Security in Physical Environments : Algorithms and System for Automated Detection of Suspicious Activity

Secure physical environments are vulnerable to misuse by authorized users. To protect against potentially suspicious actions, data about the movement of users can be captured through the use of RFID tags and sensors, and patterns of suspicious behaviour detected in the captured data. This paper presents four types of suspicious patterns, algorithms for their detection, and the design and implementation of an integrated system which uses our algorithms for the detection of suspicious patterns in access data of physical environments.

[1]  Jeffrey Posluns,et al.  Snort 2.0 Intrusion Detection , 2003 .

[2]  Hartmut Pohl,et al.  RFID security , 2004, Inf. Secur. Tech. Rep..

[3]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[4]  Yiguo Qiao,et al.  Anomaly intrusion detection method based on HMM , 2002 .

[5]  Simon Fong,et al.  Smart card-based irregular access patterns detection system , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[6]  Shoji Kurakake,et al.  Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[7]  Eugene H. Spafford,et al.  A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .

[8]  Lawrence B. Holder,et al.  Graph-Based Data Mining , 2000, IEEE Intell. Syst..

[9]  Zhang Ning-rong An Efficient Mining Algorithm for Frequent Pattern in Intrusion Detection , 2005 .

[10]  Scooter Willis Computer A Passive RFID Information Grid for Location and Proximity Sensing for the Blind User , 2004 .

[11]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[12]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[13]  Sushil Jajodia,et al.  ADAM: Detecting Intrusions by Data Mining , 2001 .