Abstract
Secure physical environments such as government, financial or military facilities are vulnerable to misuse by authorized users. To protect against potentially suspicious actions, data about the movement of users can be captured through the use of RFID tags and sensors, and patterns of suspicious behaviour detected in the captured data. This chapter presents four types of suspicious behavioural patterns, namely temporal, repetitive, displacement and out-of-sequence patterns, that may be observed in such a secure physical environment. We model the physical environment and apply algorithms for the detection of suspicious patterns to logs of RFID access data. Finally we present the design and implementation of an integrated system which uses our algorithms to detect suspicious behavioural patterns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: IEEE Workshop on Information Assurance and Security, pp. 11–16. IEEE Press, New York (2001)
Beale, J., Foster, J.C., Posluns, J., Russell, R., Caswell, B.: Snort 2.0 Intrusion Detection. Syngress, Rockland (2003)
Brandenburg University of Technology: Intrusion detection systems list and bibliography. http://www-rnks.informatik.tu-cottbus.de/en/node/209 (2004)
Cao, L.: In-depth behavior understanding and use: The behavior informatics approach. Inf. Sci. 180, 3067–3085 (2010). doi:10.1016/j.ins.2010.03.025
Cao, L., Zhao, Y., Zhang, C.: Mining impact-targeted activity patterns in imbalanced data. IEEE Trans. Knowl. Data Eng. 20, 1053–1066 (2008). doi:10.1109/TKDE.2007.190635
Cao, L., Zhao, Y., Zhang, C., Zhang, H.: Activity mining: From activities to actions. Int. J. Inform. Technol. Decis. Mak. 7(02), 259–273 (2008). doi:10.1142/S0219622008002934
Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intell. Syst. 15(2), 32–41 (2000)
Intellitactics, Inc.: Intellitactics security manager. http://www.intellitactics.com/int/products/securitymanager.asp (2009)
Isoda, Y., Kurakake, S., Nakano, H.: Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states. In: 18th International Conference on Advanced Information Networking and Applications, pp. 512–517. IEEE Press, New York (2004)
Kumar, S., Spafford, E.H.: A pattern matching model for misuse intrusion detection. In: 17th National Computer Security Conference, pp. 11–21 (1994)
Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120–132. IEEE Press, New York (1999)
Leong, A., Fong, S., Siu, S.: Smart card-based irregular access patterns detection system. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 546–553. IEEE Press, New York (2004)
Li, Q.H., Xiong, J.J., Yang, H.B.: An efficient mining algorithm for frequent pattern in intrusion detection. In: International Conference on Machine Learning and Cybernetic, pp. 138–142. IEEE Press, New York (2003)
Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.P.: LANDMARC: Indoor location sensing using active RFID. In: IEEE International Conference on Pervasive Computing and Communications, p. 407. IEEE Comput. Soc., Los Alamitos (2003)
Portnoy, L.: Intrusion detection with unlabeled data using clustering. Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University (2000)
Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. IET Electron. Lett. 38(13), 663–664 (2002)
Thornton, F., Haines, B., Das, A., Campbell, A.: RFID Security. Syngress, Rockland (2006)
Trend Micro, Inc.: OSSEC manual. http://www.ossec.net/main/manual (2009)
US Department of Justice: CCTV: Constant cameras track violators. Natl. Inst. Justice J. 249, 16–23 (2003)
Wikipedia contributors: Protocol-based intrusion detection system. http://en.wikipedia.org/wiki/Protocol-based_intrusion_detection_system (2009)
Willis, S., Helal, S.: A passive RFID information grid for location and proximity sensing for the blind user. Technical report, University of Florida (2004)
Acknowledgement
This research was funded by the Research Committee, University of Macau under grant number RG076/04-05S/BARP/FST.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag London
About this chapter
Cite this chapter
Biuk-Aghai, R.P., Si, YW., Fong, S., Yan, PF. (2012). Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity. In: Cao, L., Yu, P. (eds) Behavior Computing. Springer, London. https://doi.org/10.1007/978-1-4471-2969-1_15
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2969-1_15
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2968-4
Online ISBN: 978-1-4471-2969-1
eBook Packages: Computer ScienceComputer Science (R0)