Intruder Detection System Through Walking Pattern Analysis for Home Security

Author(s):  
R.C.P.D. Peiris ◽  
R. Tharmikka ◽  
H.M.V.R. Herath ◽  
M.B. Dissanayake ◽  
U.S. Navaratne
2005 ◽  
Vol 51 (1) ◽  
pp. 130-138 ◽  
Author(s):  
Young-Keun Choi ◽  
Ki-Man Kim ◽  
Ji-Won Jung ◽  
Seung-Yong Chun ◽  
Kyu-Sik Park

Author(s):  
P. Bhanu Teja ◽  
P. Sandeep Kumar ◽  
N. Dileep Reddy

Thefts have been on the rise in recent years. This produces a dangerous climate in which people live in terror. In today's environment, the problem of home security is a source of anxiety. The standard intruder detection systems that we currently use are extremely expensive, and there is a risk of false alerts. This issue is solved by combining OpenCV and a mobile phone to create a framework that can accurately recognize a interloper while filtrating the movements caused by objects which are moving. If an interloper is identified, the system sends a message to the user via an API called Twilio, and the footage is saved to the local storage.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 10
Author(s):  
V Mala ◽  
K Meena

Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.


Author(s):  
Oscar Arturo González González ◽  
Alina Mariana Pérez Soberanes ◽  
Víctor Hugo García Ortega ◽  
Julio César Sosa Savedra

Sign in / Sign up

Export Citation Format

Share Document