1 Spatial Temporal Surveillance. 2 3 Geographic Surveillance and Hotspot Detection for Homeland Security: Cyber Security and Computer Network Diagnostics.

Slides:



Advertisements
Similar presentations
Lecture 6 Nondeterministic Finite Automata (NFA)
Advertisements

1 CD5560 FABER Formal Languages, Automata and Models of Computation Lecture 2 Mälardalen University 2005.
1 1 CDT314 FABER Formal Languages, Automata and Models of Computation Lecture 3 School of Innovation, Design and Engineering Mälardalen University 2012.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
YES-NO machines Finite State Automata as language recognizers.
1 Languages. 2 A language is a set of strings String: A sequence of letters Examples: “cat”, “dog”, “house”, … Defined over an alphabet: Languages.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
61 Nondeterminism and Nodeterministic Automata. 62 The computational machine models that we learned in the class are deterministic in the sense that the.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Fall 2006Costas Busch - RPI1 Deterministic Finite Automata And Regular Languages.
1 Finite Automata. 2 Finite Automaton Input “Accept” or “Reject” String Finite Automaton Output.
Finite state automaton (FSA)
1 Finite state automaton (FSA) LING 570 Fei Xia Week 2: 10/07/09 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA.
Finite Automata Chapter 5. Formal Language Definitions Why need formal definitions of language –Define a precise, unambiguous and uniform interpretation.
Topics Automata Theory Grammars and Languages Complexities
CSC 361Finite Automata1. CSC 361Finite Automata2 Formal Specification of Languages Generators Grammars Context-free Regular Regular Expressions Recognizers.
Finite Automata Costas Busch - RPI.
Regular Expressions and Automata Chapter 2. Regular Expressions Standard notation for characterizing text sequences Used in all kinds of text processing.
Systematic Analysis of Interactome: A New Trend in Bioinformatics KOCSEA Technical Symposium 2010 Young-Rae Cho, Ph.D. Assistant Professor Department of.
Regular Expressions (RE) Empty set Φ A RE denotes the empty set Empty string λ A RE denotes the set {λ} Symbol a A RE denotes the set {a} Alternation M.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Computabilty Computability Finite State Machine. Regular Languages. Homework: Finish Craps. Next Week: On your own: videos +
1 Pattern Recognition Pattern recognition is: 1. A research area in which patterns in data are found, recognized, discovered, …whatever. 2. A catchall.
Lexical Analysis: Finite Automata CS 471 September 5, 2007.
1 CD5560 FABER Formal Languages, Automata and Models of Computation Lecture 3 Mälardalen University 2010.
Overview of Previous Lesson(s) Over View  Symbol tables are data structures that are used by compilers to hold information about source-program constructs.
Activity Monitoring October 19-20, 1999 DARPADARPA Bob Bolles, Brian Burns, Marty Fischler, Ravi Gopalan, Marsha Jo Hannah, Dave Scott SRI International.
Robotics Club: 5:30 this evening
Lecture # 12. Nondeterministic Finite Automaton (NFA) Definition: An NFA is a TG with a unique start state and a property of having single letter as label.
Natural Language Processing Lecture 4 : Regular Expressions and Automata.
Copyright © 2001, SAS Institute Inc. All rights reserved. Data Mining Methods: Applications, Problems and Opportunities in the Public Sector John Stultz,
