RESEARCH PROPOSAL A MULTI-AGENT SENSOR BASED MODEL TO IMPROVE PHYSICAL PERIMETER PROTECTION FOR UTM MENARA RAZAK BUILDING Maryam Var Naseri (MAN151001)

Slides:



Advertisements
Similar presentations
Managing Hardware and Software Assets
Advertisements

XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
SECAM Systems Product Presentation SECAM Systems © 2010.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
XProtect® Expert 2013 Product presentation
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi.
Computer Security: Principles and Practice
Axis Intelligent Video Intelligence where you need it.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Ten Reasons to Buy a Network Camera. Focus 10 of the most important functional differences between analog and network cameras.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
1 A Local and Remote Radio Frequency Identification Learning Environment Andrew Shields & David Butcher Wireless and Mobility Research Group, Institute.
APC InfraStruxure TM Central Smart Plug-In for HP Operations Manager Manage Power, Cooling, Security, Environment, Rack Access and Physical Layer Infrastructure.
Ruslan Masinjila Aida Militaru.  Nature of the Problem  Our Solution: The Roaming Security Robot  Functionalities  General System View  System Design.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
1 Security Integration and Esgraf sales presentation 01/2015.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
IP-based Integrated Security Solutions for Airport Operations and Security AirporTech Asia 2008 Danny Peleg.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
2 nd Annual review Florence 15 th November 2013 Railway security demonstrator.
TEMPLATE DESIGN © E-Eye : A Multi Media Based Unauthorized Object Identification and Tracking System Tolgahan Cakaloglu.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IS3220 Information Technology Infrastructure Security
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
ARM Based Active Kiosk with Speech Student’s Name with USN No. Guide Name HOD Name College Name, Dept.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Nexbase Invites You To Our Special Products
Troubleshooting Networked Video
3 Do you monitor for unauthorized intrusion activity?
Chapter 19: Network Management
Chapter 1: Exploring the Network
ICON Signals Event Alert Notification Platform Overview March 28, 2017
Smart Retail Digital Store.
Network Security Research Presentation
A SEMINAR ON ROVER TECHNOLOGY
Intelligent Video Surveillance – The End of CCTV
An assessment framework for Intrusion Prevention System (IPS)
Group Decision Support Systems
UNMANNED INTELLIGENT MILITARY ROBOT USING ZIGBEE
Algorithms for Big Data Delivery over the Internet of Things
FICEER 2017 Docker as a Solution for Data Confidentiality Issues in Learning Management System.
Cloud Testing Shilpi Chugh.
Wavestore Integrates…
Wavestore Integrates… Paxton Net2 Access Control
Model-View-Controller Patterns and Frameworks
Name Of The College & Dept
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Enhanced alerting and collaborative incident management
Denial-of-Service Jammer Detector Training Course Worldsensing
Managing the IT Function
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Knowledge Sharing Mechanism in Social Networking for Learning
3 Do you monitor for unauthorized intrusion activity?
2nd Floor AMWSLAI Building Bayani Road, AFPOVAI Bonifacio Global City, Taguig 1634 phone: (+632) – 65 | Mobile Nos. (smart) | (globe)
3 Do you monitor for unauthorized intrusion activity?
Presentation transcript:

RESEARCH PROPOSAL A MULTI-AGENT SENSOR BASED MODEL TO IMPROVE PHYSICAL PERIMETER PROTECTION FOR UTM MENARA RAZAK BUILDING Maryam Var Naseri (MAN151001) Lecturer: Assoc Prof Hafiza Abas

Agenda Introduction Literature Review Methodology Result Recommendation Conclusion

Introduction-Research Problem The CCTV is a video surveillance process to provide a safe and secure environment by monitoring students and staff activities followed by gather evidences in case of crime conducted. For instance a CCTV has been installed in the classrooms at levels 3 and 4 to monitor activities of students during working hours. However it brings number of benefits and safety, but it might rises some issues in terms of privacy which makes the people uncomfortable at classrooms. In addition, installing a CCTV is not cost effective as its maintenance expenses are high. It is also not a solution to prevent the crime and finally, it is vulnerable to be access, hacked or disable/disconnect from their power source.

Introduction-Research Problem Time Consuming Process: long videos must be carefully investigated to find any clue or evidence. In fact that it is a long process, it is also suffering from the lack of theft protection. Human Power Dependency: the CCTV technology is highly depended on human based observation and monitoring. Human Error Based Failures: No doubt as the CCTV is heavily rely on human observation, it is also suffering from human error based failures. Lighting problems: Finally the efficiency of CCTV has a direct link with the environment lighting as the level of darkness can heavily effect the quality of captured videos.

Introduction-Scope This research is conducted to concentrate on the Menara Razak Building as it consists of 17 floors, however the scope of this research is limited to levels 3, 4 and 5 as mostly classes and presentations are conducted and IT security team is located at these levels.

Introduction-Objective The main aim of this research is to propose a multi agent sensor based model to improve the physical security. The objectives of this research can be defined as follows: To investigate the Current Physical security models To identify the shortcomings of existing models To propose a new model using multi agent sensor approach

Introduction-Questions There are some questions that are needed to be answered in order to conduct this research as follows: 1- Which type of sensors is needed to form a multi agent sensor based protection model? 2- Which deployment model should be used to propose a new physical security model? 3- How to evaluate the proposed model and compare it with current existing solutions?

