{"title":"用Neo4j分析物理访问控制系统理解用户行为和异常检测","authors":"Emsaieb Geepalla, Salwa Asharif","doi":"10.1145/3410352.3410817","DOIUrl":null,"url":null,"abstract":"Physical Access Control (PAC) systems play a central role in the protection of critical infrastructures, where both the provision of timely access and preserving the security of sensitive areas are paramount. A key challenge is how to detect normal and abnormal behavior of authorized users in PAC systems. This problem becomes increasingly severe as such systems become more and more complex, and is deployed to manage a large amount of sensitive or private areas, buildings and resources. Therefore, the focus of this paper is to develop a Graph-based method for analysis of PAC log data to detect normal and abnormal behavior. To achieve this, we have developed an Eclipse application (AC2Neo4j) that transforms PAC log data into Neo4j automatically, thus allowing for powerful analysis to take place using cypher queries.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Analysis of Physical Access Control System for Understanding Users Behavior and Anomaly Detection Using Neo4j\",\"authors\":\"Emsaieb Geepalla, Salwa Asharif\",\"doi\":\"10.1145/3410352.3410817\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physical Access Control (PAC) systems play a central role in the protection of critical infrastructures, where both the provision of timely access and preserving the security of sensitive areas are paramount. A key challenge is how to detect normal and abnormal behavior of authorized users in PAC systems. This problem becomes increasingly severe as such systems become more and more complex, and is deployed to manage a large amount of sensitive or private areas, buildings and resources. Therefore, the focus of this paper is to develop a Graph-based method for analysis of PAC log data to detect normal and abnormal behavior. To achieve this, we have developed an Eclipse application (AC2Neo4j) that transforms PAC log data into Neo4j automatically, thus allowing for powerful analysis to take place using cypher queries.\",\"PeriodicalId\":178037,\"journal\":{\"name\":\"Proceedings of the 6th International Conference on Engineering & MIS 2020\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 6th International Conference on Engineering & MIS 2020\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3410352.3410817\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Conference on Engineering & MIS 2020","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3410352.3410817","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Physical Access Control System for Understanding Users Behavior and Anomaly Detection Using Neo4j
Physical Access Control (PAC) systems play a central role in the protection of critical infrastructures, where both the provision of timely access and preserving the security of sensitive areas are paramount. A key challenge is how to detect normal and abnormal behavior of authorized users in PAC systems. This problem becomes increasingly severe as such systems become more and more complex, and is deployed to manage a large amount of sensitive or private areas, buildings and resources. Therefore, the focus of this paper is to develop a Graph-based method for analysis of PAC log data to detect normal and abnormal behavior. To achieve this, we have developed an Eclipse application (AC2Neo4j) that transforms PAC log data into Neo4j automatically, thus allowing for powerful analysis to take place using cypher queries.