DocumentCode :
559366
Title :
Security infrastructure for commercial and military ports
Author :
Faulkner, Lynn L. ; Kritzstein, Brian P. ; Zimmerman, James J.
Author_Institution :
Battelle Memorial Inst., Columbus, OH, USA
fYear :
2011
fDate :
19-22 Sept. 2011
Firstpage :
1
Lastpage :
6
Abstract :
Battelle has been developing robust detection and scanning technologies that integrate with existing and future port security systems as part of overall integrated security networks that can be tailored to meet individual requirements for commercial ports or Navy facilities. Major challenges include the water side issues such as geography, bathymetry, channel dimensions, changing bottom topology, environmental conditions, operation under all conditions and sea states suitable for vessel and small craft operation, harbor arrangement, and port-specific unique threats. However, many port security systems develop and implement new sensor technologies rather than assess the overall security need-that is, they follow a technology push rather than a market pull approach. While stated security approaches may integrate sensor data, stored data, intelligence databases, and human observations in various forms and formats, they generally do not provide the port-specific vulnerability and threat information required to alert security personnel with an integrated, composite threat analysis. Most approaches depend upon real-time person-in-the-loop detection strategies that can falter when faced with real world constraints: limited personnel resources, human fatigue and error, distractions, and misinterpretation of anomalies. Statistical and probabilistic analyses for anomaly identification are necessary to provide viable potential threat solution sets. Starlight™, a Battelle developed software tool, combines information from multiple sources and multiple formats into a single information management and analysis composite to identify anomalies and threats. The system rapidly integrates text, network, geospatial, and temporal data, and then processes the disparate information to provide one cohesive threat solution to alert security staff. This synergistic approach enables multiple data base and information formats to be addressed holistically instead of through stovepipes,- giving the ability to uncover a threat pattern within the otherwise overwhelming amount of information. Starlight™ differs from traditional systems by incorporating a range of processing algorithms to analyze individual information streams and form a composite threat solution. Current applications include intelligence gathering, network intrusion, entity extraction, law enforcement, visual intelligence (VISINT) processing, and threat anticipation. The overall strategy is the identification of appropriate sensors for integration into multiple real time data sets that combine sensor data with stored data, intelligence information, and human observations in various forms and formats. Individual data bases and sensor streams are processed with algorithms appropriate for their content and format. Data fusion, processing, statistical and probabilistic criterion provide synergistic solution sets that are ranked to identify threats and to select appropriate responses ranging from nonlethal deterrents to disabling force. Implementation strategies assimilate data and information necessary to process and identify risks compatible with and supportive of security personnel functions. Critical implementation requirements for adding or expanding port security systems include minimal impact to vessel traffic, minimal real-time human monitoring; minimizing false positives and false negatives; calibration; and flexibility to be adapted, expanded, and integrated for port-specific needs. In-water installation issues include secure anchoring and safety, bio-fouling protection, corrosion protection, reliability, availability, ease of maintenance, and life cycle costs. Implementation is accommodated by a spiral building block approach.
Keywords :
military computing; security of data; sensor fusion; statistical analysis; Battelle; Starlight software tool; commercial port; data fusion; detection technology; geospatial data; market pull approach; military port; navy facilities; network data; person-in-the-loop detection strategy; port security system; probabilistic analysis; scanning technology; security infrastructure; security network; statistical analysis; technology push approach; temporal data; text data; threat analysis; Data visualization; Databases; Humans; Information systems; Personnel; Security; Visualization; Data Synthesis; Database Composites; Port Security; Visual Analytics;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
OCEANS 2011
Conference_Location :
Waikoloa, HI
Print_ISBN :
978-1-4577-1427-6
Type :
conf
Filename :
6107174
Link To Document :
بازگشت