Leveraging physical access logs to identify tailgating: Limitations and solutions

Carmen Cheh, Uttam Thakore, Binbin Chen, William G. Temple, William H. Sanders

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Critical infrastructure facilities use physical access systems to control movement in their facilities. However, the cyber logs collected from such systems are not representative of all human movement in real life, including 'tailgating', which is an important problem because it potentially allows unauthorized physical access to critical equipment. In this paper, we identify physical constraints on human movement and use those constraints to motivate several approaches for inferring tailgating from card tap logs. In particular, using our approach, we found 3,999 instances of tailgating in a railway station during a 17-month period. However, certain movement scenarios are not visible in card tap logs. We overcome that limitation by leveraging additional physical data sources to provide information regarding the physical presence of people within a space. We support our findings with an observation experiment that we conducted in a railway station.

Original languageEnglish (US)
Title of host publicationProceedings - 2019 15th European Dependable Computing Conference, EDCC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages127-132
Number of pages6
ISBN (Electronic)9781728139296
DOIs
StatePublished - Sep 2019
Event15th European Dependable Computing Conference, EDCC 2019 - Naples, Italy
Duration: Sep 17 2019Sep 20 2019

Publication series

NameProceedings - 2019 15th European Dependable Computing Conference, EDCC 2019

Conference

Conference15th European Dependable Computing Conference, EDCC 2019
CountryItaly
CityNaples
Period9/17/199/20/19

Fingerprint

Critical infrastructures
taps
cards
Railway
stations
Critical Infrastructure
Experiments
Scenarios
Movement
Experiment
Human
Life
Observation

Keywords

  • Cyber-physical system
  • Human movement
  • Indoor location
  • Physical access system
  • Tailgating

ASJC Scopus subject areas

  • Computer Science Applications
  • Energy Engineering and Power Technology
  • Safety, Risk, Reliability and Quality
  • Control and Optimization
  • Instrumentation
  • Computer Networks and Communications
  • Artificial Intelligence

Cite this

Cheh, C., Thakore, U., Chen, B., Temple, W. G., & Sanders, W. H. (2019). Leveraging physical access logs to identify tailgating: Limitations and solutions. In Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019 (pp. 127-132). [8893375] (Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/EDCC.2019.00032

Leveraging physical access logs to identify tailgating : Limitations and solutions. / Cheh, Carmen; Thakore, Uttam; Chen, Binbin; Temple, William G.; Sanders, William H.

Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019. Institute of Electrical and Electronics Engineers Inc., 2019. p. 127-132 8893375 (Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cheh, C, Thakore, U, Chen, B, Temple, WG & Sanders, WH 2019, Leveraging physical access logs to identify tailgating: Limitations and solutions. in Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019., 8893375, Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019, Institute of Electrical and Electronics Engineers Inc., pp. 127-132, 15th European Dependable Computing Conference, EDCC 2019, Naples, Italy, 9/17/19. https://doi.org/10.1109/EDCC.2019.00032
Cheh C, Thakore U, Chen B, Temple WG, Sanders WH. Leveraging physical access logs to identify tailgating: Limitations and solutions. In Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019. Institute of Electrical and Electronics Engineers Inc. 2019. p. 127-132. 8893375. (Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019). https://doi.org/10.1109/EDCC.2019.00032
Cheh, Carmen ; Thakore, Uttam ; Chen, Binbin ; Temple, William G. ; Sanders, William H. / Leveraging physical access logs to identify tailgating : Limitations and solutions. Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 127-132 (Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019).
@inproceedings{3b4289b0a8524aa388fb4c2f66b5b4ad,
title = "Leveraging physical access logs to identify tailgating: Limitations and solutions",
abstract = "Critical infrastructure facilities use physical access systems to control movement in their facilities. However, the cyber logs collected from such systems are not representative of all human movement in real life, including 'tailgating', which is an important problem because it potentially allows unauthorized physical access to critical equipment. In this paper, we identify physical constraints on human movement and use those constraints to motivate several approaches for inferring tailgating from card tap logs. In particular, using our approach, we found 3,999 instances of tailgating in a railway station during a 17-month period. However, certain movement scenarios are not visible in card tap logs. We overcome that limitation by leveraging additional physical data sources to provide information regarding the physical presence of people within a space. We support our findings with an observation experiment that we conducted in a railway station.",
keywords = "Cyber-physical system, Human movement, Indoor location, Physical access system, Tailgating",
author = "Carmen Cheh and Uttam Thakore and Binbin Chen and Temple, {William G.} and Sanders, {William H.}",
year = "2019",
month = "9",
doi = "10.1109/EDCC.2019.00032",
language = "English (US)",
series = "Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "127--132",
booktitle = "Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019",
address = "United States",

}

TY - GEN

T1 - Leveraging physical access logs to identify tailgating

T2 - Limitations and solutions

AU - Cheh, Carmen

AU - Thakore, Uttam

AU - Chen, Binbin

AU - Temple, William G.

AU - Sanders, William H.

PY - 2019/9

Y1 - 2019/9

N2 - Critical infrastructure facilities use physical access systems to control movement in their facilities. However, the cyber logs collected from such systems are not representative of all human movement in real life, including 'tailgating', which is an important problem because it potentially allows unauthorized physical access to critical equipment. In this paper, we identify physical constraints on human movement and use those constraints to motivate several approaches for inferring tailgating from card tap logs. In particular, using our approach, we found 3,999 instances of tailgating in a railway station during a 17-month period. However, certain movement scenarios are not visible in card tap logs. We overcome that limitation by leveraging additional physical data sources to provide information regarding the physical presence of people within a space. We support our findings with an observation experiment that we conducted in a railway station.

AB - Critical infrastructure facilities use physical access systems to control movement in their facilities. However, the cyber logs collected from such systems are not representative of all human movement in real life, including 'tailgating', which is an important problem because it potentially allows unauthorized physical access to critical equipment. In this paper, we identify physical constraints on human movement and use those constraints to motivate several approaches for inferring tailgating from card tap logs. In particular, using our approach, we found 3,999 instances of tailgating in a railway station during a 17-month period. However, certain movement scenarios are not visible in card tap logs. We overcome that limitation by leveraging additional physical data sources to provide information regarding the physical presence of people within a space. We support our findings with an observation experiment that we conducted in a railway station.

KW - Cyber-physical system

KW - Human movement

KW - Indoor location

KW - Physical access system

KW - Tailgating

UR - http://www.scopus.com/inward/record.url?scp=85075636405&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85075636405&partnerID=8YFLogxK

U2 - 10.1109/EDCC.2019.00032

DO - 10.1109/EDCC.2019.00032

M3 - Conference contribution

AN - SCOPUS:85075636405

T3 - Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019

SP - 127

EP - 132

BT - Proceedings - 2019 15th European Dependable Computing Conference, EDCC 2019

PB - Institute of Electrical and Electronics Engineers Inc.

ER -