Skip to main content

Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity

  • Chapter
Behavior Computing

Abstract

Secure physical environments such as government, financial or military facilities are vulnerable to misuse by authorized users. To protect against potentially suspicious actions, data about the movement of users can be captured through the use of RFID tags and sensors, and patterns of suspicious behaviour detected in the captured data. This chapter presents four types of suspicious behavioural patterns, namely temporal, repetitive, displacement and out-of-sequence patterns, that may be observed in such a secure physical environment. We model the physical environment and apply algorithms for the detection of suspicious patterns to logs of RFID access data. Finally we present the design and implementation of an integrated system which uses our algorithms to detect suspicious behavioural patterns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: IEEE Workshop on Information Assurance and Security, pp. 11–16. IEEE Press, New York (2001)

    Google Scholar 

  2. Beale, J., Foster, J.C., Posluns, J., Russell, R., Caswell, B.: Snort 2.0 Intrusion Detection. Syngress, Rockland (2003)

    Google Scholar 

  3. Brandenburg University of Technology: Intrusion detection systems list and bibliography. http://www-rnks.informatik.tu-cottbus.de/en/node/209 (2004)

  4. Cao, L.: In-depth behavior understanding and use: The behavior informatics approach. Inf. Sci. 180, 3067–3085 (2010). doi:10.1016/j.ins.2010.03.025

    Article  Google Scholar 

  5. Cao, L., Zhao, Y., Zhang, C.: Mining impact-targeted activity patterns in imbalanced data. IEEE Trans. Knowl. Data Eng. 20, 1053–1066 (2008). doi:10.1109/TKDE.2007.190635

    Article  Google Scholar 

  6. Cao, L., Zhao, Y., Zhang, C., Zhang, H.: Activity mining: From activities to actions. Int. J. Inform. Technol. Decis. Mak. 7(02), 259–273 (2008). doi:10.1142/S0219622008002934

    Article  MATH  Google Scholar 

  7. Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intell. Syst. 15(2), 32–41 (2000)

    Article  Google Scholar 

  8. Intellitactics, Inc.: Intellitactics security manager. http://www.intellitactics.com/int/products/securitymanager.asp (2009)

  9. Isoda, Y., Kurakake, S., Nakano, H.: Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states. In: 18th International Conference on Advanced Information Networking and Applications, pp. 512–517. IEEE Press, New York (2004)

    Google Scholar 

  10. Kumar, S., Spafford, E.H.: A pattern matching model for misuse intrusion detection. In: 17th National Computer Security Conference, pp. 11–21 (1994)

    Google Scholar 

  11. Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120–132. IEEE Press, New York (1999)

    Google Scholar 

  12. Leong, A., Fong, S., Siu, S.: Smart card-based irregular access patterns detection system. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 546–553. IEEE Press, New York (2004)

    Chapter  Google Scholar 

  13. Li, Q.H., Xiong, J.J., Yang, H.B.: An efficient mining algorithm for frequent pattern in intrusion detection. In: International Conference on Machine Learning and Cybernetic, pp. 138–142. IEEE Press, New York (2003)

    Google Scholar 

  14. Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.P.: LANDMARC: Indoor location sensing using active RFID. In: IEEE International Conference on Pervasive Computing and Communications, p. 407. IEEE Comput. Soc., Los Alamitos (2003)

    Google Scholar 

  15. Portnoy, L.: Intrusion detection with unlabeled data using clustering. Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University (2000)

    Google Scholar 

  16. Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. IET Electron. Lett. 38(13), 663–664 (2002)

    Article  Google Scholar 

  17. Thornton, F., Haines, B., Das, A., Campbell, A.: RFID Security. Syngress, Rockland (2006)

    Google Scholar 

  18. Trend Micro, Inc.: OSSEC manual. http://www.ossec.net/main/manual (2009)

  19. US Department of Justice: CCTV: Constant cameras track violators. Natl. Inst. Justice J. 249, 16–23 (2003)

    Google Scholar 

  20. Wikipedia contributors: Protocol-based intrusion detection system. http://en.wikipedia.org/wiki/Protocol-based_intrusion_detection_system (2009)

  21. Willis, S., Helal, S.: A passive RFID information grid for location and proximity sensing for the blind user. Technical report, University of Florida (2004)

    Google Scholar 

Download references

Acknowledgement

This research was funded by the Research Committee, University of Macau under grant number RG076/04-05S/BARP/FST.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert P. Biuk-Aghai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London

About this chapter

Cite this chapter

Biuk-Aghai, R.P., Si, YW., Fong, S., Yan, PF. (2012). Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity. In: Cao, L., Yu, P. (eds) Behavior Computing. Springer, London. https://doi.org/10.1007/978-1-4471-2969-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2969-1_15

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2968-4

  • Online ISBN: 978-1-4471-2969-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics