2021
DOI: 10.1364/oe.415929
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion behavior classification method applied in a perimeter security monitoring system

Abstract: A distributed optic fiber perimeter security system is proved to be an effective strategy for the security monitoring of some vital targets, such as power plants, power substations and telecommunication base stations. However, this method can hardly distinguish different categories of the intrusion behavior and is easily mis-triggered by different kinds of environmental interference. To distinguish different intrusion patterns and different interference events effectively, a vibration pattern recognition algor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Due to the large number of sensor types, the experiment is tested for wind sensors, and the input voltage value is used as the analog signal and the output value is obtained after processing. The output results were compared with the literature [7] method literature [8] method and literature [9] method, and the test results are shown in Figure 4 and Figure 5, respectively Analyzing the above figure, it can be concluded that the sensor acquisition performance in the monitoring system in this paper is good, the error between the output value and the input value of the two sensors is small, and the average value range is from 0.02 V; The other three methods don't work well. Stable, sometimes with large errors.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the large number of sensor types, the experiment is tested for wind sensors, and the input voltage value is used as the analog signal and the output value is obtained after processing. The output results were compared with the literature [7] method literature [8] method and literature [9] method, and the test results are shown in Figure 4 and Figure 5, respectively Analyzing the above figure, it can be concluded that the sensor acquisition performance in the monitoring system in this paper is good, the error between the output value and the input value of the two sensors is small, and the average value range is from 0.02 V; The other three methods don't work well. Stable, sometimes with large errors.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Generally, when the CPU usage is higher than 90%, the risk of system crash is greater. Therefore, it can be seen that when the number of concurrent users in the literature [7] reaches 150, the CPU utilization rate has exceeded 90%, while when the number of users in the fuzzy hierarchy method reaches 200, the CPU utilization rate cannot meet the normal operation requirements of the system, and the method in this paper can meet the needs of more users at the same time, and when the number of users reaches 200, the information packet loss rate is 75.4%. This shows that the three-tier system distribution strategy can improve the resource utilization efficiency and provide more space for the system operation.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Therefore, the protection of the perimeter of a computer system is considered one of the most relevant aspects in the field of information security. Perimeter security aims to protect the system perimeter against intruders and is regarded as an organization's first line of defense (Mi et al, 2021 ). The importance of perimeter security is that any breach or vulnerability in this area can lead to unauthorized intrusions, putting data integrity and business continuity at risk (Lyu et al, 2021b ).…”
Section: Introductionmentioning
confidence: 99%
“…The interferometry-based sensing systems, such as the dual Mach-Zehnder interferometer (DMZI) and Sagnac interferometer, were utilized for event detection in fenced perimeter security systems [7][8][9][10][11]. In Ref.…”
Section: Introductionmentioning
confidence: 99%
“…In Ref. [11], the proposed intruder pattern recognition algorithm utilized the Sagnac interferometer structure and consisted of pre-processing and pattern recognition using multi-layer perceptron neural networks (MLP-NNs). The power spectrum of the vibration signal was used in the pre-processing step to extract relevant features, and a selected frequency band of 0 Hz to 2000 Hz was used to construct a frequency sequence.…”
Section: Introductionmentioning
confidence: 99%