DFF 2014 February 24, 2014 1 Self-adapting Sensor Networks for Semi- automated Threat Detection in a Controlled Area By Jorge Buenfil US ARMY RDECOM ARDEC.

Slides:



Advertisements
Similar presentations
Validating the Evaluation of Adaptive Systems by User Profile Simulation Javier Bravo and Alvaro Ortigosa {javier.bravo, Universidad.
Advertisements

Systems Development Environment
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
EECE499 Computers and Nuclear Energy Electrical and Computer Eng Howard University Dr. Charles Kim Fall 2013 Webpage:
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Data Mining and Intrusion Detection
Brooklyn College Spring 2003 February 18, 2003 Gene Shagas Student, CIS 763 Trapped in the Net Chapters 6 … 10 Trapped in the Net Chapters 6 … 10.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
INDUSTRIAL & SYSTEMS ENGINEERING
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
Specialized Business Information Systems Chapter 11.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
Software Testing for Safety- Critical Applications Presented by: Ciro Espinosa & Daniel Llauger.
7.2 System Development Life Cycle (SDLC)
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
seminar on Intrusion detection system
Software Verification and Validation (V&V) By Roger U. Fujii Presented by Donovan Faustino.
POLITECNICO DI TORINO TRIBUTE and DIMMER. DIMMER - The context One of the major challenges in today’s economy concerns the reduction in energy usage and.
Unit 3a Industrial Control Systems
Combat Support Air Operations
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
Domestic Nuclear Detection Office (DNDO) NITRD Workshop What are the Biggest Opportunities in Networking Problem? Sept. 20, 2012 Timothy Ashenfelter, PhD.
Levels of safety Priorities for eliminating hazards in the workplace Eliminate the hazard through the machine design stage Apply safeguarding technology.
Using Neural Networks in Database Mining Tino Jimenez CS157B MW 9-10:15 February 19, 2009.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
IE 585 Introduction to Neural Networks. 2 Modeling Continuum Unarticulated Wisdom Articulated Qualitative Models Theoretic (First Principles) Models Empirical.
CS4730 Real-Time Systems and Modeling Fall 2010 José M. Garrido Department of Computer Science & Information Systems Kennesaw State University.
1 Terrorist Use of WMD: A Concrete Threat? Dr. Yair Sharan –ICTAF Director 2nd Annual Arms Control Conference: New Trends in WMD.
MODULE 12 Control Audit And Security Of Information System 12.1 Controls in Information systems 12.2 Need and methods of auditing Information systems 12.3.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
NC-BSI: 3.3 Data Fusion for Decision Support Problem Statement/Objectives: Problem - Accurate situation awareness requires rapid integration of heterogeneous.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Jeremy Kackley, James Jacobs, Paulus Wahjudi and Jean Gourd.
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
Homeland Security Planning Scenarios The White House Homeland Security Council (HSC) - in partnership with the Department of Homeland Security (DHS), the.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Smart Surveillance Technology Javier OcasioPerezWilliam Sanchez Rosa Mariel Martinez MarreroAbraham Diaz Santiago.
The Technical Challenges of Homeland Security John R Wootton V. Pres. Technology Engineered Support Systems Inc.
A Mission-Centric Framework for Cyber Situational Awareness Assessing the Risk Associated with Zero-day Vulnerabilities: Automated Methods for Efficient.
CS4730 Real-Time Systems and Modeling Fall 2010 José M. Garrido Department of Computer Science & Information Systems Kennesaw State University.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
S IMULATION AND R EAL - TIME PROCESSING Chapter 3.7 VCN 9691 Computing Notes 1.
Topic 4 - Database Design Unit 1 – Database Analysis and Design Advanced Higher Information Systems St Kentigern’s Academy.
TMALL 0141 Presentation v 1.0 Asset Management Bo Olsson Bucharest October 7th, 2015.
Thomas L. Gilchrist Testing Basics Set 3: Testing Strategies By Tom Gilchrist Jan 2009.
Sensors Directorate and ATR Overview for Integrated Fusion, Performance Prediction, and Sensor Management for ATE MURI 21 July 2006 Lori Westerkamp Sensor.
"... To design the control system that effectively matches the plant requires an understanding of the plant rivaling that of the plant's designers, operators,
NC-BSI: TASK 3.5: Reduction of False Alarm Rates from Fused Data Problem Statement/Objectives Research Objectives Intelligent fusing of data from hybrid.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Presented by:- Reema Tariq Artificial Intelligence.
Scientific Engineering Center ''Nuclear Physics Research (''YAFI'') St-Petersburg, RUSSIA 2014.
A field of study that encompasses computational techniques for performing tasks that require intelligence when performed by humans. Simulation of human.
Control-Theoretic Approaches for Dynamic Information Assurance George Vachtsevanos Georgia Tech Working Meeting U. C. Berkeley February 5, 2003.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Embedded System Design and Development Introduction to Embedded System.
CRESST ONR/NETC Meetings, July July, 2003 ONR Advanced Distributed Learning Bill Kaiser UCLA/SEAS Wireless Networked Sensors for Assessment.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Introduction to Machine Learning, its potential usage in network area,
WIRELESS FIRE DETECTION
First Industrial Smart Robot X-1: how and why?
Constraints Space Load Capacity Costs Operating hours.
The Control Room… …is the Central Location of Visualized Information
Deep Dive into the Blue VCU Infosec Team.
Multi-Step Attack Defense Operating Point Estimation via Bayesian Modeling under Parameter Uncertainty Peng Liu, Jun Dai, Xiaoyan Sun, Robert Cole Penn.
Computational Elements of Robust Civil Infrastructure
Software Engineering for Safety: a Roadmap
Presentation transcript:

