Skip to main content
Top

2012 | OriginalPaper | Chapter

15. Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity

Authors : Robert P. Biuk-Aghai, Yain-Whar Si, Simon Fong, Peng-Fan Yan

Published in: Behavior Computing

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secure physical environments such as government, financial or military facilities are vulnerable to misuse by authorized users. To protect against potentially suspicious actions, data about the movement of users can be captured through the use of RFID tags and sensors, and patterns of suspicious behaviour detected in the captured data. This chapter presents four types of suspicious behavioural patterns, namely temporal, repetitive, displacement and out-of-sequence patterns, that may be observed in such a secure physical environment. We model the physical environment and apply algorithms for the detection of suspicious patterns to logs of RFID access data. Finally we present the design and implementation of an integrated system which uses our algorithms to detect suspicious behavioural patterns.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: IEEE Workshop on Information Assurance and Security, pp. 11–16. IEEE Press, New York (2001) Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: IEEE Workshop on Information Assurance and Security, pp. 11–16. IEEE Press, New York (2001)
2.
go back to reference Beale, J., Foster, J.C., Posluns, J., Russell, R., Caswell, B.: Snort 2.0 Intrusion Detection. Syngress, Rockland (2003) Beale, J., Foster, J.C., Posluns, J., Russell, R., Caswell, B.: Snort 2.0 Intrusion Detection. Syngress, Rockland (2003)
7.
go back to reference Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intell. Syst. 15(2), 32–41 (2000) CrossRef Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intell. Syst. 15(2), 32–41 (2000) CrossRef
9.
go back to reference Isoda, Y., Kurakake, S., Nakano, H.: Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states. In: 18th International Conference on Advanced Information Networking and Applications, pp. 512–517. IEEE Press, New York (2004) Isoda, Y., Kurakake, S., Nakano, H.: Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states. In: 18th International Conference on Advanced Information Networking and Applications, pp. 512–517. IEEE Press, New York (2004)
10.
go back to reference Kumar, S., Spafford, E.H.: A pattern matching model for misuse intrusion detection. In: 17th National Computer Security Conference, pp. 11–21 (1994) Kumar, S., Spafford, E.H.: A pattern matching model for misuse intrusion detection. In: 17th National Computer Security Conference, pp. 11–21 (1994)
11.
go back to reference Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120–132. IEEE Press, New York (1999) Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120–132. IEEE Press, New York (1999)
12.
go back to reference Leong, A., Fong, S., Siu, S.: Smart card-based irregular access patterns detection system. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 546–553. IEEE Press, New York (2004) CrossRef Leong, A., Fong, S., Siu, S.: Smart card-based irregular access patterns detection system. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 546–553. IEEE Press, New York (2004) CrossRef
13.
go back to reference Li, Q.H., Xiong, J.J., Yang, H.B.: An efficient mining algorithm for frequent pattern in intrusion detection. In: International Conference on Machine Learning and Cybernetic, pp. 138–142. IEEE Press, New York (2003) Li, Q.H., Xiong, J.J., Yang, H.B.: An efficient mining algorithm for frequent pattern in intrusion detection. In: International Conference on Machine Learning and Cybernetic, pp. 138–142. IEEE Press, New York (2003)
14.
go back to reference Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.P.: LANDMARC: Indoor location sensing using active RFID. In: IEEE International Conference on Pervasive Computing and Communications, p. 407. IEEE Comput. Soc., Los Alamitos (2003) Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.P.: LANDMARC: Indoor location sensing using active RFID. In: IEEE International Conference on Pervasive Computing and Communications, p. 407. IEEE Comput. Soc., Los Alamitos (2003)
15.
go back to reference Portnoy, L.: Intrusion detection with unlabeled data using clustering. Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University (2000) Portnoy, L.: Intrusion detection with unlabeled data using clustering. Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University (2000)
16.
go back to reference Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. IET Electron. Lett. 38(13), 663–664 (2002) CrossRef Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. IET Electron. Lett. 38(13), 663–664 (2002) CrossRef
17.
go back to reference Thornton, F., Haines, B., Das, A., Campbell, A.: RFID Security. Syngress, Rockland (2006) Thornton, F., Haines, B., Das, A., Campbell, A.: RFID Security. Syngress, Rockland (2006)
19.
go back to reference US Department of Justice: CCTV: Constant cameras track violators. Natl. Inst. Justice J. 249, 16–23 (2003) US Department of Justice: CCTV: Constant cameras track violators. Natl. Inst. Justice J. 249, 16–23 (2003)
21.
go back to reference Willis, S., Helal, S.: A passive RFID information grid for location and proximity sensing for the blind user. Technical report, University of Florida (2004) Willis, S., Helal, S.: A passive RFID information grid for location and proximity sensing for the blind user. Technical report, University of Florida (2004)
Metadata
Title
Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity
Authors
Robert P. Biuk-Aghai
Yain-Whar Si
Simon Fong
Peng-Fan Yan
Copyright Year
2012
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-2969-1_15

Premium Partner