The role of visualization and interaction in maritime anomaly detection

The surveillance of large sea, air or land areas normally involves the analysis of large volumes of heterogeneous data from multiple sources. Timely detection and identification of anomalous behavior or any threat activity is an important objective for enabling homeland security. While it is worth acknowledging that many existing mining applications support identification of anomalous behavior, autonomous anomaly detection systems for area surveillance are rarely used in the real world. We argue that such capabilities and applications present two critical challenges: (1) they need to provide adequate user support and (2) they need to involve the user in the underlying detection process. In order to encourage the use of anomaly detection capabilities in surveillance systems, this paper analyzes the challenges that existing anomaly detection and behavioral analysis approaches present regarding their use and maintenance by users. We analyze input parameters, detection process, model representation and outcomes. We discuss the role of visualization and interaction in the anomaly detection process. Practical examples from our current research within the maritime domain illustrate key aspects presented.

[1]  F. Johansson,et al.  Detection of vessel anomalies - a Bayesian network approach , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[2]  Allen M. Waxman,et al.  Associative Learning of Vessel Motion Patterns for Maritime Situation Awareness , 2006, 2006 9th International Conference on Information Fusion.

[3]  George H. John Enhancements to the data mining process , 1997 .

[4]  Rikard Laxhammar,et al.  Anomaly detection for sea surveillance , 2008, 2008 11th International Conference on Information Fusion.

[5]  Maria Riveiro,et al.  Explanation Methods for Bayesian Networks : review and application to a maritime scenario , 2009 .

[6]  Bradley J. Rhodes,et al.  Probabilistic associative learning of vessel motion patterns at multiple spatial scales for maritime situation awareness , 2007, 2007 10th International Conference on Information Fusion.

[7]  Dario Bruzzese,et al.  Visual Mining of Association Rules , 2008, Visual Data Mining.

[8]  Andreas Wierse,et al.  Information Visualization in Data Mining and Knowledge Discovery , 2001 .

[9]  Daniel A. Keim,et al.  Visual analytics: how much visualization and how much analytics? , 2010, SKDD.

[10]  Mark R. Morelande,et al.  Statistical analysis of motion patterns in AIS Data: Anomaly detection and motion prediction , 2008, 2008 11th International Conference on Information Fusion.

[11]  Tomoharu Iwata,et al.  Visualisation of Anomaly Using Mixture Model , 2004, KES.

[12]  Allen M. Waxman,et al.  Cognitively-Inspired Motion Pattern Learning & Analysis Algorithms for Higher-Level Fusion and Automated Scene Understanding , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[13]  Michael Bosse,et al.  SeeCoast port surveillance , 2006, SPIE Defense + Commercial Sensing.

[14]  Chris North,et al.  Workshop Report: Information Visualization–Human-Centered Issues in Visual Representation, Interaction, and Evaluation , 2007, Inf. Vis..

[15]  Göran Falkman,et al.  Anomaly detection in sea traffic - A comparison of the Gaussian Mixture Model and the Kernel Density Estimator , 2009, 2009 12th International Conference on Information Fusion.

[16]  Kwan-Liu Ma,et al.  Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP , 2004, VizSEC/DMSEC '04.

[17]  Florian Mansmann,et al.  Visual analysis of network traffic: interactive monitoring, detection, and interpretation of security threats , 2008 .

[18]  V. Kharchenko,et al.  Application of the intellectual decision making system for vessel traffic control , 2002, 14th International Conference on Microwaves, Radar and Wireless Communications. MIKON - 2002. Conference Proceedings (IEEE Cat.No.02EX562).

[19]  Tom Ziemke,et al.  Improving maritime anomaly detection and situation awareness through interactive visualization , 2008, 2008 11th International Conference on Information Fusion.

[20]  Yarden Livnat,et al.  A visualization paradigm for network intrusion detection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[21]  Kwan-Liu Ma,et al.  Interactive Visualization for Network and Port Scan Detection , 2005, RAID.

[22]  James B. Kraiman,et al.  Automated anomaly detection processor , 2002, SPIE Defense + Commercial Sensing.

[23]  Ali A. Ghorbani,et al.  A novel visualization technique for network anomaly detection , 2004, PST.

[24]  Penny Rheingans,et al.  Visualizing high-dimensional predictive model quality , 2000, Proceedings Visualization 2000. VIS 2000 (Cat. No.00CH37145).

[25]  Vladik Kreinovich,et al.  Best student paper award , 1996, Reliab. Comput..

[26]  Jean Roy,et al.  Anomaly detection in the maritime domain , 2008, SPIE Defense + Commercial Sensing.

[27]  Yang Cai,et al.  Interactive Visualization of Network Anomalous Events , 2009, ICCS.

[28]  Georgios C. Anagnostopoulos,et al.  Knowledge-Based Intelligent Information and Engineering Systems , 2003, Lecture Notes in Computer Science.

[29]  Finn Verner Jensen,et al.  Sensitivity Analysis in Bayesian Networks , 1995, ECSQARU.

[30]  Lars Niklasson,et al.  Trajectory clustering for coastal surveillance , 2007, 2007 10th International Conference on Information Fusion.

[31]  Tom Ziemke,et al.  Reasoning about anomalies: a study of the analytical process of detecting and identifying anomalous behavior in maritime traffic data , 2009, Defense + Commercial Sensing.

[32]  Stefan Axelsson,et al.  Understanding Intrusion Detection Through Visualization , 2006, Advances in Information Security.

[33]  Chris North,et al.  07221 Executive Summary - Information Visualization - Human-Centered Issues in Visual Representation, Interaction, and Evaluation , 2007, Information Visualization - Human-Centered Issues in Visual Representation, Interaction, and Evaluation.

[34]  Egils Sviestins,et al.  Rule-based situation assessment for sea surveillance , 2006, SPIE Defense + Commercial Sensing.

[35]  Maria Riveiro,et al.  Evaluation of uncertainty visualization techniques for information fusion , 2007, 2007 10th International Conference on Information Fusion.

[36]  Heikki Mannila,et al.  Principles of Data Mining , 2001, Undergraduate Topics in Computer Science.

[37]  Daniel A. Keim,et al.  Information Visualization and Visual Data Mining , 2002, IEEE Trans. Vis. Comput. Graph..

[38]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[39]  Christopher A. Badurek,et al.  Review of Information visualization in data mining and knowledge discovery by Usama Fayyad, Georges G. Grinstein, and Andreas Wierse. Morgan Kaufmann 2002 , 2003 .

[40]  Georges G. Grinstein,et al.  Visualization for enhancing the data mining process , 2001, SPIE Defense + Commercial Sensing.

[41]  B.J. Rhodes,et al.  Maritime situation monitoring and awareness using learning mechanisms , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[42]  Jarke J. van Wijk,et al.  Eurographics/ Ieee-vgtc Symposium on Visualization 2009 Visualization of Vessel Movements , 2022 .