DFF 2014 February 24, Self-adapting Sensor Networks for Semi- automated Threat Detection in a Controlled Area By Jorge Buenfil US ARMY RDECOM ARDEC 1 st Annual SERC Doctoral Fellows Forum February 24, 2014 Georgetown University Hotel and Conference Center Washington, DC

DFF 2014 February 24, Problem Statement Military systems today rely heavily on trained specialists to monitor and provide security to military installations. The threat presented by asymmetric warfare imposes constant vigilance against terrorist attacks using chemical, biological or nuclear weapons.

DFF 2014 February 24, Problem Statement Terrorist attacks have so far consisted mainly of improvised explosive devices carried by personnel or vehicles and detonated in areas where many people congregate (such as the Boston Marathon) or where high value targets exist (like the Oklahoma City bombing).

DFF 2014 February 24, Problem Statement Technology exists today to detect, identify and counteract asymmetric weapons before they are used but the burden on human operators is heavy. Typically, specially trained personnel are responsible for the interpretation of sensor data to positively identify valid threats.

DFF 2014 February 24, Problem Statement Sensor data usually involves signals on the visible, infrared and microwave segments of the radio spectrum. Their correct interpretation is complex and requires extensive experience to avoid excessive false alarms. If too many false alarms are issued by a security system, personnel tend to ignore them and as a result compromise the efficacy of such system and thus the protection of a controlled area.

DFF 2014 February 24, Problem Statement A solution is needed to lessen the burden on human operators by using computing power to process complex signals and identify anomalous situations that require human intervention while recognizing acceptable margins of operation that can be handled by the system itself. This will free specialized personnel to do other tasks while also allowing for a massive expansion on the number and types of sensors and actuator that can be deployed to monitor and control a particular area.

DFF 2014 February 24, Proposed Solution Proposed solution ―Modeling and Simulation of a self- adapting data fusion algorithm ―Automated Multivariate Analysis to find “exceptional conditions” present on the controlled area ―Data Visualization techniques to transform raw data into actionable information to aid human operators take countermeasures and also provide select inputs to other sensors and actuators to improve their performance. ―Machine-learning via analysis of historical data to self-calibrate the data fusion algorithm

DFF 2014 February 24, Progress to Date ―Started Ph. Program in the Fall of 2013 ―Developed a strawman model of the proposed solution for the class of “Sys 611 Modeling and Simulation.” ―Currently taking “BIA-652 Automated Multivariate Analysis” to learn better ways to find “exceptional conditions” present on the controlled area ―Enrolled in “EM-622A Decision Making via Data Analysis” to transform massive amounts of raw data into actionable information to aid human operators take countermeasures. ―Dissertation research just starting but real interest in the topic from DoD organizations has been identified.

DFF 2014 February 24, Future Steps ― Conduct extensive literature search of approaches to similar problems ― Refine my knowledge of data analysis methods and tools ― Take a class in Statistical Learning and Analytics ― Continue refining the dynamic system model started in the class of Modeling and Simulation to find ways to improve it to learn from past events and recalibrate itself.

DFF 2014 February 24, Current Limitations Current limitations to solving the problem ―Integration of sensors and actuators from diverse manufacturers is needed for a SoS solution, but lack of standardization makes it difficult to quickly reconfigure the SoS to interact with new equipment, adjust for equipment failures and grow the sensor/actuator network as needed during times of elevated threat conditions or vice versa.

DFF 2014 February 24, Other Applications Other applications to this research work ―Semi-autonomous robots operating in a self-coordinated, self-adapting ways to carry out a mission as a team with minimal human operator needs. ―Monitoring of activities in networks (computer or social) to identify anomalous behavior that require human operator intervention. ―Monitoring of critical systems such as vehicle health management systems where preventive maintenance is required to prevent catastrophic failures (fighting vehicles, aircraft, submarines, etc.)

DFF 2014 February 24, Questions?