August 23, 2005 CSCI 2670 Introduction to Theory of Computing August 23, 2005.
Finite State Machines 1.Finite state machines with output 2.Finite state machines with no output 3.DFA 4.NDFA.
Modeling Computation: Finite State Machines without Output
UNIT - I Formal Language and Regular Expressions: Languages Definition regular expressions Regular sets identity rules. Finite Automata: DFA NFA NFA with.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
1 CD5560 FABER Formal Languages, Automata and Models of Computation Lecture 3 Mälardalen University 2007.
Transparency No. 2-1 Formal Language and Automata Theory Homework 2.
Overview of Previous Lesson(s) Over View  A token is a pair consisting of a token name and an optional attribute value.  A pattern is a description.
Chapter 5 Finite Automata Finite State Automata n Capable of recognizing numerous symbol patterns, the class of regular languages n Suitable for.
CS 404Ahmed Ezzat 1 CS 404 Introduction to Compiler Design Lecture 1 Ahmed Ezzat.
1 CD5560 FABER Formal Languages, Automata and Models of Computation Lecture 3 Mälardalen University 2006.
Set, Alphabets, Strings, and Languages. The regular languages. Clouser properties of regular sets. Finite State Automata. Types of Finite State Automata.
INDIAN SCIENCE CONGRESS Mumbai 2015 Actuarial Science Symposium G. P. Patil Penn State University, University Park, PA USA.
Spatial Scan Statistic for Geographical and Network Hotspot Detection C. Taillie and G. P. Patil Center for Statistical Ecology and Environmental Statistics.
1 Surveillance GeoInformatics Hotspot Detection, Prioritization, and Early Warning G. P. Patil December 2004 – January 2005.
Hotspot Detection, Delineation, and Prioritization for Geographic Surveillance and Early Warning Organizer and Chair : G. P. Patil  2:00—2:05 Chair 
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Geographic and Network Surveillance for Arbitrarily Shaped Hotspots Overview Geospatial Surveillance Upper Level Set Scan Statistic System Spatial-Temporal.
1 Biosurveillance Sensor Networks and Resultant Spatiotemporal Data for Crisis-Index Development and Early Warning Austin, March 2005 G. P. Patil Austin,
Costas Busch - LSU1 Deterministic Finite Automata And Regular Languages.
Sensor Networks © M Jamshidi.
Fall 2004COMP 3351 Finite Automata. Fall 2004COMP 3352 Finite Automaton Input String Output String Finite Automaton.
WELCOME TO A JOURNEY TO CS419 Dr. Hussien Sharaf Dr. Mohammad Nassef Department of Computer Science, Faculty of Computers and Information, Cairo University.
Languages.
Geoinformatics Seminar G. P. Patil March 2003
IMAGE PROCESSING RECOGNITION AND CLASSIFICATION
Fast Kernel-Density-Based Classification and Clustering Using P-Trees
NSF Digital Government surveillance geoinformatics project, federal agency partnership and national applications for digital governance.
RE-Tree: An Efficient Index Structure for Regular Expressions
Chapter 2 Finite Automata
Chapter 2 FINITE AUTOMATA.
Deterministic Finite Automata And Regular Languages Prof. Busch - LSU.
Principles of Computing – UFCFA3-30-1
Geographic and Network Surveillance for Arbitrarily Shaped Hotspots
CSC312 Automata Theory Transition Graphs Lecture # 9
Topological Signatures For Fast Mobility Analysis
NFAs and Transition Graphs
Presentation transcript:

