Skip to main content

Complex User Identification and Behavior Anomaly Detection in Corporate Smart Spaces

  • Conference paper
  • First Online:
Book cover Interactive Collaborative Robotics (ICR 2022)

Abstract

This research deals with the task of detecting security anomalies and incidents in corporate smart spaces equipped with physical access control systems that support simultaneous implementation of various user identification and/or authentication methods and are often integrated with corporate cyber-physical and robotic systems. This approach allows gathering auxiliary data related to user behavior and thus detecting a wider range of security-related situation, such as entry and exit mismatches, usage of another person’s passes, and even faults and failures of the access control system itself, as well as achieving the higher reliability of user identification. For this purpose, an architectural solution for a system that uses RFID identification and face recognition was built. A corresponding data model was proposed. Using this data model and its implementation (for example, using relational databases and object-relationship mappings), the gathered data can be processed in order to detect potentially anomalous situations and security incidents. Then, the description and classification of such situations was given, and the delays of operation were measured during the experiment. The measurement shows that the delays allow experiencing the process of interaction as being one continuous flow. The tasks of future research were also specified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Security and privacy controls for information systems and organizations. NIST special publication 800-53 Revision 5. https://doi.org/10.6028/NIST.SP.800-53r5

  2. Vatamaniuk, I., Levonevskiy, D., Saveliev, A., Denisov, A.: Scenarios of multimodal information navigation services for users in cyberphysical environment. In: Ronzhin, A., Potapova, R., Németh, G. (eds.) Speech and Computer. SPECOM 2016. Lecture Notes in Computer Science, vol. 9811, pp. 588–595. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-43958-7_71

  3. K Sandkuhl A Smirnov N Shilov 2019 Providing targeted digital signage: possible solutions SPIIRAS Proc. 18 4 831 857 https://doi.org/10.15622/sp.2019.18.4.831-857

    Article  Google Scholar 

  4. Best access control systems of 2022, https://www.techradar.com/news/best-access-control-systems, last accessed 2022/08/21

  5. Chen, A., Fu, Y. Zheng, X., Lu, G.: An efficient network behavior anomaly detection using a hybrid DBN-LSTM network. Comput. & Secur. 114 (2022). https://doi.org/10.1016/j.cose.2021.102600

  6. XG Tian LZ Gao CL Sun MY Duan EY Zhang 2006 A method for anomaly detection of user behaviors based on machine learning J. China Univ. Posts Telecommun. 13 2 61 78 https://doi.org/10.1016/S1005-8885(07)60105-8

    Article  Google Scholar 

  7. Jakub, B., Branišová, J.: Anomaly detection from log files using data mining techniques. In: Information Science and Applications, pp. 449–457 (2015). https://doi.org/10.1007/978-3-662-46578-3_53

  8. F Antonolpoulos EGM Petrakis S Sotiriadis N Bessis 2018 A physical access control system on the cloud Procedia Comput. Sci. 130 318 325 https://doi.org/10.1016/j.procs.2018.04.045

    Article  Google Scholar 

  9. Poh, J.P., Lee, J.Y.C., Tan, K.X., Tan, E.: Physical access log analysis: An unsupervised clustering approach for anomaly detection. In: Proceedings of the 3rd International Conference on Data Science and Information Technology, pp. 12–18 (2020). https://doi.org/10.1145/3414274.3414285

  10. H Studiawan C Payne F Sohel 2017 Graph clustering and anomaly detection of access control log for forensic purposes Digit. Investig. 21 76 87 https://doi.org/10.1016/j.diin.2017.05.001

    Article  Google Scholar 

  11. Geepalla, E., Asharif, S.: Analysis of physical access control system for understanding users behavior and anomaly detection using Neo4j. In: Proceedings of the 6th International Conference on Engineering & MIS 2020, Article 81, pp. 1–6. Association for Computing Machinery, New York, USA (2020). DOI: https://doi.org/10.1145/3410352.3410817

  12. PACS log analysis using Splunk, https://habr.com/ru/company/tssolution/blog/345412/, last accessed 2022/11/21

  13. Bengio, Y., Courville, A.C., Goodfellow, I.J., Mirza, M., Ozair, S.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 2, pp. 2672–2680 (2014).https://doi.org/10.48550/arXiv.1406.2661

  14. D Malov M Letenkov 2019 Method of synthetic data generation and architecture of face recognition system for interaction with robots in cyberphysical space Robot. Tech. Cybern. 7 2 100 108 https://doi.org/10.31776/RTCJ.7203

    Article  Google Scholar 

  15. Henty, S.: UI response times. https://medium.com/@slhenty/ui-response-times-acec744f3157. Accessed 21 Aug 2022

    Google Scholar 

  16. Uzdiaev, M., Vatamaniuk, I.: Investigation of manifestations of aggressive behavior by users of sociocyberphysical systems on video. In: Proceedings of the Computational Methods in Systems and Software, LNNS, vol. 231, pp. 593–604. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90321-3_49

  17. G Algazin D Algazina 2022 Modeling the dynamics of collective behavior in a reflexive game with an arbitrary number of leaders Inform. Autom. 21 2 339 375 https://doi.org/10.15622/ia.21.2.5

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dmitriy Levonevskiy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Levonevskiy, D., Motienko, A., Vinogradov, M. (2022). Complex User Identification and Behavior Anomaly Detection in Corporate Smart Spaces. In: Ronzhin, A., Meshcheryakov, R., Xiantong, Z. (eds) Interactive Collaborative Robotics. ICR 2022. Lecture Notes in Computer Science, vol 13719. Springer, Cham. https://doi.org/10.1007/978-3-031-23609-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-23609-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23608-2

  • Online ISBN: 978-3-031-23609-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics