Anomaly Detection using Context-Aided Target Tracking

نویسندگان

  • Jemin George
  • John Crassidis
  • Tarunraj Singh
  • Adam M. Fosbury
چکیده

Anomaly detection refers to the problem of finding patterns in data that do not conform to expected normal behavior. Anomaly detection is extensively used in a wide variety of applications such as monitoring business news, epidemic or bioterrorism detection, intrusion detection, hardware fault detection, network alarm monitoring, and fraud detection [13]. Anomaly detection in target tracking is an essential tool in separating benign targets from intruders that pose a threat. This paper presents a new, innovative anomaly detection scheme using context-aided target tracking. Various data, feature, and knowledge fusion strategies and architectures have been developed over the last several years for improving the accuracy, robustness, and overall effectiveness of anomaly detection technologies. Singh et al. [41] illustrate the capabilities of hidden Markov models (HMMs), combined with featureaided tracking, for the detection of asymmetric threats. In [41], HMMs are integrated into feature-aided tracking using a transaction-based probabilistic model and a procedure analogous to Page’s test is used for the quickest detection of abnormal events. An information fusion-based decision support tool is presented in [8] to aid the identification of a target carrying out a pattern of activity, which could be comprised of a wide variety of possible sub-activities. Barker et al. [8] propose the time series anomaly detection methods to process multi-modal sensor data, which are then integrated by a Bayesian information fusion algorithm to provide a probability that each candidate under observation is carrying out the target activity. While the traditional anomaly-based intrusion detection approach builds one global profile for normal activities and detects intrusions by comparing current activities with the normal profile, Salem and Karim [39] propose a context-based profiling methods for building more realistic normal profiles than global ones. Moreover, contextual information is also exploited to build attack profiles that can be used for diagnosis purposes. Jackson et al. [21] propose a cognitive fusion approach for detecting anomalies appearing in the behavior of dynamic self-organizing systems such as sensor networks, mobile ad hoc networks, and tactical battle management. Fusion of relevant sensor data, maintenance database information, and outputs from various diagnostic and prognostic technologies have proven effective in reducing false alarm rates, increasing confidence levels in early fault detection, and predicting time to failure or degraded condition requiring maintenance action. Roemer et al. [38] provide an overview of various aspects of data, information, and knowledge fusion, including the places where fusion should exist within a health management system, the different types of fusion architectures, and a number of different fusion techniques. Compared to these existing context-aided anomaly detection schemes, the proposed

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the RX Anomaly Detection Algorithm for Hyperspectral Images using FFT

Anomaly Detection (AD) has recently become an important application of target detection in hyperspectral images. The Reed-Xialoi (RX) is the most widely used AD algorithm that suffers from “small sample size” problem. The best solution for this problem is to use Dimensionality Reduction (DR) techniques as a pre-processing step for RX detector. Using this method not only improves the detection p...

متن کامل

Anomalous Taint Detection ( Extended Abstract ) ⋆

We propose anomalous taint detection, an approach that combines fine-grained taint tracking with learning-based anomaly detection. Anomaly detection is used to identify behavioral deviations that manifest when vulnerabilities are exercised. Fine-grained taint-tracking is used to target the anomaly detector on those aspects of program behavior that can be controlled by an attacker. Our prelimina...

متن کامل

Quadrotor UAV Guidence For Ground Moving Target Tracking

The studies in aerial vehicles modeling and control have been increased rapidly recently. In this paper , a coordination of two types of heterogeneous robots , namely unmanned aerial vehicle (UAV) and unmanned ground vehicle (UGV) is considered. In this paper the UAV plays the role of a virtual leader for the UGVs. The system consists of a vision- based target detection algorithm that uses the ...

متن کامل

Doppler and bearing tracking using fuzzy adaptive unscented Kalman filter

The topic of Doppler and Bearing Tracking (DBT) problem is to achieve a target trajectory using the Doppler and Bearing measurements. The difficulty of DBT problem comes from the nonlinearity terms exposed in the measurement equations. Several techniques were studied to deal with this topic, such as the unscented Kalman filter. Nevertheless, the performance of the filter depends directly on the...

متن کامل

Transfer Learning for Time Series Anomaly Detection

Currently, time series anomaly detection is attracting significant interest. This is especially true in industry, where companies continuously monitor all aspects of production processes using various sensors. In this context, methods that automatically detect anomalous behavior in the collected data could have a large impact. Unfortunately, for a variety of reasons, it is often difficult to co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Adv. Inf. Fusion

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011