Abstract
This research deals with the task of detecting security anomalies and incidents in corporate smart spaces equipped with physical access control systems that support simultaneous implementation of various user identification and/or authentication methods and are often integrated with corporate cyber-physical and robotic systems. This approach allows gathering auxiliary data related to user behavior and thus detecting a wider range of security-related situation, such as entry and exit mismatches, usage of another person’s passes, and even faults and failures of the access control system itself, as well as achieving the higher reliability of user identification. For this purpose, an architectural solution for a system that uses RFID identification and face recognition was built. A corresponding data model was proposed. Using this data model and its implementation (for example, using relational databases and object-relationship mappings), the gathered data can be processed in order to detect potentially anomalous situations and security incidents. Then, the description and classification of such situations was given, and the delays of operation were measured during the experiment. The measurement shows that the delays allow experiencing the process of interaction as being one continuous flow. The tasks of future research were also specified.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Security and privacy controls for information systems and organizations. NIST special publication 800-53 Revision 5. https://doi.org/10.6028/NIST.SP.800-53r5
Vatamaniuk, I., Levonevskiy, D., Saveliev, A., Denisov, A.: Scenarios of multimodal information navigation services for users in cyberphysical environment. In: Ronzhin, A., Potapova, R., Németh, G. (eds.) Speech and Computer. SPECOM 2016. Lecture Notes in Computer Science, vol. 9811, pp. 588–595. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-43958-7_71
K Sandkuhl A Smirnov N Shilov 2019 Providing targeted digital signage: possible solutions SPIIRAS Proc. 18 4 831 857 https://doi.org/10.15622/sp.2019.18.4.831-857
Best access control systems of 2022, https://www.techradar.com/news/best-access-control-systems, last accessed 2022/08/21
Chen, A., Fu, Y. Zheng, X., Lu, G.: An efficient network behavior anomaly detection using a hybrid DBN-LSTM network. Comput. & Secur. 114 (2022). https://doi.org/10.1016/j.cose.2021.102600
XG Tian LZ Gao CL Sun MY Duan EY Zhang 2006 A method for anomaly detection of user behaviors based on machine learning J. China Univ. Posts Telecommun. 13 2 61 78 https://doi.org/10.1016/S1005-8885(07)60105-8
Jakub, B., Branišová, J.: Anomaly detection from log files using data mining techniques. In: Information Science and Applications, pp. 449–457 (2015). https://doi.org/10.1007/978-3-662-46578-3_53
F Antonolpoulos EGM Petrakis S Sotiriadis N Bessis 2018 A physical access control system on the cloud Procedia Comput. Sci. 130 318 325 https://doi.org/10.1016/j.procs.2018.04.045
Poh, J.P., Lee, J.Y.C., Tan, K.X., Tan, E.: Physical access log analysis: An unsupervised clustering approach for anomaly detection. In: Proceedings of the 3rd International Conference on Data Science and Information Technology, pp. 12–18 (2020). https://doi.org/10.1145/3414274.3414285
H Studiawan C Payne F Sohel 2017 Graph clustering and anomaly detection of access control log for forensic purposes Digit. Investig. 21 76 87 https://doi.org/10.1016/j.diin.2017.05.001
Geepalla, E., Asharif, S.: Analysis of physical access control system for understanding users behavior and anomaly detection using Neo4j. In: Proceedings of the 6th International Conference on Engineering & MIS 2020, Article 81, pp. 1–6. Association for Computing Machinery, New York, USA (2020). DOI: https://doi.org/10.1145/3410352.3410817
PACS log analysis using Splunk, https://habr.com/ru/company/tssolution/blog/345412/, last accessed 2022/11/21
Bengio, Y., Courville, A.C., Goodfellow, I.J., Mirza, M., Ozair, S.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 2, pp. 2672–2680 (2014).https://doi.org/10.48550/arXiv.1406.2661
D Malov M Letenkov 2019 Method of synthetic data generation and architecture of face recognition system for interaction with robots in cyberphysical space Robot. Tech. Cybern. 7 2 100 108 https://doi.org/10.31776/RTCJ.7203
Henty, S.: UI response times. https://medium.com/@slhenty/ui-response-times-acec744f3157. Accessed 21 Aug 2022
Uzdiaev, M., Vatamaniuk, I.: Investigation of manifestations of aggressive behavior by users of sociocyberphysical systems on video. In: Proceedings of the Computational Methods in Systems and Software, LNNS, vol. 231, pp. 593–604. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90321-3_49
G Algazin D Algazina 2022 Modeling the dynamics of collective behavior in a reflexive game with an arbitrary number of leaders Inform. Autom. 21 2 339 375 https://doi.org/10.15622/ia.21.2.5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Levonevskiy, D., Motienko, A., Vinogradov, M. (2022). Complex User Identification and Behavior Anomaly Detection in Corporate Smart Spaces. In: Ronzhin, A., Meshcheryakov, R., Xiantong, Z. (eds) Interactive Collaborative Robotics. ICR 2022. Lecture Notes in Computer Science, vol 13719. Springer, Cham. https://doi.org/10.1007/978-3-031-23609-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-031-23609-9_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-23608-2
Online ISBN: 978-3-031-23609-9
eBook Packages: Computer ScienceComputer Science (R0)