3rd International ICST Symposium on Information Assurance and Security

Research Article

A Security Model for Detecting Suspicious Patterns in Physical Environment

  • @INPROCEEDINGS{10.1109/IAS.2007.89,
        author={Simon  Fong and Zhuang  Yan},
        title={A Security Model for Detecting Suspicious Patterns in Physical Environment},
        proceedings={3rd International ICST Symposium on  Information Assurance and Security},
        publisher={IEEE},
        proceedings_a={IAS},
        year={2007},
        month={9},
        keywords={Access control  Computer networks  Data mining  Information security  Intrusion detection  Joining processes  Operating systems  Permission  Smart cards  Virtual environment},
        doi={10.1109/IAS.2007.89}
    }
    
  • Simon Fong
    Zhuang Yan
    Year: 2007
    A Security Model for Detecting Suspicious Patterns in Physical Environment
    IAS
    IEEE
    DOI: 10.1109/IAS.2007.89
Simon Fong1,*, Zhuang Yan1
  • 1: Faculty of Science and Technology, University of Macau
*Contact email: ccfong@umac.mo

Abstract

In the view of escalating global threat in security, it is imperative to have an automated detection system that can pick up suspicious patterns of human movement in physical environments. It can give a forewarning before a planned attack happens or an ultimate security is breached. In the past, significant research on the intrusion detection was established, but limited to virtual environments like computer networks and operating systems. In this paper, we proposed a general security model for detecting suspicious patterns in physical environment. Suspicious patterns are subtle and we showed that they can be detected via an experiment.