Leveraging physical access logs to identify tailgating: Limitations and solutions

Carmen Cheh, Uttam Thakore, Binbin Chen, William G. Temple, William H. Sanders

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Critical infrastructure facilities use physical access systems to control movement in their facilities. However, the cyber logs collected from such systems are not representative of all human movement in real life, including 'tailgating', which is an important problem because it potentially allows unauthorized physical access to critical equipment. In this paper, we identify physical constraints on human movement and use those constraints to motivate several approaches for inferring tailgating from card tap logs. In particular, using our approach, we found 3,999 instances of tailgating in a railway station during a 17-month period. However, certain movement scenarios are not visible in card tap logs. We overcome that limitation by leveraging additional physical data sources to provide information regarding the physical presence of people within a space. We support our findings with an observation experiment that we conducted in a railway station.

Original languageEnglish (US)
Title of host publicationProceedings - 2019 15th European Dependable Computing Conference, EDCC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages127-132
Number of pages6
ISBN (Electronic)9781728139296
DOIs
StatePublished - Sep 2019
Event15th European Dependable Computing Conference, EDCC 2019 - Naples, Italy
Duration: Sep 17 2019Sep 20 2019

Publication series

NameProceedings - 2019 15th European Dependable Computing Conference, EDCC 2019

Conference

Conference15th European Dependable Computing Conference, EDCC 2019
CountryItaly
CityNaples
Period9/17/199/20/19

Keywords

  • Cyber-physical system
  • Human movement
  • Indoor location
  • Physical access system
  • Tailgating

ASJC Scopus subject areas

  • Computer Science Applications
  • Energy Engineering and Power Technology
  • Safety, Risk, Reliability and Quality
  • Control and Optimization
  • Instrumentation
  • Computer Networks and Communications
  • Artificial Intelligence

Fingerprint Dive into the research topics of 'Leveraging physical access logs to identify tailgating: Limitations and solutions'. Together they form a unique fingerprint.

  • Cite this

    Cheh, C., Thakore, U., Chen, B., Temple, W. G., & Sanders, W. H. (2019). Leveraging physical access logs to identify tailgating: Limitations and solutions. In Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019 (pp. 127-132). [8893375] (Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/EDCC.2019.00032