Eye with Intelligence. Connecting CCTV to Big Data, Hadoop and R



Similar documents
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Alert Technology Group 46 Empey St, Brantford ON Office Toll Free

UPS battery remote monitoring system in cloud computing

IP Camera Network Installations are More Difficult than Analog Camera Installations? Not So!

Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc All Rights Reserved

Operational Intelligence: Real-Time Business Analytics for Big Data Philip Russom

Innovative Security for an Accelerating World New Approaches for Chief Security Officers

Data Refinery with Big Data Aspects

Leveraging the Cloud for Video Surveillance Solutions From the Small Business to the Enterprise Organization. March 30, 2011

City Surveillance and the Cloud

Data Storage for Video Surveillance

Oracle Big Data SQL Technical Update

Commercial Security Made Simple with Cloud Video Surveillance

Chapter 1 Introduction

Innovative Solutions by Integrating GPS, Video and

The session is about to commence. Please switch your phone to silent!

Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

Setting the Standard for Safe City Projects in the United States

EVERY PICTURE SAVES A THOUSAND WORDS

Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers

IoT and Big Data- The Current and Future Technologies: A Review

Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience

Leveraging Big Data. Processing ISR Data. JP Morgenthal Cloud Ranger. Cloud and Virtual Data Center Services EMC Consulting

Beyond Web Application Log Analysis using Apache TM Hadoop. A Whitepaper by Orzota, Inc.

Cloud Video Management (CVM)

CLOUD BASED HOME SECURITY 1 Anjali Chachra 1

URBAN. Security Solution. Urban Security Solution Military Security Solution SOC Security Solution

SCADA AND SECURITY DISPATCHES ACCORDING TO PRESENT LEGISLATION IN ROMANIA

Big Data Are You Ready? Jorge Plascencia Solution Architect Manager

CRISIL YOUNG THOUGHT LEADER 2012

D-Link, the D-Link logo, and D-ViewCam are trademarks or registered trademarks of D-Link Corporation or its subsidiaries in the United States and

Leading video analytics platform market

Welcome to the unit of Hadoop Fundamentals on Hadoop architecture. I will begin with a terminology review and then cover the major components

Video Surveillance Trends Report. An inside look at how IT Executives and System Integrators are managing video surveillance data

Integrated Physical Security and Incident Management

CSE-E5430 Scalable Cloud Computing Lecture 2

Networking in the Hadoop Cluster

Cloud Video Surveillance Platform for Safe City Projects

Improving Data Processing Speed in Big Data Analytics Using. HDFS Method

Big Data Analytics. An Introduction. Oliver Fuchsberger University of Paderborn 2014

Are You Ready for Big Data?

Vess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0

Wireless Remote Video Monitoring

IP Surveillance. Presentation for BICSI Regional Conference Troy, Michigan March 15, Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link

CCTV & Video Surveillance over 10G ip

Leveraging Machine Data to Deliver New Insights for Business Analytics

Video Analytics and Security

Security Policy JUNE 1, SalesNOW. Security Policy v v

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Consumer Electronics: Innovation for Cloud Computing

How To Use A Network Video Recorder For Video Surveillance

Are You Ready for Big Data?

BIG DATA: BIG CHALLENGE FOR SOFTWARE TESTERS

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Getting Real Real Time Data Integration Patterns and Architectures

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval

Hadoop Architecture. Part 1

Upload files to FTP server

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Wireless Remote Video Monitoring

Big Data Use Case: Business Analytics

A U T H O R S : G a n e s h S r i n i v a s a n a n d S a n d e e p W a g h Social Media Analytics

Axis IP surveillance. Endless possibilities for video surveillance.

The Big Data Paradigm Shift. Insight Through Automation

Lecture 32 Big Data. 1. Big Data problem 2. Why the excitement about big data 3. What is MapReduce 4. What is Hadoop 5. Get started with Hadoop

THE EVOLUTION OF SIEM

integrated fire and security solutions Maximum protection for buildings

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Cyber Forensic for Hadoop based Cloud System

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

ป งบประมาณ พ.ศ.๒๕๕๘ ( ๑ ต ลาคม ๒๕๕๗ ถ ง 30 ก นยายน ๒๕๕๘ ) สร ปผลปร มาณงานพ สด การจ ดซ อ/จ าง/เช า ในรอบเด อนพฤศจ กายน ๒๕๕๗ ส าน กงานท ด นจ งหว ดเช

Security Intelligence

WINDOWS AZURE DATA MANAGEMENT

How To Protect Video From Being Lost In A Fault Fault On A Network With A Shadow Archive

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Business Analytics In a Big Data World Ted Malone Solutions Architect Data Platform and Cloud Microsoft Federal

