Learning to Adapt

Video analytics plays a key role in revolutionizing physical security

A new type of video surveillance technology called adaptive learning video analytics is revolutionizing physical security with its ability to analyze input from hundreds or even thousands of security cameras and provide alerts to potential threats as they occur. Conventional video surveillance systems are often ineffective, since they rely on people to monitor all the cameras’ output, which is a virtual impossibility. Some solutions use rules-based algorithms to analyze video output and detect one specific behavior—but human behavior is too various for this approach to be effective. And neither approach provides alerts in real time.

Adaptive learning video analytics takes a different approach by analyzing the output of video cameras in real time to detect—and alert on—abnormal behavior. Because this technology is computerbased, it brings physical security into the realm of IT like never before. In fact, IT will play an important role in implementing and managing this next generation of video surveillance systems and thus will need to learn about these systems and how they work.

Intelligent Technology
The basic concept of this new technology relates to other, wellunderstood technologies that IT departments already use, such as software-based performance management and network security products that employ pattern recognition. These products analyze a system’s performance over time to learn normal patterns of activity and recognize activity patterns that are abnormal, without human input. They also send alarms that alert users to any detected abnormal activity.

A system’s performance management product might learn, for example, that there is normally a spike of e-mail activity at 8 a.m., as people start their day’s work, but that a spike of email activity at 4 a.m. is not normal. This abnormal activity, which could represent an attack by a worm or virus, will trigger an alert.

The Core of Surveillance Technology
Adaptive learning video analytics uses similar principles. However, it has extra layers of complexity because its roots are not only in intelligent pattern recognition but also in observations made by video analytic algorithms. Video surveillance systems are designed to minimize threats from people, but people’s behavior is unpredictable. It is impossible to write a set of rules that can be expected to cover the full range of possible behaviors for any given environment. Instead, the system must be able to learn what is normal and what isn’t.

In essence, adaptive learning video analytics follows the human cognitive model for processing visual inputs into knowledge and requires a combination of computer vision, video analytics and machine-learning capabilities. The technology takes the input from existing video security cameras— the eyes of the system—recognizes and identifies the objects in each frame to learn what activity normally takes place within the area under surveillance; analyzes the changes, activities and motions of those objects; and builds a model of established behaviors.

Finally, adaptive learning video analytics provides a wide range of alert systems that can raise awareness and report abnormal or high-risk behaviors. This is possible because the system can compare current behaviors to patterns it has learned through observation. All these activities take place automatically, without the need of constant human involvement to create rules and update settings whenever a camera is deployed to a new location.

Unlike programmed rules-based solutions, adaptive learning video analytics can continuously improve on its accuracy and utility by adapting to changes in the observed environment, thereby also improving the value of the technology. This constant self-calibration and self-improvement enables the technology to continuously provide accurate analysis of potentially threatening behaviors.

Physical, IT Security Strategies
Adaptive learning video analytics accelerates the convergence of strategies for physical security and IT security. The technology is computationally intensive and thus has hardware and networking requirements that fall into the domain of IT.

Computing environment. The new adaptive learning video analytics technology is run on a series of servers that need to be deployed in a data center environment, complete with appropriate power and cooling requirements. These systems also must maximize CPU and memory utilization, and they are best suited to running on lean operating systems such as Linux.

Protocols. When evaluating video surveillance systems, it is important to remember that many employ proprietary protocols to perform functions such as moving video streams and are therefore often not compatible with existing IT infrastructure. Adaptive learning video analytics embraces open standards, employing the real-time streaming protocol for communication of video data and other standard protocols such as lightweight directory access protocol, which makes it much easier for IT to add the infrastructure required to support video surveillance.

Use of other Web service protocols such as extensible markup language and simple object access protocol also means the technology can integrate with existing IT networks to correlate all types of security alerts.

Integration with IT. Because video is bandwidth intensive, IT must be able to provide sufficient bandwidth between the servers handling adaptive learning video analytics and other enterprise servers. It also is important to adhere to industry standards regarding data compatibility and to be up-to-date on how they are evolving. Video compression standards have improved greatly in recent years, so it is always best to insist upon modern video compression encodings such as MPEG-4, H.263 and H.264. These protocols will save significant bandwidth when building a large deployment of cameras integrated with adaptive learning video analytics.

Architecture. An effective video analytics system must be able to communicate and interoperate with business logic and data, so it is important to employ a Web services platform architecture.

As more physical security solutions continue to incorporate intelligent software to augment the capabilities of their operations, it will become natural for these solutions to migrate under the domain of IT. In addition, as physical security continues to evolve from “guns, gates and guards” to using a wide variety of intelligent technologies, it also will eventually be migrated into and managed as an additional component of an organization’s overall corporate IT security model.

The sooner IT begins learning about how these technologies integrate into its domain, the sooner these technologies can be leveraged to benefit the enterprise as a whole.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3