Academia.eduAcademia.edu

Security Monitoring System

description16 papers
group1 follower
lightbulbAbout this topic
A Security Monitoring System is an integrated framework designed to detect, assess, and respond to security threats in real-time. It utilizes various technologies, including surveillance cameras, sensors, and software analytics, to ensure the safety and integrity of physical and digital environments.
lightbulbAbout this topic
A Security Monitoring System is an integrated framework designed to detect, assess, and respond to security threats in real-time. It utilizes various technologies, including surveillance cameras, sensors, and software analytics, to ensure the safety and integrity of physical and digital environments.

Key research themes

1. How can low-cost IoT and embedded systems be designed to enable real-time intruder detection and notification in security monitoring?

This research area investigates the development and implementation of affordable, IoT-enabled security systems utilizing embedded platforms like Raspberry Pi and Arduino. The focus is on combining motion detection sensors, cameras, and wireless communication modules to capture intruder evidence and notify users in real time. These systems aim to provide scalable, accessible solutions for home, office, and small business security with minimal human intervention and low deployment costs.

Key finding: This study implemented a cost-effective IoT-based smart surveillance system using a Raspberry Pi, PIR motion sensor, and Pi Camera. The system automatically captures images of intruders and sends email notifications via Wi-Fi... Read more
Key finding: The paper developed a real-time security system based on Raspberry Pi integrating webcam, PIR sensor, and RFID tags for multi-level security. On detection of motion or unauthorized access attempts, the system streams live... Read more
Key finding: This work designed a wireless security camera system using Raspberry Pi and motion sensors aimed at vehicle theft prevention. The self-powered wireless camera network enabled live video capture and network transmission of... Read more
Key finding: The study designed a Bluetooth mesh sensor-based security network employing Arduino Nano, PIR sensors, and motorized cameras for commercial building protection. By activating cameras only upon human detection via sensors, the... Read more
Key finding: Proposed a security monitoring framework integrating Raspberry Pi with multiple sensors including RFID, PIR, MQ2 gas sensor and magnetic door sensor tailored for production floor environments. The system enables remote... Read more

2. What metrics and multi-agent frameworks enable near real-time assessment and visualization of security assurance in complex networked systems?

Research under this theme focuses on developing frameworks and models for evaluating, quantifying, and visualizing security assurance levels of large-scale IT and networked systems. These approaches often employ attack graphs, multi-agent systems, and anomaly detection techniques to represent both static vulnerabilities and dynamic behaviors. The outcome is improved near real-time situational awareness to guide stakeholders in understanding evolving security risks and allocating defensive resources accordingly.

Key finding: Introduced a multi-agent system leveraging attack graphs to compute an attackability metric that reflects the likelihood of successful attacks on network components. The framework integrates both static assessments from... Read more
Key finding: Presented a distributed algorithm that partitions event data across multiple hosts to maintain confidentiality in policy-based security monitoring systems. By distributing resources and rewriting Datalog policy rules into... Read more
Key finding: Developed a comprehensive security monitoring and alerting framework for containerized infrastructure, analyzing existing tools to identify gaps. By consolidating multi-source data and enhancing visibility into Kubernetes... Read more
Key finding: Reviewed a broad spectrum of network security monitoring tools and categorized them into packet capture, deep packet inspection, and flow-based monitoring approaches. The survey highlighted strengths and limitations of each... Read more
Key finding: Proposed an integrated computer platform unifying monitoring, diagnosing, error detection, alarm management, and intrusion detection across heterogeneous networked systems. Utilizing open-source components and multi-channel... Read more

3. How can automated security monitoring be integrated into software development lifecycles and distributed systems for enhanced vulnerability detection and code security?

This theme explores the incorporation of security monitoring mechanisms directly into software development processes and distributed architectures. It emphasizes the use of static analysis, vulnerability prediction models, security assessment metrics, and automated surveillance to preemptively detect software vulnerabilities and anomalies. The goal is to establish security by design, facilitating secure coding practices, and enabling continuous security validation in cloud, microservices, and containerized environments.