Literature Review MethodologyHW/SW A multi-view tracking system to support and observe real- time routine activities of the users over the site using PTZ cameras. Off-shelf standard in single dual-quad core PC is required. Different modules are involved in this model such as Multi-View Tracking, Blind Spot Coverage, Articulated Motion Analysis, Complex Event Analysis, Normalcy Analysis and Object Recognition automated wireless alarm system proposed to overcome fence-based systems. It provides a real-time evaluation to track unwanted intruders. Automatic cued camera, two antennas, one interface box (IF), and a PC based control room are interacting. The ED model provides Emergency operation mode to support data transmission between ED and access control. This model is comprised of several modules such as microcontroller, access app server, database access DB, admin client, user client, syslog app server and database syslog DB server Mechanical locks Smart cards scanners RFID technology Infrared Motion Sensors Audio and Light signals Data transmission channel via Ethernet Data exchange via HTTP, HTTPS, SOAP Java, C++, Python written applications A new fencing approach based on several components such as Physical perimeter fences, Isolation zone, Intrusion detection sensors, Clear zones, and Assessment which can be only applied in surrounding area and totally not sufficient the secure indoor assets.

MethodologyHW/SW Han et al proposed an intelligent substation physical security monitoring system called ISPSM which employs multi-agent system along with the distributed Kalman filtering (DKF) algorithm. Motion detection sensors Video streams Network Interface Cellular network Radar Sensors One-site Database PCs The model is employed facial information acquired from a CCTV system to propose facial recognition for CCTV Radar sensors Camera Portable devices CCTV analysis applications Analysis Applications Cardinali et al proposed a new track fusion in which a CCTV can automatically detect metallic and non-metallic objects without the subjects’ collaboration. Several physical characteristics of moving objects (in this case they focused don airport passengers), is collected using several types of sensors to use for decision making. Motion detection sensors Camera PCS CCTV analysis applications Szustakowski et. al. proposed a physical composite fence with high level sensors. microwave barriers and radars Digital Signage Virtualized network and storage platform

Methodology Survey questionnaire is choose for this research. The reason that the Survey is choose for this research proposal is it allows the researcher to gather a huge amount of data within short period of time as well as it can be created quickly and easily administered. Accordingly, the survey questions has been conducted during this research to obtain desired data from staff and students in UTM via and feedbacks are visualized through Microsoft Excel.

Result Based on the collected feedback the result analysis for staff depicts in the figure below. 51% yes 49& n0 51% yes 49& n0 52% yes 38% n0 Others 10% 52% yes 38% n0 Others 10%

Result most of the participants believed that the CCTVs are not efficiently covered all parts of classrooms and corridors the images which are taken by CCTV it’s not clear enough to help the authorities in detection of any intruders. CCTV Operation

Result The UTM students are provided with ID card, however the results indicates that the students are not required to show their card and validate their identity to enter the building and classrooms ID-Card Based Authentication Doors and Locks by 40% of participant the doors are not efficiently secured by using proper locks. Figure 12 depicts the response from participants

Current Issues and Weaknesses The aforementioned responses indicate that the current state of physical security is not adequate in UTM campus. The students are not required to validate their identity upon the entrance which significantly increases the risk of unauthorized access especially when the doors are not equipped with proper locks. On the other hands, The CCTV is used, but it suffering from lack of proper coverage. Moreover, the quality of CCTV images is not sufficient enough. Therefore, the CCTV alone is not sufficient enough to protect the UTM campus, thus, a multi sensor physical security model will be proposed in next section to overcome the above mentioned issues.

Recommendation In general there are several types of sensors as follows: Environmental Sensors (e.g. temperature) Intrusion Detection Sensors (e.g. motion detectors ) Radio Sensors such as RFID Smart Cameras (e.g. CCTV) The aforementioned sensors provide wide range of data in different type and formats that can be used to propose an integrated security model.

Recommendation

Multi Sensors : One the key modules of proposed model is the type of sensors that are used to collect environmental information. There are three types of sensors employed in this paper such as Smart CCTV Motion Detector, and Temperature Sensors. Sensor Data Collector: A sensor collector is a client server application that collect heterogeneous data of several sensors over network and store them m in cloud based central database. The cloud infrastructure is selected to implement the centralized security solution as it has significant advantages as follows: Ease Implementation, Ease of Maintenance, Reliability, Scalability, Guaranteed levels of services, Total cost of ownership (TCO) Data preparation and filtering: Different data filtering approached is applied on collected data to remove unwanted data as the volume of data has direct connection with complexity and cost of data analysis.

Recommendation Feature Preprocessing : t he feature preprocessing extracts different parameters from collected sensor data which are divided in different groups. The selected feature is used both for training and classification. Decision tree based Classifier: f inally, the C4.5 classification tress is employed to create a decision maker model for propose framework. The main aim of the proposed decision maker model is to analyze the collected data based on explored set of rules to look for any evidence of unauthorized access to physical perimeter. Figure 14 depicts the pseudo code of C4.5 algorithm.

Conclusion By rapid development of the campus protecting of organizations’ assets such as information, students, staff and technical equipment from any potential threat plays an important role in the study and management of the daily work of schools and other educational organizations. For instance CCTV is installed in the classes at levels 3, 4, and 5 to provide a secure and safe environment. This research was discussed research problems, scope and research objective in section one and literature review and methodology which was conducted the research was survey questions for both staff and students followed by result and recommendation chapters respectively. However, the collected feedback in analysis section indicates that staff and students are satisfied with the security control, but an intelligent system is required to provide high secure environment for the respondents at levels 3, 4, and 5 of Menara Razak building. The recommended intelligent system is a multi-agent model which is consists of different modules such as multiple-sensors, sensor data collector, data preparation and filtering, feature processing and decision tree based classifier.

Thank You