A probabilistic risk analysis for multimodal entry control

Research highlights? Multimodal system prevents undesired persons from entering secure areas. ? Based on biometric sensors and intelligent methods that learn from past behavior. ? Intelligent layer is extended by meta-learning and Bayesian network. ? Results represent an important improvement in detecting security attacks. Entry control is an important security measure that prevents undesired persons from entering secure areas. The advanced risk analysis presented in this paper makes it possible to distinguish between acceptable and unacceptable entries, based on several entry sensors, such as fingerprint readers, and intelligent methods that learn behavior from previous entries. We have extended the intelligent layer in two ways: first, by adding a meta-learning layer that combines the output of specific intelligent modules, and second, by constructing a Bayesian network to integrate the predictions of the learning and meta-learning modules. The obtained results represent an important improvement in detecting security attacks.

[1]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[2]  Jon T. S. Quah,et al.  Real Time Credit Card Fraud Detection using Computational Intelligence , 2007, 2007 International Joint Conference on Neural Networks.

[3]  D.L. Wilson Intelligent video systems for perimeter and secured entry access control , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.

[4]  S. K. Satpathy,et al.  An Adaptive Modular Approach to the Mining of Sensor Network Data , 2011 .

[5]  P. J. Williams,et al.  Data fusion on a distributed heterogeneous sensor network , 2006, SPIE Defense + Commercial Sensing.

[6]  Lykourgos Petropoulakis,et al.  An ambient software monitoring system for unsupervised user modelling , 2005, Expert Syst. Appl..

[7]  S. Kovacic,et al.  Motion Based Human Identification Using Histograms of Optical Flow , 2007 .

[8]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .

[9]  Te-Hsiu Sun,et al.  Using backpropagation neural network for face recognition with 2D + 3D hybrid information , 2008, Expert Syst. Appl..

[10]  H. Lan,et al.  SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .

[11]  Huaiqing Wang,et al.  Intelligent agent-assisted decision support systems: Integration of knowledge discovery, knowledge analysis, and group decision support , 1997 .

[12]  Mitsuo Gen,et al.  Unusual human behavior recognition using evolutionary technique , 2009, Comput. Ind. Eng..

[13]  Ricardo Vilalta,et al.  Metalearning - Applications to Data Mining , 2008, Cognitive Technologies.

[14]  Ian H. Witten,et al.  Data mining - practical machine learning tools and techniques, Second Edition , 2005, The Morgan Kaufmann series in data management systems.

[15]  Ricardo Vilalta,et al.  A Perspective View and Survey of Meta-Learning , 2002, Artificial Intelligence Review.

[16]  Thomas J. Alexandre,et al.  Biometrics on smart cards: An approach to keyboard behavioral signature , 1997, Future Gener. Comput. Syst..

[17]  Markus M. Breunig Quality Driven Database Mining (Zusammenfassung) , 2001, Datenbank Rundbr..

[18]  Siu-Yeung Cho,et al.  A local experts organization model with application to face emotion recognition , 2009, Expert Syst. Appl..

[19]  Ye Zhang,et al.  Irregular Behavior Recognition Based on Two Types of Treading Tracks Under Particular Scenes , 2007, KSEM.

[20]  Wahyudi,et al.  Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS) for Building Security , 2007 .

[21]  John J. McCarthy,et al.  The Rule Engine for the Java Platform , 2008 .

[22]  Ian Horrocks,et al.  From SHIQ and RDF to OWL: the making of a Web Ontology Language , 2003, J. Web Semant..

[23]  Julian Fiérrez,et al.  Adapted user-dependent multimodal biometric authentication exploiting general information , 2005, Pattern Recognit. Lett..

[24]  Markus M. Breunig Quality driven database mining , 2001 .