Maritime Anomaly Detection for Vessel Traffic Services: A Survey" Journal of Marine Science and Engineering 11, no. 6: 1174. https://doi.org/10.3390/jmse11061174

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop