detector (Bonhomme et al., 2007). So the amount
and the type of the information used for analysis are
limited. Despite many efforts on tracking people in
a multi-camera environment, the problem of tracking
people inside a building by multi-camera is still chal-
lenging. So in a building context, techniques which
are built on trajectories classification [(Morris and
Trivedi, 2008b), (Morris and Trivedi, 2008a), (Bran-
dle et al., 2006)] need a good tracking capability of
the sensor system to perform well. Thus it can be
challenging to operate well in a real situation.
In this paper, we concentrate on using data of tra-
jectories of people inside a building and build a detec-
tion method based on this data. The data of trajecto-
ries come from a system of camera and card reader in-
tegrated into a building, and the data collecting steps
were done by a company within our project. A com-
bination of these sensors could give us a precise de-
scription of people’s activities. We propose a detec-
tion scheme based on key metrics that uses data from
various sensors, and that is adapted for building super-
vision. These metrics describe the behavior of people
in the controlled zone into specific periods of an entire
day. The detection process is separated into two parts,
offline training, and online detection. Thresholds for
key metrics at each period is calculated in the train-
ing process, and new observations of the camera are
analyzed and compared with thresholds in the online
detection process. This model has an advantage that it
does not require any prior knowledge about ordinary
events in the zone to set threshold. Instead, it learns
what constitutes regular activity from its observations
in a period, and the confidence intervals automatically
describe this knowledge.
The primary contribution of our work is that we
have integrated a statistical detection process into an
automatic security system in the context of building
and office. We define key metrics that can be used
to differentiate attackers from regular people and can
adapt to different contexts. The detection process can
be trained offline and detect abnormal events online.
The rest of the paper is organized as follows. In
session 2, we present the general idea of the proposed
method. Experimental contents about the detail of the
technique and the datasets are presented in section 3.
In session 4, experiment results are presented by us-
ing simulated data and real data, and we conclude our
work in section 5.
2 PROPOSED METHOD
2.1 General Description
The proposed detection process aims to apply for
vulnerable local areas in the building. We assume
that sensors are installed to capture people’s move-
ment in this zone and can provide data in the format
[ID, t, Pos], which describe the presence of a per-
son with identity ID at instant t in a position Pos in-
side the building. Then we define key metrics which
are characteristics of the zone and can be used to de-
tect an abnormal behavior. The detection process is a
method based on the statistics of the key metrics and
is parameterized with thresholds used for decision-
making. A training stage uses regular events to de-
termine the threshold values. In the operational stage,
the observed metrics are compared with the prede-
fined threshold to raise the alarm if some values ex-
ceed the thresholds.
2.2 Key Metrics And Time Windows
In this technique, we are interested in examining the
behavior of people in relation to their presence in a
critical area. Key metrics describe the duration or
the instant of presence at a place. Because a typi-
cal duration in the morning may become abnormal in
the evening, so we propose to define key metrics de-
pending on the considered moment. For this purpose,
the key metrics are attached to a time window. The
simplest way is to divide the day into multiple equal
parts with a chosen width which we call fixed win-
dow. However, some key metrics may be dependent
on the position of the window; it may be more suit-
able to use a sliding window, which is defined by its
width and shift, so that a day is a set of overlapped
windows. These two types of time window are pre-
sented with their parameters in Figure 1.
W1 W2 W3 W4 W5 W6
width
W1 W3
W4
W5
W6
W7
W2
width
Shift
Fixed window
Sliding window
Figure 1: Two types of time window.
For both time windows, there is a trade-off when
defining the parameter window’s width. If the width
is too large, a window may include key metrics with
Abnormal Events Detection for Infrastructure Security using Key Metrics
285