Graph-Based Anomaly Detection Applied to Homeland Security Cargo Screening
نویسندگان
چکیده
Protecting our nation’s ports is a critical challenge for homeland security and requires the research, development and deployment of new technologies that will allow for the efficient securing of shipments entering this country. Most approaches look only at statistical irregularities in the attributes of the cargo, and not at the relationships of this cargo to others. However, anomalies detected in these relationships could add to the suspicion of the cargo, and therefore improve the accuracy with which we detect suspicious cargo. This paper proposes an improvement in our ability to detect suspicious cargo bound for the U.S. through a graph-based anomaly detection approach. Using anonymized data received from the Department of Homeland Security, we demonstrate the effectiveness of our approach and its usefulness to a homeland security analyst who is tasked with uncovering illegal and potentially dangerous cargo shipments.
منابع مشابه
A Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملGID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems
Intrusion detection system (IDS) is an important part of enterprise security system architecture. In particular, anomaly-based IDS has been widely applied to detect abnormal process behaviors that deviate from the majority. However, such abnormal behavior usually consists of a series of lowlevel heterogeneous events. The gap between the low-level events and the high-level abnormal behaviors mak...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملAnomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
متن کامل3D Gabor Based Hyperspectral Anomaly Detection
Hyperspectral anomaly detection is one of the main challenging topics in both military and civilian fields. The spectral information contained in a hyperspectral cube provides a high ability for anomaly detection. In addition, the costly spatial information of adjacent pixels such as texture can also improve the discrimination between anomalous targets and background. Most studies miss the wort...
متن کامل