Application of Non-homogenous Hmm on Detecting Security Fence Breaching

نویسندگان

  • Ali Yousefi
  • Alireza A Dibazar
  • Theodore W. Berger
چکیده

In this paper, we present a reliable and accurate low computational complexity classifier for a fence intrusion detection sensor. The sensor, a standalone perimeter security sensor, classifies six different types of intrusion attempts on chain-link fences. The designed classifier, a dynamic sequence analyzer followed by a static classifier, obtains more than 95 percent accuracy in intrusion classification. Furthermore, its computational simplicity allows for the classifier to be run on the sensor’s 16 MIPS processor. The sequence analyzer, a HMM with time-dependent transition probability matrix; localizes the most probable time window of different intrusion classes. Then, the static classifier utilizes the analyzer output in intrusion classification. The implemented HMM, a specific set of non-homogenous HMM, has been defined and trained using the Baum-Welch technique. The nonhomogenous HMM accuracy in intrusion localization surpasses homogenous HMM; while the designed classifier achieves three percent improvement comparing to a HMM classifier.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Alert correlation and prediction using data mining and HMM

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

متن کامل

Intelligent Recognition of Acoustic and Vibration Threats for Security Breach Detection, Close Proximity Danger Identification, and Perimeter Protection1

The protection of perimeters in national, agricultural, airport, prison, and military sites, and residential areas against dangerous approaching human and vehicles when using human agents to provide security is expensive or unsafe. Because of this, acoustic/vibration signature identification of approaching human and vehicles threats has attracted increased attention. This paper addresses the de...

متن کامل

Speech enhancement based on hidden Markov model using sparse code shrinkage

This paper presents a new hidden Markov model-based (HMM-based) speech enhancement framework based on the independent component analysis (ICA). We propose analytical procedures for training clean speech and noise models by the Baum re-estimation algorithm and present a Maximum a posterior (MAP) estimator based on Laplace-Gaussian (for clean speech and noise respectively) combination in the HMM ...

متن کامل

Fence Monitoring - Experimental Evaluation of a Use Case for Wireless Sensor Networks

In-network data processing and event detection on resourceconstrained devices are widely regarded as distinctive and novel features of wireless sensor networks. The vision is that through cooperation of many sensor nodes the accuracy of event detection can be greatly improved. On the practical side however, little real-world experience exists in how far these goals can be achieved. In this pape...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010