1 Spatial Temporal Surveillance

2

3 Geographic Surveillance and Hotspot Detection for Homeland Security: Cyber Security and Computer Network Diagnostics Geographic Surveillance and Hotspot Detection for Homeland Security: Cyber Security and Computer Network Diagnostics Securing the nation's computer networks from cyber attack is an important aspect of Homeland Security. Project develops diagnostic tools for detecting security attacks, infrastructure failures, and other operational aberrations of computer networks. Geographic Surveillance and Hotspot Detection for Homeland Security: Tasking of Self-Organizing Surveillance Mobile Sensor Networks Geographic Surveillance and Hotspot Detection for Homeland Security: Tasking of Self-Organizing Surveillance Mobile Sensor Networks Many critical applications of surveillance sensor networks involve finding hotspots. The upper level set scan statistic is used to guide the search by estimating the location of hotspots based on the data previously taken by the surveillance network. Geographic Surveillance and Hotspot Detection for Homeland Security: Drinking Water Quality and Water Utility Vulnerability Geographic Surveillance and Hotspot Detection for Homeland Security: Drinking Water Quality and Water Utility Vulnerability New York City has installed 892 drinking water sampling stations. Currently, about 47,000 water samples are analyzed annually. The ULS scan statistic will provide a real-time surveillance system for evaluating water quality across the distribution system. Geographic Surveillance and Hotspot Detection for Homeland Security: Surveillance Network and Early Warning Geographic Surveillance and Hotspot Detection for Homeland Security: Surveillance Network and Early Warning Emerging hotspots for disease or biological agents are identified by modeling events at local hospitals. A time-dependent crisis index is determined for each hospital in a network. The crisis index is used for hotspot detection by scan statistic methods Geographic Surveillance and Hotspot Detection for Homeland Security: West Nile Virus: An Illustration of the Early Warning Capability of the Scan Statistic Geographic Surveillance and Hotspot Detection for Homeland Security: West Nile Virus: An Illustration of the Early Warning Capability of the Scan Statistic West Nile virus is a serious mosquito-borne disease. The mosquito vector bites both humans and birds. Scan statistical detection of dead bird clusters provides an early crisis warning and allows targeted public education and increased mosquito control. Geographic Surveillance and Hotspot Detection for Homeland Security: Crop Pathogens and Bioterrorism Geographic Surveillance and Hotspot Detection for Homeland Security: Crop Pathogens and Bioterrorism Disruption of American agriculture and our food system could be catastrophic to the nation's stability. This project has the specific aim of developing novel remote sensing methods and statistical tools for the early detection of crop bioterrorism. Geographic Surveillance and Hotspot Detection for Homeland Security: Disaster Management: Oil Spill Detection, Monitoring, and Prioritization Geographic Surveillance and Hotspot Detection for Homeland Security: Disaster Management: Oil Spill Detection, Monitoring, and Prioritization The scan statistic hotspot delineation and poset prioritization tools will be used in combination with our oil spill detection algorithm to provide for early warning and spatial-temporal monitoring of marine oil spills and their consequences. Geographic Surveillance and Hotspot Detection for Homeland Security: Network Analysis of Biological Integrity in Freshwater Streams Geographic Surveillance and Hotspot Detection for Homeland Security: Network Analysis of Biological Integrity in Freshwater Streams This study employs the network version of the upper level set scan statistic to characterize biological impairment along the rivers and streams of Pennsylvania and to identify subnetworks that are badly impaired. Center for Statistical Ecology and Environmental Statistics G. P. Patil, Director

4 Network-Based Surveillance Subway system surveillance Subway system surveillance Drinking water distribution system surveillance Drinking water distribution system surveillance Stream and river system surveillance Stream and river system surveillance Postal System Surveillance Postal System Surveillance Road transport surveillance Road transport surveillance Syndromic Surveillance Syndromic Surveillance

5 Target Tracking in Distributed Sensor Networks

6 Video Surveillance and Data Streams Turning Video into Information Measuring Behavior by Segments Customer Intelligence Enterprise Intelligence Entrance Intelligence Media Intelligence Video Mining Service

7 Deterministic Finite Automata (DFA) a a b b b c c start Directed Graph (loops & multiple edges permitted) such that: Nodes are called States Edges are called Transitions Distinguished initial (or starting) state Transitions are labeled by symbols from a given finite alphabet,  = {a, b, c,... } The same symbol can label several transitions A given symbol can label at most one transition from a given state (deterministic)

8 Deterministic Finite Automata (DFA) Formal Definition a a b b b c c start Quadruple (Q, q 0, ,  ) such that: Q is a finite set of states  is a finite set of symbols, called the alphabet q 0  Q is the initial state  : Q    Q  {Blocked} is the transition function:   (q, a) = Blocked if there is no transition from q labeled by a   (q, a) = q' if a is a transition from q to q'

9 DFA and Strings a a b b b c c start Any path through the graph starting from the initial state determines a string from the alphabet. Example: The blue dashed path determines the string a b c a Conversely, any string from the alphabet is either blocked or determines a path through the graph. Example: The following strings are blocked: c, aa, ac, abb, etc. Example: The following strings are not blocked: a, b, ab, bb, etc. The collection of all unblocked strings is called the language accepted or determined by the DFA (all states are “final” in our approach)

10 Strings and Languages  = (finite) alphabet  * = set of all (finite) strings from  A language is any subset of  *. Not all languages can be determined by a DFA. Different DFAs can accept the same language

11 Probabilistic Finite Automata (PFA) A PFA is a DFA (Q, q 0, ,  ) with a probability attached to each transition such that the sum of the probabilities across all transitions from a given node is unity. Formally, p: Q    [0, 1] such that p(q, a) = 0 if and only if  (q, a) = Blocked Multiplying branch probabilities lets us assign a probability value  (q 0, s) to each string s in  *. E.G.,  (q 0, abca)=(.8)1(.6)(.4)=.192 q0q0 a,.4 b,.2 b, 1 b,.5 c,.6 c,.5 start a,.8

