How To Develop A Computer Security System



Similar documents
THE POLISH PLATFORM FOR HOMELAND SECURITY IDEA, HISTORY AND RESEARCH PROJECTS

D0.5 INDECT Ethical Issues 2009

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

4-th Multimedia Communications, Services and Security Kraków 2011

Privacy versussecurity: Moral disagreements in the context of surveillance

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Iasi. T76.1 Bus Management System in Iasi. Iasi

ANNEX ENLETS. Work programme European Network of Law Enforcement Technology Services /13 EB/hm 2 ANNEX DG D 2C LIMITE EN

Higher education institutions as places to integrate individual lifelong learning strategies

Thank you for visiting this website, which is owned by Essendant Co.

Innovative Building Management for sustainable energy efficiency

Information Technology Career Field Pathways and Course Structure

Statistics on Requests for data under the Data Retention Directive

ADAMANTIUM Project: Enhancing IMS with a PQoS-aware Multimedia Content Management System

EXECUTIVE SUMMARY. Measuring money laundering at continental level: The first steps towards a European ambition. January 2011 EUROPEAN COMMISSION

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

2. Is registration with PARAFES free? Yes.

Introduction. Fields marked with * are mandatory.

Drink driving in Europe

Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved.

Special Eurobarometer 423 CYBER SECURITY REPORT

Special Eurobarometer 423 CYBER SECURITY SUMMARY

A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

Energy Management Transparency creates efficiency

Joint Master in Information Security and Data Management (ISDM)

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Big Data and Society: The Use of Big Data in the ATHENA project

Building Technologies

GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING

Crime and Criminal Justice

One LAR Course Credits: 3. Page 4

1. Perception of the Bancruptcy System Perception of In-court Reorganisation... 4

Faculty of Electrical Engineering, Automatics, Computer Science and Electronics

On the Portability of Procedural Justice Theory:

FP7 Space Research Proposal evaluation and role of the REA European Commission REA S2 Space Research

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

CISCO NETWORK CONNECTIVITY CENTER

Fieldwork: November December 2010 Publication: June

Using Business Intelligence techniques to increase the safety of citizens The Tilburg case. Abstract

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July December 2016

I have asked for asylum in the EU which country will handle my claim?

Public Safety Answering Points in Europe

Employee eligibility to work in the UK

Europol External Strategy. Business Case: Cooperation with Georgia

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

NOS for Data Analysis (802) September 2014 V1.3

SURVEY REPORT DATA SCIENCE SOCIETY 2014

INTERNATIONAL TRACKED POSTAGE SERVICE

Students: undergraduate and graduate students who are currently enrolled in universities

Drink Driving in Europe

Genuine BMW Accessories. The Ultimate Driving Machine. BMW Trackstar. tracked. recovered. BMW TRACKSTAR.

ERASMUS FOR YOUNG ENTREPRENEURS : A NEW EXCHANGE PROGRAMME

Ethics Advisory Board

Milan Zoric ETSI

ECCE Standing Committee Education & Training

Finance Industry. Integrated Software Solutions

Industrial Challenges for Content-Based Image Retrieval

IAB Europe AdEx Benchmark Daniel Knapp, IHS Eleni Marouli, IHS

CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK)

National Integrated Services Framework The Foundation for Future e-health Connectivity. Peter Connolly HSE May 2013

Deliverable D7.1. Project Website and Project Presentation

CISCO METRO ETHERNET SERVICES AND SUPPORT

Declaration of the Ministerial Conference of the Khartoum Process

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

CASE STUDY. A Demanding Environment. London Taxis International Noise Vibration Harshness The TXII. United Kingdom. Automotive Manufacture

From Lawful to Massive Interception : Aggregation of sources. amesys - Prague ISS World Europe 2008

Online Behavioural Advertising transparency and control for consumers

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

EUROPE 2020 TARGET: TERTIARY EDUCATION ATTAINMENT

The Guardianship Service

Statewatch Briefing ID Cards in the EU: Current state of play

TOYOTA I_SITE More than fleet management

The Community Innovation Survey 2010 (CIS 2010)

