scispace - formally typeset
Search or ask a question

Showing papers on "Intrusion detection system published in 1987"


Journal ArticleDOI
TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

3,369 citations


Patent
12 May 1987
TL;DR: In this article, an intrusion detector has a first sensor (28-38) for monitoring a first condition and a second sensor (70), which monitors a second condition in a space to be protected against intrusion, where a change in the condition sensed by the first sensor in a target area causes the second sensor to be aligned with the same target area.
Abstract: An intrusion detector has a first sensor (28-38) for monitoring a first condition and a second sensor (70) for monitoring a second condition in a space to be protected against intrusion. A change in the condition sensed by the first sensor in a target area causes the second sensor to be aligned with the same target area. If both sensors indicate through modules (214, 222) a change in the respective conditions that they monitor an intrusion is indicated through alarm confirmation unit (220).

87 citations


Patent
05 Aug 1987
TL;DR: In this paper, an improved intrusion detection device system of the dual-sensor type, wherein one sensor is a PIR sensor and the other is a microwave sensor, the improvement comprises counting the detection of intrusion separately by the microwave sensor and by the passive infrared sensor.
Abstract: In an improved intrusion detection device system of the dual-sensor type, wherein one sensor is a PIR sensor and the other is a microwave sensor, the improvement comprises counting the detection of intrusion separately by the microwave sensor and by the passive infrared sensor. Thereafter, the counts by the two separate detectors are compared and an indication is given if the number exceeds a certain user selectable threshold, to indicate fault in one of the two sensor subsystems.

39 citations


Patent
Daniel R. Weber1
10 Nov 1987
TL;DR: In this paper, an optical intrusion detection system is adapted to have a variable sensitivity, whereby it can be set to respond to the intrusion of an object of a first size during one phase of operation of a machine and to an intruder of a second size during another phase of the operation of said machine.
Abstract: An optical detection system of the sort adapted to enable and/or disable the operation of an associated industrial machine when an appropriate intrusion is detected. The optical intrusion detection system is adapted to have a variable sensitivity, whereby it can be set to respond to the intrusion of an object of a first size during one phase of operation of said machine and to an object of a second size during another phase of the operation of said machine.

36 citations


Patent
04 Nov 1987
TL;DR: An intrusion detection system using cables arranged along a perimeter to be protected and sensing changes in the electrical field around the cables caused by the presence of an intruder is described in this paper, where the cables are divided into sections or blocks and typically only one of the sections is energized at any time.
Abstract: An intrusion detection system of the type using cables arranged along a perimeter to be protected and sensing changes in the electrical field around the cables caused by the presence of an intruder. The cables are divided into sections or blocks and typically only one of the sections is energized at any time. The variations caused by an intruder at the selected sections are transmitted through the intervening section to the receiver portion of a transceiver located at one end of the cables. This indicates in which section intrusion has occurred. The system uses continuous wave excitation whereby the expense and complexity of high speed switching and timing of r.f. signals are avoided.

18 citations


Patent
06 Jan 1987
TL;DR: In this article, an intrusion detection optical system (100) of the type capable of activating and/or deactivating the operation of an industrial machine when an appropriate intrusion is associated detected.
Abstract: detection optical system (100) of the type capable of activating and / or deactivating the operation of an industrial machine when an appropriate intrusion is associated detected. It is desirable for a stage operation an object of defined dimensions can be introduced into the machine, then it is not eligible for another phase of operation. The optical system of intrusion detection has a variable sensitivity, which allows to adjust so that it reacts to the intrusion of an object having a certain size during a phase of operation of the machine and intrusion an object having a different size during another phase of operation of the machine.