Key finding: Demonstrated the integration of advanced security assessment and vulnerability prediction tools in the software development lifecycle of an industrial partner. The VM4SEC platform aggregated static analysis results into... Read more
Key finding: Introduced an interactive security monitoring system combining passive infrared motion detection with community-based intruder image sharing. The system leverages smartphone and web platforms for real-time alerting and... Read more
Key finding: Implemented a scalable security system for network monitoring within a banking environment, incorporating intrusion detection systems, firewalls, network scanners, and machine learning algorithms for anomaly detection. The... Read more
Key finding: Developed software supporting hardware-based security alarm systems using microcontrollers (Atmel 8051) integrated with GSM communication and sensor inputs. The system allowed remote control and management, including alarm... Read more
Key finding: Presented an electromechanical and data communication security monitoring system for bulk food transport containers, incorporating locking mechanisms, geographic location tracking, and real-time data communication with remote... Read more

All papers in Security Monitoring System

Air pollution is conducted to harmful substances like solid particles, gases or liquid droplets. More pollutants CO, SO2, NOx, CO2.This research is proposed the design and implementation of mobile, low cost and accurate air pollution... more
In today's cloud-native landscape, Azure Kubernetes Service (AKS) stands out as a robust, fully managed Kubernetes offering by Microsoft. It simplifies the deployment, scaling, and management of containerized applications. However, as... more
In modern distributed systems, ensuring the health and performance of Point of Sale (POS) applications is crucial for businesses. This paper presents the use of Open Telemetry for collecting metrics from POS applications running on Linux... more
Monitoring systems observe important information that could be a valuable resource to malicious users: attackers can use the knowledge of topology information, application logs, or configuration data to target attacks and make them hard... more
Containerization, driven by Docker, has transformed application development and deployment by enhancing efficiency and scalability. However, the rapid adoption of container technologies introduces significant security challenges that... more
Creating sustainable microservices is a key task in modern distributed systems, especially in conditions of increasing complexity of applications and the need to ensure their high availability. Kubernetes and Istio play a crucial role in... more
Containerization, driven by Docker, has transformed application development and deployment by enhancing efficiency and scalability. However, the rapid adoption of container technologies introduces significant security challenges that... more
Models are specific units of work that have one job to perform: scoring new data to make predictions. Containers are self-contained workers that can be easily created, destroyed, and reused as needed. They are portable and easily... more
This paper presents "Cloudlab," a comprehensive, cloud-native laboratory designed to support network security research and training. Built on Google Cloud and adhering to GitOps methodologies, Cloudlab facilitates the creation, testing,... more
The study navigates the implication of Grafana in the sports segment, determining the responsibility in streamlining the real-time performance and gauging the effectiveness of the players through the data visualization models. Through the... more
This research aims to investigate the effectiveness of utilising the ELK (Elastic search, Logstash and Kibana) stack to monitor its adaptability in the sports industry. • To observe the effectiveness of the Elastic search, Log stash and... more
In today's dynamic IT environments, managing security vulnerabilities across large-scale infrastructures remains a critical challenge. Traditional patch management solutions often struggle to adapt to the complexities of hybrid... more
The recent shift to multi-cloud strategies presents new challenges to real estate engineering (SRE). As organizations use different cloud platforms, the complexity, reliability and speed of incident response times increase. This article... more
The recent adoption of cloud native technologies by telecommunication industry is accompanied by the incoming development of Network Functions that are containerized and packaged as light-weighted microservices. In order to efficiently... more
This paper presents a comprehensive approach to automating the monitoring and incident management of a technical system using Prometheus, Grafana, and Google Cloud Pub/Sub. The proposed solution enables efficient data collection,... more
Cloud Operations (CloudOps) Process Improvement is critical component in the successful adoption and management of cloud infrastructure. This paper examines the implementation of CloudOps process improvement strategies in the context of... more
The scalability of modern networking infrastructures, such as Kubernetes, has heightened the demand for everything-as-a-service concepts, including encryption services. This paper outlines the deployment of an Encryption as a Service... more
Container yığınlarının dağıtılması, ölçeklendirilmesi ve yönetimini otomatikleştirmek için oluşturulmuş open source container orkestrasyon aracıdır. Google tarafından, Go programlama dili kullanılarak yazılmıştır. İsmi Yunanca kökenlidir,... more
The rise of containerized environments, exemplified by Docker and Kubernetes, has revolutionized software deployment and orchestration, enabling agile development and efficient resource utilization. However, the adoption of these... more
Continuous Integration (CI) and Continuous Deployment (CD) are essential practices in modern software development, enhancing software delivery's efficiency, reliability, and quality. This paper explores the principles, benefits, and... more
