Intrusion detection system based on speckle pattern analysis

被引:0
|
作者
A. Dhall
J. K. Chhabra
N. S. Aulakh
机构
[1] Central Scientific Instruments Organisation,
来源
Experimental Techniques | 2005年 / 29卷
关键词
Speckle; Intrusion; Fiber optic; Security; Image processing;
D O I
暂无
中图分类号
学科分类号
摘要
Buried fiber intrusion detection by calculating the changes in the spatial distribution of energy in the output of a multimode optical fiber has been demonstrated. An analysis and experimental demonstrations of the system have been provided in which we observed that by using the very simple technique of speckle pattern analysis using image processing we could detect various intrusions. The system can be used to detect the passage of vehicles and personnel over buried sensing fibers. The non-electrical nature of the sensor would allow it to be undetectable by the intruder, and the low loss nature of fiber optics would allow the signal processing location to be located at a large distance from the actual sensor. The complete hardware utilized in this effort is one that can be realized at low cost. The same technique can be used in many other sensing applications like temperature sensing, pressure sensing, any kind of vibration sensing etc. Further improvements in the design can be planned using neural network and advanced image processing algorithms such that only human intrusions are separated from other (nuisance) intrusion signals.
引用
收藏
页码:25 / 31
页数:6
相关论文
共 50 条
  • [21] PGNIDS(Pattern-Graph Based Network Intrusion Detection System) design
    Lee, Byung-kwan
    Yang, Seung-hae
    Kwon, Dong-Hyuck
    Kim, Dai-Youn
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 38 - 47
  • [22] A Survey of Pattern Matching Algorithm in Intrusion Detection System
    Gharaee, Hossein
    Seifi, Shokoufeh
    Monsefan, Nima
    [J]. 2014 7th International Symposium on Telecommunications (IST), 2014, : 946 - 953
  • [23] An Improved Pattern Matching Algorithm in the Intrusion Detection System
    Zhang Ping
    Liu Jianghui
    [J]. MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, PTS 1 AND 2, 2011, 48-49 : 203 - +
  • [24] Memory Efficacious Pattern Matching Intrusion Detection System
    Dhivya, S.
    Dhakchianandan, D.
    Gowtham, A.
    Sujatha, Kola P.
    Kannan, A.
    [J]. 2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 652 - 656
  • [25] Performance Analysis of Snort-based Intrusion Detection System
    Garg, Akash
    Maheshwari, Prachi
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [26] An Analysis of Supervised Tree Based Classifiers for Intrusion Detection System
    Thaseen, Sumaiya
    Kumar, Ch. Aswani
    [J]. 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [27] State analysis based on the agreement of the Intrusion Detection System Model
    Xing, Wenjian
    Zhang, Jing
    Li, Tonglei
    [J]. ICMS2010: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, VOL 6: MODELLING & SIMULATION INDUSTRIAL ENGINEERING & MANAGEMENT, 2010, : 177 - 180
  • [28] Asymptotic Analysis of A Fuzzy Based Intrusion Detection System For Zigbee
    Maphatsoe, Tsitso
    Masinde, Muthoni
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 89 - 96
  • [29] An Intrusion Detection System Based on Polynomial Feature Correlation Analysis
    Li, Qingru
    Tan, Zhiyuan
    Jamdagni, Aruna
    Nanda, Priyadarsi
    He, Xiangjian
    Han, Wei
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 978 - 983
  • [30] Research on Distributed Intrusion Detection System Based on Protocol Analysis
    Qu, Xiaohong
    Liu, Zhijie
    Xie, Xiaoyao
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 421 - 424