14 citations


Patent
04 Aug 1987
TL;DR: In this article, an alarm locator module for use in association with a picket fence having a plurality of resistive elements disposed along a tubular rail, each picket being armed with an intrusion detection device connected to a three line supervised conductive loop contained within said rail and in constant communication with the intrusion locator.
Abstract: An alarm locator module for use in association with a picket fence having a plurality of picket elements disposed along a tubular rail, each picket being armed with an intrusion detection device connected to a three line supervised conductive loop contained within said rail and in constant communication with the intrusion locator module. The intrusion locator module supplies voltage and current down a first line of the loop, having a plurality of resistive elements disposed in spaced apart relationship along a portion of its length. Current normally flows back up the loop via a return line to ground, unless an intrusion is detected, in which case the intrusion detection device causes a short between the first line and a second line of the loop thereby causing current to flow through the second line back to the intrusion locator device, which is capable of detecting and reporting the intrusion. Multiple intrusions cause an increase in current in the first line, which may be detected and measured to determine the distance between the first and last intrusions on the fence. An open circuit on any of the three lines halts the flow of current on the particular line affected and may also be detected. Location of a single short can be calculated by polling the voltage on the second line provided an open circuit has not also occurred.

11 citations


Patent
30 Jan 1987
TL;DR: In this article, an additional detector in the form of a magnetic or folding contact and an evaluating device which evaluates the response of latch contact and detector in time has the effect that the intrusion detection device remains armed in the case of the door being opened by force.
Abstract: Arming devices on doors which close an area secured by intrusion detection systems have the disadvantage that in an attack on the door, the intrusion detection system is disarmed. Using an additional detector in the form of a magnetic or folding contact and an evaluating device which evaluates the response of latch contact and detector in time has the effect that the intrusion detection device remains armed in the case of the door being opened by force.

6 citations


Book ChapterDOI
01 Jan 1987
TL;DR: The first practical commercial ported coaxial cable intrusion detection system was installed for the Canadian Penitentiary Service and evaluated by Queen's University in 1977 and an improved design was installed at a second site and independently evaluated in 1980 as discussed by the authors.
Abstract: The first practical commercial ported coaxial cable intrusion detection system was installed for the Canadian Penitentiary Service and evaluated by Queen's University in 1977. An improved design was installed at a second site and independently evaluated in 1980. Both these systems employ pulsed rf technology in conjunction with a continuous long-line transducer cable. Continuing research and development efforts since that time have led to considerable advances in system capabilities and installed performance for this unique design. During this period a number of other leaky cable intrusion systems have been developed, all of which employ continuous wave (cw) technology and thus use the earlier block sensor concept in site design. Progress of these developments is reviewed, and some comparisons are drawn between the two approaches with respect to installed performance.

4 citations


01 May 1987
TL;DR: A prototype mobile robot system configured to function as part of an overall security system at a high security facility, with specialized software and sensors for navigation without the need for external locator beacons or sign posts, and data link facilities to communicate information either directly to an electronic security system or to a manned central control center.
Abstract: This paper describes a prototype mobile robot system configured to function as part of an overall security system at a high security facility The features of this robot system include specialized software and sensors for navigation without the need for external locator beacons or sign posts, sensors for remote imaging and intruder detection, and data link facilities to communicate information either directly to an electronic security system or to a manned central control center Other features of the robot system include low weight, compact size, and low power consumption The robot system can operate either by remote manual control, or it can operate autonomously where the need for direct human control is limited to the global command level The robot can act as a mobile remote sensing platform for visual alarm assessment or roving patrol, or as an exploratory device in situations potentially hazardous to humans This robot system may also be used to walk-test intrusion detection sensors as part of a routine test and maintenance program for an interior intrusion detection system (IDS), and to provide a programmable, temporary sensor capability to backup an IDS sensor that has failed This capability may also be used to provide improved sensormore » coverage of an area that will be secured on a temporary or short term basis, thereby eliminating the need for a permanent sensor installation The hardware, software, and operation of this robot system will be briefly described herein« less

4 citations


Proceedings ArticleDOI
J.J. McCarthy1, G.E. Marco
01 Jun 1987
TL;DR: This paper describes the implementation, the thorough level of testing performed, the framework for billing, and the high level performance metrics of cellular networking as developed by AT&T for its AUTOPLEX family of cellular telecommunications systems.
Abstract: This paper describes the implementation, the thorough level of testing performed, the framework for billing, and the high level performance metrics of cellular networking as developed by AT&T for its AUTOPLEX family of cellular telecommunications systems.

