UM E-Theses Collection (澳門大學電子學位論文庫)
- Title
-
Detecting suspicious access patterns in secure physical environment
- English Abstract
-
Show / Hidden
Security in physical environments has become increasingly important in the wake of terror and criminal activity, particularly over the past decade, One of the challenges isto identify activities that may not be outright illegal or breaches of security, but that are suspicious, i.e. where there is a possibility that these activities may lead to breaches of security. Technology such as RFID is used to track the access and movement of people in highly security physical environments. This thesis presents methods of detecting patterns of suspicious activity in logs collected by such physical access control systems. Traditional Intrusion Detection Systems (IDS) are based on matching the characterization of the attack and the tracking of the activities, and moreover data mining can make the appearance in our field. Either existing IDS [1] or SAD for physical world doesn't involve related detection measurement in our field. In this thesis, we have proposed a concrete detection model and develop a real-time suspicious access patterns detection system, which can extract principal features of access pattern and identify suspicious movements. Keywords: RFID, IDS, security, Data mining, physical environment, Simulation, Real-time, Tracking system, path finding, access event, control system, classification.
- Issue date
-
2009.
- Author
-
Yan, Peng Fan
- Faculty
- Faculty of Science and Technology
- Department
- Department of Computer and Information Science
- Degree
-
M.Sc.
- Subject
-
Data mining
Software patterns
Computer software
- Supervisor
-
Fong, Chi Chiu
Biuk-Aghai, Robert P.
- Files In This Item
- Location
- 1/F Zone C
- Library URL
- 991003690689706306