12 Properties of  (q 0, s) For fixed q 0,  (q 0, s) is a measure on  * Support of  is the language accepted by the DFA For fixed q 0,  (q 0, s) is a probability measure on  i (  i = strings of length i ) This probability measure is written as  (i). Given a probability distribution w(i) across string lengths i, defines a probability measure across  *, called the w-weighted probability measure of the PFA. If all w(i) are positive, then the support of  is also the language accepted by the underlying DFA.

13 Distance Between Two PFA Let A and B be two PFAs on the same alphabet  Let w(i) be a probability distribution across string lengths i Let  A and  B be the w-weighted probability measures of A and B Define the distance between A and B as the variational distance between the probability measures  A and  B : d( A, B) = ||  A   B ||

14 Using  -complexity for Network Behavior Analysis David Friedlander Shashi Phoha Richard Brooks Penn State / ARL

15 Tools for Recognizing Target Behavior From Network Measurements Symbolization Conversion Behavior Recognition Network Measurements (streams of numbers) Stream of symbols Higher level representation Representations of Known Behaviors Target Behavior

16 Natural Language Definition (Merriam- Webster’s Collegiate  Dictionary) Behavior: 1b : anything that an organism does involving action and response to stimulation c : the response of an individual, group, or species to its Technical Definitions Behavior → Pattern of observations and actions Pattern → Formal language Observations → Uncontrollable events Actions → Controllable events

17         ……  …… Phase-Space TrajectoryString of Symbols Symbolization: Network Sensor Readings to Symbolic Dynamics Sensor 1 Sensor 2 Sensor 3

18 ……  …… Conversion Tools: Stream of Symbols to FSA Which defines a formal language of the target behavior

19 a a,b ab 3.Merge topologically similar subtrees ……abaaabaaababababaaabab…. Conversion via topological complexity method 1. Language Sample 2. Tree of all substrings of length l.

20 Conversion via  -complexity method a, P(a|0) b, P(b|0) a aa b, P(b|2) a, P(a|2) b, P(b|3)a, P(a|3)  -complexity ……abaaabaaababababaaabab…. 1.Language Sample 2.Tree of all substrings of length l with transition probabilities 3.Merged subtrees must be topologically similar and have similar probability structures

21 Behavior Classification Tool using Finite State Automata ……  …… Behavior 1 Behavior 2 String Rejections (1) / Sec String Rejections (2) / Sec Analyze Rejection Rates to find most likely known behavior for the sample (if any are close enough) Sample taken over “short” time scale Dynamic Target Behavior Changes over “long” time scale

22 Conversion Tools: Formal Languages to Infinite Dimensional Vector Space For example: …..abababaaababaaaba….. Measures are defined on the vector space that satisfy: The space contains a vector for all possible languages of a given alphabet:

23 Weighted Counting Measure for Formal Languages Various measures can be defined on the formal language vectors, such as: where n i (L) is the number of strings of length i in language L, and where k is the number of symbols in the alphabet. The distance between two languages is defined as:

24 Behavior Classification Tool using a Formal Language Measure ……  …… Sample taken over “short” time scale Dynamic Target Behavior Changes over “long” time scale Convert to Vector Vectors of known behaviors

25 Future Work – Recognizing the Behavior of Multiple Targets Recognizing the behaviors of multiple targets Stages Finding stationary targets Finding moving targets Recognizing behaviors of multiple targets Methods Sensor energy surface Sensor cross-correlation

26 Future Work – Recognizing multiple targets – Method 1 Sensor energy surface

27 Future Work – Recognizing multiple targets – Method 2 Sensor cross-correlation

28 Future Work – Behavior Recognition of Multiple, Coordinated Enemy Assets Can we the extend model recognition techniques to hierarchical control systems?

29 Experimental Validation Pressure sensitive floor Formal Language Events: a – green to red or red to green b – green to tan or tan to green c – green to blue or blue to green d – red to tan or tan to red e – blue to red or red to blue f – blue to tan or tan to blue Wall following Random walk Analyze String Rejections Target Behavior