Book ChapterDOI
01 Jan 1987
TL;DR: In this article, the authors present results obtained on the characteristics of typical burglar and false alarm signals and discuss various methods of ultrasonic and passive infrared signal processing with respect to false alarm rejection and detection performance.
Abstract: In recent years both passive infrared and ultasonic motion detectors became widely accepted intrusion detection devices. In order to arrive at an acceptable false alarm rate, signal processing methods have been developed which made the devices easy to install but also caused a general reduction of their sensitivity. In this report we present results obtained on the characteristics of typical burglar and false alarm signals. Various methods of ultrasonic and passive infrared signal processing will be discussed with respect to false alarm rejection and detection performance. It was found that algorithms can be developed which give a drastically increased false alarm rejection, thereby maintaining or improving the detection performance of the detector.

Patent
23 Nov 1987
TL;DR: In this paper, an intrusion detection loop employing an end-of-line resistor that operates with a voltage window is presented. But, as the window is increased, the sensitivity of the system decreases.
Abstract: An intrusion detection loop employing an end-of-line resistor that operates with a voltage window. As the voltage window is increased, the sensitivity of the system decreases. As the window is decreased, the sensitivity of the system increases. By utilizing two comparators each having one input coupled to the loop, one can specify one voltage window when the system is disarmed and hence place the system at maximum sensitivity thereby detecting any borderline problem. In any event, the same two comparators operate to provide a different voltage window when the system is armed and hence desensitizing the loop and therefore reducing alarm probability. In this manner one can determine during the disarmed condition that the loop is operating with a borderline resistance and still employ the system in the armed condition to assure that there will be a reduced alarm probability in view of an undesirable change of the loop resistance.

ReportDOI
01 Jul 1987
TL;DR: The Sandia Interior Robot (SIR) was developed at Sandia National Laboratories (SNL) as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort.
Abstract: Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems.

01 Jan 1987
TL;DR: In this article, a pyroelectric detector with an integral optical filter was used to detect the presence of a warm-bodied object in a specified area, and the detector response was then passed through an analog-to-digital converter and sampled by the microprocessor.
Abstract: The purpose of this paper is to describe a device that passively detects the presence of a warm-bodied object in a specified area. The detecting device used is a pyroelectric detector with an integral optical filter. By focusing infrared radiation generated by the object onto the detector, the resulting temperature change is converted to a voltage and then amplified. Modulation of the incoming radiation is accomplished by a rotating disk whose speed of rotation is dynamically controlled by a microprocessor. The resulting detector response is filtered and converted to a DC level. The signal is then passed through an analog-to-digital converter and sampled by the microprocessor. TABLE OF CONTENTS Introduction Pyroelectric Detectors. . ... An Application of the Pyroelectric Effect Detector Selection. . . .. Modulator Design. . . .. Amplification ....... . Band Pass Filter Design Absolute Value Circuit. Signal Processing Summary . . . . . . . . . Appendix .....•...•. References. iii 1 3 8 • 11 • • 12 • • • 15 . 21 • • • 2 8 . 33 • 34 • • 35 • 45 INTRODUCTION Some 2300 years ago, around 400 B.C., the Greeks observed that when heated in a fire, a tourmaline crystal would first attract and then repel small particles of dust and ash. The particles were inductively attracted to the crystal and upon making contact would accept a charge. The charged particles were then repelled because of the forces of like charges. It was not until 1824 in England that the effect would be studied and named pyroelectricity by D. Brewster[l]. A pyroelectric crystal is a member of the piezoelectric class of crystals that possesses a spontaneous polarization along an axis within its structure. Spontaneous polarization is characterized as the presence of polar atoms in a crystal lattice creating a natural electric moment per unit volume. There are 10 classes of crystal point groups that have this structure. In most cases, the presence of the electric field produced by this polarization is undetectable because of the free flow of charge within the crystal to the surface causing a cancelation of any external electric field. However, a change in