channels. At the third step these two data sets
combined in a table of suspicious 34 channel
candidates marked by both methods. The result of
DBSCAN algorithm is a cluster consisting of the
following channel numbers: 690, 668, and 667. The
Channel numbered 668, pinpoints the exact location
of a discovered tunnel at the border.
Figure 9: Tunnel found at Turkish Syria Border.
4 CONCLUSIONS
In this paper a data mining approach is presented to
detect tunnels under ground as a part of Smart Border
Security System (Svitek, Horak, Cheu and Ferregut,
2019). This method has three distinct phases. Time
Domain Data Analysis classifies acquired data
according to the most recent nightly activities. Spatial
Domain Data Analysis phase finds the active
channels according to their local statistics. And
finally, DBSCAN Algorithm is used to detect clusters
in the similar channels. The detection result with real
case and real data shows that data mining can help to
discover intrusion tunnels.
The major limitation in this work is both the lack
and difficulty to obtain real case data. Additionally,
using moving averages generates late results.
However, the border security system eventually will
accumulate tagged data for future usage, containing
the time domain and spatial domain analysis table.
This tagged data can be linked to a KNN based
machine learning algorithm as a future work (Amer
and Goldstein, 2012). There are new methods and
studies for intrusion detection. They could be
alternative to KNN (Ranjan and Sahoo, 2014 and
Yong, Guo-hong, Jia-xia 2010). Eventually, more
tagged data will allow the software to learn to detect
an intrusion by using a KNN algorithm according to
physical effort level needs to be done to make a tunnel
versus local geographical dynamics. This approach
also can be applied to other specific types of
intrusions such as identifying periodic smuggling
events, massive immigration events. On the other
hand, system can identify harmless events at border
such as agriculture activities. Those types of events
can be masked to reduce unnecessary false alarms.
Sensor fusion techniques will help to analyze other
type of sensor alarms such as motion detection alarms
generated by cameras, geophone seismic sensors, PIR
sensors, and radars. As a result, Smart Border
Security System Software nightly analyzes the latest
data and increase situational awareness by generating
high level alarms.
ACKNOWLEDGEMENTS
The author would like to thank the Turkish Army
Border Troops for the cooperation and support.
REFERENCES
Abbar, B., 2019. Optic Sensors for Environmental
Monitoring. SCITEPRESS.
Smith, J., 1998. The book, The publishing company.
London, 2
nd
edition.
Llopis J. L., Dunbar J. B., Wakeley D., Corcoran K., 2005.
Tunnel Detection Along the Southwest U.S. Border.
U.S. Army Engineer Research & Development Center.
Nibi, Menon, Amrita, Vidyapeetham, 2016. Underground
Tunnel Detection Across Border Areas. Center for
Wireless Networks and applications, India.
Duckworth, Owen, Worsley, Stephenson, 2013. OptaSense
distributed acoustic and seismic sensing performance
for multi-threat, multi-environment border monitoring.
OptaSense.
Arguedas, Mazzarella, Vespe, 2015. Spatio-temporal Data
Mining for Maritime Situational Awareness. European
Commission - Joint Research Centre (JRC).
Dorj, Altangerel, 2013. Anomaly Detection Approach using
Hidden Markov Model. MUST, CSMS/Computer
Science, Ulaanbaatar, Mongolia.
Chen, Li, 2011. Anomaly Detection Based on Enhanced
DBScan Algorithm.
Wang, Ren, Luo, Tian, 2019. NS-DBSCAN: A Density-
Based Clustering Algorithm in Network Space.
Nantomah, 2019. On Some Properties of Sigmoid Function.
Kumar, Kuttiannan, 2006. A Combined Standard Deviation
Based Data Clustering Algorithm. Government Arts
College.
Banerjee and Kumar, 2009, Anomaly Detection: A Survey.
Chandola V., Banerjee A., and Kumar V., 2009. Anomaly
Detection: A Survey, Journal of ACM Computing
Surveys.vol.41. no.3, article no.IS.