school

UM E-Theses Collection (澳門大學電子學位論文庫)

Title

Detecting suspicious access patterns in secure physical environment

English Abstract

Security in physical environments has become increasingly important in the wake of terror and criminal activity, particularly over the past decade, One of the challenges isto identify activities that may not be outright illegal or breaches of security, but that are suspicious, i.e. where there is a possibility that these activities may lead to breaches of security. Technology such as RFID is used to track the access and movement of people in highly security physical environments. This thesis presents methods of detecting patterns of suspicious activity in logs collected by such physical access control systems. Traditional Intrusion Detection Systems (IDS) are based on matching the characterization of the attack and the tracking of the activities, and moreover data mining can make the appearance in our field. Either existing IDS [1] or SAD for physical world doesn't involve related detection measurement in our field. In this thesis, we have proposed a concrete detection model and develop a real-time suspicious access patterns detection system, which can extract principal features of access pattern and identify suspicious movements. Keywords: RFID, IDS, security, Data mining, physical environment, Simulation, Real-time, Tracking system, path finding, access event, control system, classification.

Issue date

2009.

Author

Yan, Peng Fan

Faculty

Faculty of Science and Technology

Department

Department of Computer and Information Science

Degree

M.Sc.

Subject

Data mining

Software patterns

Computer software

Supervisor

Fong, Chi Chiu

Biuk-Aghai, Robert P.

Files In This Item

View the Table of Contents

View the Abstract

Location
1/F Zone C
Library URL
991003690689706306