Skip to main content

2012 | OriginalPaper | Buchkapitel

15. Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity

verfasst von : Robert P. Biuk-Aghai, Yain-Whar Si, Simon Fong, Peng-Fan Yan

Erschienen in: Behavior Computing

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secure physical environments such as government, financial or military facilities are vulnerable to misuse by authorized users. To protect against potentially suspicious actions, data about the movement of users can be captured through the use of RFID tags and sensors, and patterns of suspicious behaviour detected in the captured data. This chapter presents four types of suspicious behavioural patterns, namely temporal, repetitive, displacement and out-of-sequence patterns, that may be observed in such a secure physical environment. We model the physical environment and apply algorithms for the detection of suspicious patterns to logs of RFID access data. Finally we present the design and implementation of an integrated system which uses our algorithms to detect suspicious behavioural patterns.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: IEEE Workshop on Information Assurance and Security, pp. 11–16. IEEE Press, New York (2001) Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: IEEE Workshop on Information Assurance and Security, pp. 11–16. IEEE Press, New York (2001)
2.
Zurück zum Zitat Beale, J., Foster, J.C., Posluns, J., Russell, R., Caswell, B.: Snort 2.0 Intrusion Detection. Syngress, Rockland (2003) Beale, J., Foster, J.C., Posluns, J., Russell, R., Caswell, B.: Snort 2.0 Intrusion Detection. Syngress, Rockland (2003)
7.
Zurück zum Zitat Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intell. Syst. 15(2), 32–41 (2000) CrossRef Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intell. Syst. 15(2), 32–41 (2000) CrossRef
9.
Zurück zum Zitat Isoda, Y., Kurakake, S., Nakano, H.: Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states. In: 18th International Conference on Advanced Information Networking and Applications, pp. 512–517. IEEE Press, New York (2004) Isoda, Y., Kurakake, S., Nakano, H.: Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states. In: 18th International Conference on Advanced Information Networking and Applications, pp. 512–517. IEEE Press, New York (2004)
10.
Zurück zum Zitat Kumar, S., Spafford, E.H.: A pattern matching model for misuse intrusion detection. In: 17th National Computer Security Conference, pp. 11–21 (1994) Kumar, S., Spafford, E.H.: A pattern matching model for misuse intrusion detection. In: 17th National Computer Security Conference, pp. 11–21 (1994)
11.
Zurück zum Zitat Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120–132. IEEE Press, New York (1999) Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120–132. IEEE Press, New York (1999)
12.
Zurück zum Zitat Leong, A., Fong, S., Siu, S.: Smart card-based irregular access patterns detection system. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 546–553. IEEE Press, New York (2004) CrossRef Leong, A., Fong, S., Siu, S.: Smart card-based irregular access patterns detection system. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 546–553. IEEE Press, New York (2004) CrossRef
13.
Zurück zum Zitat Li, Q.H., Xiong, J.J., Yang, H.B.: An efficient mining algorithm for frequent pattern in intrusion detection. In: International Conference on Machine Learning and Cybernetic, pp. 138–142. IEEE Press, New York (2003) Li, Q.H., Xiong, J.J., Yang, H.B.: An efficient mining algorithm for frequent pattern in intrusion detection. In: International Conference on Machine Learning and Cybernetic, pp. 138–142. IEEE Press, New York (2003)
14.
Zurück zum Zitat Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.P.: LANDMARC: Indoor location sensing using active RFID. In: IEEE International Conference on Pervasive Computing and Communications, p. 407. IEEE Comput. Soc., Los Alamitos (2003) Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.P.: LANDMARC: Indoor location sensing using active RFID. In: IEEE International Conference on Pervasive Computing and Communications, p. 407. IEEE Comput. Soc., Los Alamitos (2003)
15.
Zurück zum Zitat Portnoy, L.: Intrusion detection with unlabeled data using clustering. Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University (2000) Portnoy, L.: Intrusion detection with unlabeled data using clustering. Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University (2000)
16.
Zurück zum Zitat Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. IET Electron. Lett. 38(13), 663–664 (2002) CrossRef Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. IET Electron. Lett. 38(13), 663–664 (2002) CrossRef
17.
Zurück zum Zitat Thornton, F., Haines, B., Das, A., Campbell, A.: RFID Security. Syngress, Rockland (2006) Thornton, F., Haines, B., Das, A., Campbell, A.: RFID Security. Syngress, Rockland (2006)
19.
Zurück zum Zitat US Department of Justice: CCTV: Constant cameras track violators. Natl. Inst. Justice J. 249, 16–23 (2003) US Department of Justice: CCTV: Constant cameras track violators. Natl. Inst. Justice J. 249, 16–23 (2003)
21.
Zurück zum Zitat Willis, S., Helal, S.: A passive RFID information grid for location and proximity sensing for the blind user. Technical report, University of Florida (2004) Willis, S., Helal, S.: A passive RFID information grid for location and proximity sensing for the blind user. Technical report, University of Florida (2004)
Metadaten
Titel
Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity
verfasst von
Robert P. Biuk-Aghai
Yain-Whar Si
Simon Fong
Peng-Fan Yan
Copyright-Jahr
2012
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-2969-1_15

Premium Partner