scispace - formally typeset
Search or ask a question

Showing papers on "Intrusion detection system published in 1986"


Proceedings ArticleDOI
07 Apr 1986
TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

960 citations


Patent
19 Dec 1986

88 citations


Patent
04 Dec 1986
TL;DR: In this paper, a portable intrusion detection, monitoring and alarm system is housed in a portable carrying case in the configuration of a briefcase with handle for convenient portability and inconspicuous placement at a desired location near a space to be monitored.
Abstract: A portable intrusion detection, monitoring and alarm system is housed in a portable carrying case in the configuration of a briefcase with handle for convenient portability and inconspicuous placement at a desired location near a space to be monitored. Intrusion detectors are removed from the carrying case and placed in the space to be monitored. The intrusion detectors may include infrared motion sensors and radio transmitters for transmitting detection signals to a radio receiver in the carrying case. An electronic controller receives the detection signals from the radio receiver and delivers actuating data signals to a digital communicator and digital dialer with a telephone line output. The digital communicator captures a telephone line with dialing signals and sends further coded signals corresponding to different monitored spaces and intrusion detectors from which detection signals are received. The electronic controller includes an arming circuit and key switch for arming and disarming the monitoring and warning system. The external power supply plug, telephone jack and key switch are mounted on the carrying case so that the components are operable from outside the carrying case with the intrusion detectors in place and the briefcase configuration carrying case closed and locked. Internal battery standby power supply is also provided.

50 citations


01 Jan 1986
TL;DR: In this article, the authors present theoretical and experimental expressions developed to demonstrate operation in terms of cost, performance, and ease of installation for the Forward Wave (FW) method of intrusion detection.
Abstract: Buried Line Field Disturbance Sensors used for the purpose of outdoor perimeter intrusion detection are unique in the sense that they are covert and terrain following. Considerable effort has been spent in recent years to develop an effective Buried Line Sensor using leaky (or ported) cable technology. To date, a modular CW (Continuous Wave) approach to designing such a sensor has proven to be the most effective compromise in terms of cost, performance and installation. Proper design of a leaky cable sensor requires an in-depth knowledge of the coupling performance and attenuation characteristics of the sensor cable to be used. The ''Forward Wave'' (codirectional) method of detection is discussed. This paper contains theoretical and experimental expressions developed to demonstrate operation in terms of cost, performance and ease of installation.

5 citations


01 Jan 1986
TL;DR: A mobile robot system designed to function as part of an overall security system at a high security facility that can act as a mobile remote sensing platform for alarm assessment or roving patrol, as a point sensor (sentry) in routine security applications, or as an exploratory device in situations potentially hazardous to humans.
Abstract: This paper describes a mobile robot system designed to function as part of an overall security system at a high security facility. The features of this robot system include specialized software and sensors for navigation without the need for external locator beacons or signposts, sensors for remote imaging and intruder detection, and the ability to communicate information either directly to the electronic portion of the security system or to a manned central control center. Other desirable features of the robot system include low weight, compact size, and low power consumption. The robot system can be operated either by remote manual control, or it can operate autonomously where direct human control can be limited to the global command level. The robot can act as a mobile remote sensing platform for alarm assessment or roving patrol, as a point sensor (sentry) in routine security applications, or as an exploratory device in situations potentially hazardous to humans. This robot system may also be used to ''walk-test'' intrusion detection sensors as part of a routine test and maintenance program for an interior intrusion detection system. The hardware, software, and operation of this robot system will be briefly described herein.

3 citations


01 Jan 1986
TL;DR: DAMID (Digital Automatic Video Intrusion Detector) utilizes new digital signal processing techniques to achieve a dramatic improvement in discrimination performance thereby making video motion detection practical for outdoor applications.
Abstract: To be effective, a perimeter intrusion detection system must comprise both sensor and rapid assessment components. The use of closed circuit television (CCTV) to provide the rapid assessment capability, makes possible the use of video motion detection (VMD) processing as a system sensor component. Despite it's conceptual appeal, video motion detection has not been widely used in outdoor perimeter systems because of an inability to discriminate between genuine intrusions and numerous environmental effects such as cloud shadows, wind motion, reflections, precipitation, etc. The result has been an unacceptably high false alarm rate and operator work-load. DAVID (Digital Automatic Video Intrusion Detector) utilizes new digital signal processing techniques to achieve a dramatic improvement in discrimination performance thereby making video motion detection practical for outdoor applications. This paper begins with a discussion of the key considerations in implementing an outdoor video intrusion detection system, followed by a description of the DAVID design in light of these considerations.

2 citations


Patent
21 Aug 1986
TL;DR: In this article, a microwave intrusion detection device is presented, which is an improvement to a microwave IDS where the Gunn oscillator to generate the microwave radiation is also used as a detector to produce the Doppler shifted signal.
Abstract: In the present invention, a microwave intrusion detection device is disclosed. The microwave intrusion detection device is an improvement to a microwave intrusion detection device of the type wherein the Gunn oscillator to generate the microwave radiation is also used as a detector to produce the Doppler shifted signal. The improvement to such a microwave intrusion detection device is to form a pulse train signal and supplying the pulse train signal to the Gunn oscillator. The output of the Gunn oscillator which is representative of the radiation reflected from a moving object is a signal from which the pulse train signal is filtered. The filtered signal is then processed to produce an alarm condition in the event the moving object is detected.

2 citations


01 Jan 1986
TL;DR: An expert system is under development to carry out intrusion detection sensor placement for physical security systems and has the capability of handling several different sensor types and of coordinating the placement of multiple sensor types.
Abstract: An expert system is under development to carry out intrusion detection sensor placement for physical security systems. Expert systems are computer programs that use symbolic programming techniques to duplicate the reasoning processes of human experts. Because sensitive facilities often require complex, multi-sensor intrusion detection systems, the design rules for achieving high levels of detection performance are not easily transferred to novices. Since these design rules reside in the minds of the individual experts performing the tasks, the need to consolidate this knowledge in a form that is available to others was a driving force in this project. The first phase of this project is described in this paper. It consists of an expert system for sensor placement in a graded clear zone. The program has the capability of handling several different sensor types and of coordinating the placement of multiple sensor types. The designs produced by the program in comparison with the designs produced by human experts are discussed.

2 citations


01 Jan 1986
TL;DR: The subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility is discussed.
Abstract: This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs.

1 citations