Containerized applications have revolutionized software development by enabling consistent, scalable, and efficient deployment. However, the security of these applications is paramount to prevent vulnerabilities and breaches. This paper... more
In the time of big data and cloud computing, organizations now depend on data processing pipelines, having several things to process, turn, and analyze much data. Such pipelines require management from their development and deployment... more
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new... more
Elasticsearch is a popular open-source tool based on Apache Lucene, widely used for search, storing large amounts of data. It is being used in many small startups to large enterprises for Full-text search, log analytics, application... more
Container Orchestrator (CO) is a vital technology for managing clusters of containers, which may form a virtualized infrastructure for developing and operating software systems. Like any other software system, securing CO is critical, but... more
Container Orchestrator (CO) is a vital technology for managing clusters of containers, which may form a virtualized infrastructure for developing and operating software systems. Like any other software system, securing CO is critical, but... more
Container-based virtualization has gradually become a main solution in today's cloud computing environments. Detecting 6 and analyzing anomaly in containers present a major challenge for cloud vendors and users. This paper proposes an... more
The container-based cloud is used in various service infrastructures as it is lighter and more portable than a virtual machine (VM)-based infrastructure and is configurable in both bare-metal and VM environments. The Internet-of-Things... more
The container-based cloud is used in various service infrastructures as it is lighter and more portable than a virtual machine (VM)-based infrastructure and is configurable in both bare-metal and VM environments. The Internet-of-Things... more
We describe the deployment of an Internet measurement experiment to three testbeds that offer Linux containers hosted at widely distributed vantage points: the well-established PlanetLab Central and PlanetLab Europe platforms, and the new... more
The modernization of IT infrastructure in the banking sector has seen a significant shift towards cloud computing and containerization technologies, offering agility, scalability, and efficiency in application deployment. However, this... more
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily... more
The SLATE (Services Layer at the Edge) accelerates collaborative scientific computing through a secure container orchestration framework focused on the Science DMZ, enabling creation of advanced multi-institution platforms and novel... more
The globally distributed computing infrastructure required to cope with the multi-petabytes datasets produced by the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC) at CERN comprises several subsystems, such as... more
The EU Regulation No 910/2014 imposes to each EU Member State to notify its electronic identification scheme and to recognize the ones notified by the other Member States by 29 September 2018. In this process, Italy will notify SPID, an... more
In this paper we present a novel system for the tracing of the semicircle line during the play of a basketball game. One of the difficult decisions for a referee in such a game play is to establish if a player traced the semicircle line... more
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily... more
Virtualization technologies and secure cloud on-demand services escalate the need of cloud orchestration. Numerous Cloud Service Providers enhance the orchestration of cloud services based on well-configured projects. Several factors make... more
Wireless sensor networks (WSN) are an emerging multidisciplinary intersection of cutting-edge research fields, and their advantages in terms of freedom of formation, high signal-to-noise ratio, high strength, and unattended, which makes... more
With an increased level of automation provided by package managers, which sometimes allow updates to be installed automatically, malicious package updates are becoming a real threat in software ecosystems. To address this issue, we... more
The INFN-CNAF data centre hosts the Italian Tier 1 site for the Worldwide LHC Computing Grid (WLCG), while also serving several other research and technological transfer programs. The challenges posed by the upcoming runs of LHC, together... more
This capstone evaluates the capabilities and potential usefulness of a Security Information and Event Management (SIEM) system in the detection of malicious network activities. The emphasis of this project was to select and configure a... more
With an increased level of automation provided by package managers, which sometimes allow updates to be installed automatically, malicious package updates are becoming a real threat in software ecosystems. To address this issue, we... more
This paper presents an Investigative Framework for Security Monitoring Systems for Production Lines at IR 4.0. The framework consists of Raspberry Pi 3 as the main IoT processing module, four sensor there are RFID sensors, PIR Sensor, MQ2... more
Along with the increasing use of warehouse in manufacturing activities, a system that can provide information about the warehouse is needed. This information is used as a reference in determining the condition and level of security that... more
The INFN-CNAF data centre hosts the Italian Tier 1 site for the Worldwide LHC Computing Grid (WLCG), while also serving several other research and technological transfer programs. The challenges posed by the upcoming runs of LHC, together... more
Different kinds of sensors compose a meteorological observation system that measures meteorological variables. Sensors can collect data for a long period of time in a high sampling frequency. Some meteorological parameters can be... more
With the advancements in enterprise-level business development, the demand for new applications and services is overwhelming.For the development and delivery of such applications and services, enterprise businesses rely on Application... more
Download research papers for free!