NetFlow Feature Acceleration

Improving Analytical Tools The Future of Interrogating Data London, October

MARGARET HADDOCK PRESIDENT EUROPEAN UNION FOR SUPPORTED EMPLOYMENT (EUSE) DEPUTY CHIEF EXECUTIVE THE ORCHARDVILLE SOCIETY. Brussels June 2014

Core Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies

SESAR. Luftfahrttechnologie - Auftaktveranstaltung zum 7. EU-Forschungsrahmenprogramm Wien, 4 Dezember 2006

Architecture. Young Talent. Award Rules. January Organised by:

e-sens Electronic Simple European Networked Services Rome,

May For other information please contact:

AMDOCS INTERACTIVE CUSTOMER SUCCESS STORY HONG KONG CSL

ERASMUS+ MASTER LOANS

your own success? Locate addresses exactly Visualise your company data Analyse connections Make the right decisions Use your full potential

Central and Eastern Europe Information Society Benchmarks

Setting the Standard for Safe City Projects in the United States

24 Hour Secure Operating Centre * Customer Services * (Monday-Friday 8.30am-5.30pm)

VARONIS CASE STUDY. Fresenius Netcare

ICT-based social support for carers of older people A new multilingual web platform in the EU-27

Building a Global Internet Company: Driving Traffic to Your Site. Benjamin Edelman Harvard Business School

41 T Korea, Rep T Netherlands T Japan E Bulgaria T Argentina T Czech Republic T Greece 50.

TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS. Paulo Magina Public Sector Integrity Division

ELDIS Software Police and safety

TRAINING BROCHURE - ENGLISH

PHONE SELLING ADDITIONAL INFORMATION

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Implementing the cooperation mechanisms of the RES directive current status and open questions

Transcription:

INDECT Intelligent information system supporting observation, searching and detection for security of citizens in urban environment Prof. dr hab. inż. Andrzej Dziech INDECT Coordinator

Short History of INDECT Project Submission under Prof. A. Dziech supervision 2011-04-10 4

The Partners The Partners Participant organisation name Short Name Country AGH University of Science and Technology AGH Poland Fachhochschule Wien FHTWIEN Austria Gdansk University of Technology GUT Poland InnoTec DATA GmbH & Co. KG INNOTEC Germany IP Grenoble (Ensimag) IPNG France General Headquarters of Polish Police GHP Poland Moviquity MOVIQUITY Spain Products and Systems of Information Technology PSI Germany Police Service of Northern Ireland PSNI United Kingdom Poznan University of Technology PUT Poland Universidad Carlos III de Madrid UC3M Spain Technical University of Sofia TUSOFIA Bulgaria University of Wuppertal UNIWUP Germany University of York UNIYORK United Kingdom Technical University of Ostrava VSB Czech Republic Technical University of Kosice TUKE Slovakia X-Art Pro Division G.m.b.H. X-ART Austria

The Main Research Tools and Objectives INDECT Intelligent Monitoring for Threat Detection Threat Detection in Computer Networks (Internet) Data Protection and Privacy Protection 2011-04-10 6

The Main Research Tools and Objectives Intelligent Monitoring for Threat Detection Objectives Search engine based on watermarks New techniques: Query by Example Pattern recognition Distributed databases Contour extraction INACT methods Platform for intelligent processing of information Methods 1) Dangerous tools detection 2) Detection of crying for help, broken glass 3) Detection of unattended luggage 4) Monitoring of vehicles used for crime 5) Results 2011-04-10 7

The Main Research Tools and Objectives Threat Detection in Computer Networks (Internet) Objectives Relationship mining tools Semantic search Software agent technology Methods 1) Detection of trafficking of humans, organs 2) Detection of break into virtual banks 3) Search engine for child pornography 4) Results 2011-04-10 8

The Main Research Tools and Objectives Data Protection and Privacy Protection Watermarking techniques Cryptography Quantum cryptography 1) Protection of personal data using watermarking and cryptography 2) Protection of ID of persons and objects in image and video sequences 3) Objectives Results Methods 2011-04-10 9

THREAT DETECTION INDECT Real environment Virtual environment INDECT DETECTION OF SOURCE OF THREAT INDECT IDENTIFICATION OF SOURCE (recognition of persons generating threat) SECURITY SERVICE, POLICE Step 1 Step 2 Step 3 2011-04-10 10

