Interactive Visualization of Normal Behavioral Models and Expert Rules for Maritime Anomaly Detection

@article{Riveiro2009InteractiveVO,
  title={Interactive Visualization of Normal Behavioral Models and Expert Rules for Maritime Anomaly Detection},
  author={Maria Riveiro and G{\"o}ran Falkman},
  journal={2009 Sixth International Conference on Computer Graphics, Imaging and Visualization},
  year={2009},
  pages={459-466}
}
  • M. Riveiro, G. Falkman
  • Published 11 August 2009
  • Computer Science
  • 2009 Sixth International Conference on Computer Graphics, Imaging and Visualization
Maritime surveillance systems analyze vast amounts of heterogeneous sensor data from a large number of objects. In order to support the operator while monitoring such systems, the identification of anomalous vessels or situations that might need further investigation may reduce the operator's cognitive load. While it is worth acknowledging that many existing mining applications support identification of anomalous behavior, autonomous anomaly detection systems are rarely used in the real world… 

Figures and Tables from this paper

Contextual verification for false alarm reduction in maritime anomaly detection
TLDR
This paper proposes a novel anomalous vessel detection framework that utilizes such contextual information to reduce false alarms through "contextual verification" and evaluates the proposed framework using massive amount of real-life AIS data sets obtained from U.S. Coast Guard.
False alarm reduction in maritime anomaly detection with contextual verification
TLDR
This work proposes a novel anomalous vessel detection framework that utilizes such contextual information to reduce false alarms through “contextual verification” and evaluates the proposed framework using real-life AIS data sets obtained from U.S. Coast Guard.
Learning Maritime Traffic Rules Using Potential Fields
TLDR
This study focuses on identification and analysis of traffic rules discovered based on the computed traffic models, and demonstrates and compares results from three different areas, and corresponding traffic rules identified in course of the result analysis.
Evaluating the Usability of Visualizations of Normal Behavioral Models for Analytical Reasoning
  • M. Riveiro, G. Falkman
  • Computer Science
    2010 Seventh International Conference on Computer Graphics, Imaging and Visualization
  • 2010
TLDR
This paper presents geographical projections of the different probability density functions that represent the normal traffic behavior and outlines results from a usability assessment carried out in order to evaluate the ability of normal behavioral models of sea traffic to support representative tasks related to the establishment of normal situational picture.
A semi-supervised learning framework based on spatio-temporal semantic events for maritime anomaly detection and behavior analysis
TLDR
The goal of this research is to facilitate the integration of human knowledge by modeling it in the form of semantic rules to improve confidence and trust in the anomaly detection system.
Maritime anomaly detection: A review
TLDR
This study presents a review of the state‐of‐the‐art of research carried out for the analysis of maritime data for situational awareness, and outlines possible paths of investigation and challenges for maritime anomaly detection.
Open data for anomaly detection in maritime surveillance
Potential fields in maritime anomaly detection
TLDR
The results show that anomalous behaviours in maritime traffic can be detected using this method, with varying performance, necessitating further study.
Design and implementation of a maritime traffic modeling and anomaly detection method
TLDR
The research work summarized in this thesis explores an intuitive and comprehensible method for traffic modeling and anomaly detection in the maritime domain, using a web-based anomaly detection system STRAND (for Seafaring TRansport ANomaly Detection).
Data for Anomaly Detection in Maritime Surveillance Shahrooz
TLDR
Using open data as a complementary resource for detecting anomalous behavior in the MS domain is not only feasible but also will improve the efficiency of the surveillance systems by increasing the accuracy and covering some unseen aspects of maritime activities.
...
1
2
3
...

References

SHOWING 1-10 OF 49 REFERENCES
VISAD: an interactive and visual analytical tool for the detection of behavioral anomalies in maritime traffic data
TLDR
Using a visual analytics process model as a framework, VISAD is presented, an interactive, visual knowledge discovery tool for supporting the detection and identification of anomalous behavior in maritime traffic data and the detection procedure becomes transparent to the user, which increases his/her confidence and trust in the system and overall, in the whole discovery process.
Reasoning about anomalies: a study of the analytical process of detecting and identifying anomalous behavior in maritime traffic data
TLDR
The main focus of this work is to capture the entire analysis process that an analyst goes through, from the raw data to the detection and identification of anomalous behavior in maritime traffic data.
Improving maritime anomaly detection and situation awareness through interactive visualization
TLDR
A combined methodology of data visualization, interaction and mining techniques that allows filtering out anomalous vessels, by building a model over normal behavior from which the user can detect deviations.
Anomaly detection in the maritime domain
  • J. Roy
  • Computer Science
    SPIE Defense + Commercial Sensing
  • 2008
TLDR
The anomaly detection prototype is depicted, the knowledge acquisition and elicitation session conducted to capture the know-how of the experts, the formal knowledge representation enablers and the ontology required for aspects of the maritime domain that are relevant to anomaly detection, vessels of interest, and threat analysis, the prototype high-level design and implementation on the service-oriented architecture of the CKEF are described.
Conditional Anomaly Detection
TLDR
A general purpose method called conditional anomaly detection for taking differences among attributes into account, and three different expectation-maximization algorithms for learning the model that is used in conditional anomalies detection are proposed.
Automated anomaly detection processor
TLDR
Development of an Automated Anomaly Detection Processor (AADP) that exploits multi-INT, multi-sensor tracking and surveillance data to rapidly identify and characterize events and/or objects of military interest, without requiring operators to specify threat behaviors or templates is discussed.
Incremental stream clustering and anomaly detection
TLDR
The tool has a graphical user interface "the anomalo-meter" that shows the degree of anomaly of a pattern and how it is classified, which basically are Bayesian inference for finding expected or "predictive" distributions for clusters of patterns and using these distributions for classifying and assessing a degree of anomalies to a new pattern.
Visualisation of Anomaly Using Mixture Model
TLDR
This work proposes a new anomaly detection method that visualizes data in 2- or 3-dimensional space based on the probabilities of belonging to each mixture component and the probability of not belonging to any component and shows the validity of the method by using an artificial time series and an economic time series.
Anomaly detection for sea surveillance
  • Rikard Laxhammar
  • Computer Science
    2008 11th International Conference on Information Fusion
  • 2008
In this paper, unsupervised clustering of normal vessel traffic patterns is proposed and implemented, where patterns are represented as the momentary location, speed and course of tracked vessels.
Maritime situation monitoring and awareness using learning mechanisms
TLDR
This paper addresses maritime situation awareness by using cognitively inspired algorithms to learn behavioral patterns at a variety of conceptual, spatial, and temporal levels and combines two components: an unsupervised clustering algorithm, and a supervised mapping and labeling algorithm.
...
1
2
3
4
5
...