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

How To Make Data Streaming A Real Time Intelligence

Massive Cloud Auditing using Data Mining on Hadoop

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Testing 3Vs (Volume, Variety and Velocity) of Big Data

Transcription:

www.ijcsi.org 118 Eye with Intelligence Connecting CCTV to Big Data, Hadoop and R Vishal Mehta 1 1 Mphasis Limited Cyber City, Tower IV, Magarpatta City, Hadapsar Pune Abstract Security, an abstraction which creates a virtual boundary and gives the sense of separation between the asset and the threat. It provides a layer of protection to the asset by encapsulating it and just making visible the necessary details to the outside world. In this paper we are trying to implement a system which makes the CCTV (Closed- Circuit Television) connect to more powerful technologies like Big Data and Hadoop which removes the human monitoring efforts by making the system automated and self-reporting in order to reduce crime rate and provide an action just by observing the attributes of malicious behavior by introducing the notion of SAAS (Security as a Service). Keywords: ICCTV (Closed Circuit Television), OCCT (Open Circuit Television), DVR (Digital Video Recorder). 1. Introduction In this paper we are trying to redefine the concept of CCTV (Closed-Circuit Television) to OCCT (Open-Circuit Cloud Television) in which the CCTV cameras record the video and directly stream in the video on to the cloud for the real time processing. This cloud is installed with the framework which is capable to monitor the behavior of the specific in the mass and report as threat in real time. In this way system steps in to make the assets more secure and provide an action alert before the mishap takes place by its system intelligence. 2. EXISTING SYSTEM 2.1 Classical System In this there are number of CCTV camera s installed in various different locations. These camera s record the video in their raw form and send it to some specific place where this specific place is a control room. The control room is installed with the television and a 24*7 human effort is required in order to monitor the video feed as shown in the Fig 1. 2.2 DVR based systems In this types of systems the recorded video feed is directly dumped in to the DVR and then these are responsible to store the data for hundreds of hour s and again the recording is opened as per need in order to monitor the malicious behavior as shown in Fig 2.. 2.3 IP based cameras In this type of the CCTV systems the IP based cameras are used which are directly connected to remote servers in the network attached storage. Again these recordings done by the IP cameras are stored in the NAS and depend upon the human being in order to monitor the video as shown in Fig 3. All the above systems continuous involvement of human effort and with the help of the data sets analysis of US crime y the help of R (Statistical analysis of these raw feeds of data) we can easily identify what level of security we can achieve from the existing system of security and try

www.ijcsi.org 119 to answer some basic questions. How secure we are? How can we more secure? And make the world more safe place to live. Control Room Fig 1. Monitor Human F Fig 2.

www.ijcsi.org 120

www.ijcsi.org 121 3. SECURITY AS A SERVICE Today world has a great buzz of cloud computing where things are with notion X as a service (XAAS) where X = Anything. In our system we are trying to implement X = Security In this the cameras can be installed in some location. The cameras will produce the continuous raw video feed which gets directly uploaded to the cloud with the help of network. This video feed gets scooped into various nodes in the same rack or on the different racks in the same cluster in Hadoop HDFS (Hadoop Distributed File System). In all the different nodes we have map reduce algorithms which analyses the video on all the nodes parallel on all the nodes as video content analysis. If any mal behavior found in the video then an immediate alert is fired by the system on the same instant. 3.1 Working The entire video gets divided into multiple slots. Theses slots are send to different nodes in order to process. The map reduce processes the video slot on that node frame by frame and compares to the centralized criminal database to find the threat with the help of face recognition system and if the threat if found then the threat is registered in the threat record on the different node on the same cluster with all the details of the geographical location of the video captured, threat details etc. Since the video feeds can come multiple geographical areas the Big Data comes into the rescue to store so much of the data and provide a real time analysis to the video parallel on multiple nodes to make the system faster. As we can see this with the help of diagram in Fig 4.

www.ijcsi.org 122 HadoopCluster Fig4

www.ijcsi.org 123 4. CONCLUSIONS The resulting system helps in real time identification, analysis and remedy to fix up the criminal issues and to response to the challenging notion to define a fix before the crime takes place. The real time statistical analysis of the data produced by these systems will be an eye opener and will be in the position to define the hot geographical areas responsible for crimes. Acknowledgments References [1] Big data: The next frontier for innovation, competition, and productivity. [2] Understanding big data: Analytics for enterprise class Hadoop and streaming data [3] Understanding car parks, crime and CCTV by Nick Tilley. [4] Surveillance, Closed Circuit Television and Social Control. [5] Jason Surveillance of Public Space: CCTV, Street Lighting and Crime Prevention I would like to thank Mr. Venkat Suresh, Mr. Shailesh Kulkarni and Mr. Suraj C. Kothari in order to make always taking up the challenging idea to bring them to reality and always are the source of inspiration.