INDECT doesn t deal with and is not involved in 1) Collecting of personal data 2) Recording of mobile calls 3) Collecting of DNA codes 4) Satellite collecting of data 5) Collecting data from TV 6) 2011-04-10 11

4 Generalblock diagram of the overall scope of INDECT

5 Architecture and WP structure of INDECT

List of work packages WP No WP 0 WP 1 WP 2 WP 3 WP 4 WP 5 WP 6 WP 7 WP 8 WP 9 Project Management and Horizontal Activities Work package title Intelligent Monitoring and Automatic Detection of Threats Identification and Observation of Mobile Objects in Urban Environment Intelligent integrated agent-based system supporting observation, analysis and detection of criminal activities and threats in complex real-virtual environments Extraction of Information for Crime Prevention by Combining Web Derived Knowledge and Unstructured Data Search Engine for Fast Detection Based on Watermarking and Agent Technology Interactive Multimedia Applications Portal for Intelligent Observation System Biometrics and Intelligent Methods for Extraction and Supplying Security Information Security and Privacy Management Test-Beds and Dissemination of Results 6

Overall relationships between WPs End User Security and Privacy Management (WP8) Data Analysis and Presentation (WP6) Tracking of Mobile Objects (WP2) Biometric-based Recognition (WP7) Information Extraction (WP4) Watermarking Search (WP5) Identification and Observation of Threats (WP1) Monitoring of Physical Objects and Detection of Threats Agent-Based Monitoring and Threat Detection (WP3) Monitoring of Computer Networks and Detection of Threats 7

Innovations by INDECT State-of-the-Art Tools to monitor and threat detection in public services by Internet. Tracking and routing devices based mainly on GPS, GPRS and dedicated systems. Tools for information extraction. Watermarking technology is mainly based on DCT Transform and Pseudorandom Sequences. Searching of images, video sequences and graphical information is based on separation of Metadata from image and video contents. Innovation by INDECT Dedicated to the police, programmable in the sense of information context for automatic searching. Designing, construction and research of integrated tracking devices, able to operate in the absence of satellite reception. Dedicated mechanisms for relationship identification, behavioural profiling and detection of suspicious websites A new approach will be attempted using special transforms based on fast algorithms of the family of Piecewise Linear Transforms (PLT), especially the PHL, PWL Transforms. Proposed new watermarking encoder and decoder will be much faster and more reliable than DCT. Developing new type of search engine combining direct search of image and video based on watermark contents. 10

Innovations by INDECT State-of-the-Art Keyword-based search in security-related databases Ability to analyse parts of an image independently, to choose the region of interest, monitoring or the approach of a person. Observations have to be forwarded to common operational picture. Isolated usage of systems focussing on special security aspects. Different threat detection systems based on monitoring / operating different systems. Innovation by INDECT Query by Example (QBE) techniques used for searching. Implementation of a set of new methods used for a combined analysis of sound, image and alphanumeric data. Automatic integration and visualization of detected events => more speed in information flow, higher reliability. Integrated, comprehensive as well as detailed view of all danger situations => more transparency. Operation management staff focuses on common operational picture => more quality, more efficiency. 11

Innovations by INDECT State-of-the-Art Different system usage and user interfaces for each single system. Detection of situations and behaviours requiring special attention from services responsible for maintenance of public security. Video sequences and acoustic signals can be stored in multimedia database with advanced searching methods. Watermarking quality influence evaluated using simple methods based on PSNR evaluation. Innovation by INDECT One user interface => ease of use, less operating errors. Extraction of distinctive features of sound and visual images for recognition and automatic understanding of abnormal situations. Effective access to information on demand, supported by technologies supplying appropriate information. Fully Human Visual System that will ensure controlled degradation of Quality of Experience (QoE). 12

Ethical issues in INDECT research Ethical Standards Obligation to get an informed consent regarding participation in the research especially related to security purposes Review of each Deliverable with respect to ethical issues Avoid to collect sensitive personal data 13

The main factors in order to fulfil all requirements of INDECT Strong teams In INDECTthe best teams of each partner are involved. Strong and friendly cooperation between the partners. Understanding between the cooperating partners the properly matched tasks. Integration of efforts.

THANK YOU FOR YOUR ATTENTION!