464 – Software: R and Otherwise
Identification of Intruder Paths in Sensor Networks
James Gentle
George Mason University
James Shine
U.S. Army Topographic Engineering Center
Sensor networks are designed to discover as much information about anomalous activities (such as intrusion) as possible. Some important knowledge for such networks are normal sensor activity levels, sensor alarms (when sensors are activated more than normal), and patterns over multiple sensors. Our work focuses on methods for discovering possible paths that intruders might be taking based on a record of sensor activations. We use the distance and time between successive sensor activations. At any activation, the primary question is whether the activity is caused by a new intruder, or by one who has already activated an earlier sensor (or sensors). Our approach looks in both temporal directions to examine and weight all possible intruder paths. We are developing a tool that outputs possible paths given input from sensors of time and location. Initial results from the tool are presented.