Using burst detection techniques to identify suspicious vehicular traffic at border crossings

Siddharth Kaza, Hsin Min Lu, Dajun Zeng, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Border safety is a critical part of national and international security. The Department of Homeland Security (DHS) searches vehicles entering the country at land borders for drugs and other contraband. However, this process is time-consuming and operational efficiency is needed for smooth operations at the border. To aid in the screening of vehicles, we propose to examine traffic patterns at checkpoints using burst detection algorithms. Our results show that the overall traffic at the border shows bursting patterns attributable to week days and the holiday seasons. In addition, using local law-enforcement data we also find that traffic with prior contacts with law-enforcement shows a bursting pattern distinct from other traffic. We also find that such bursts in suspicious traffic can be attributable to increases in vehicular traffic associated with certain kinds of criminal activity. This information can be used to specifically target vehicles searches during primary screening at ports and in the surrounding areas.

Original languageEnglish (US)
Title of host publicationISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities
Pages212-214
Number of pages3
DOIs
StatePublished - 2012
Event2012 10th IEEE International Conference on Intelligence and Security Informatics, ISI 2012 - Washington, DC, United States
Duration: Jun 11 2012Jun 14 2012

Other

Other2012 10th IEEE International Conference on Intelligence and Security Informatics, ISI 2012
CountryUnited States
CityWashington, DC
Period6/11/126/14/12

Fingerprint

Law enforcement
Screening
National security

Keywords

  • border crime
  • border crossing traffic
  • burst detection
  • primary screening

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems

Cite this

Kaza, S., Lu, H. M., Zeng, D., & Chen, H. (2012). Using burst detection techniques to identify suspicious vehicular traffic at border crossings. In ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities (pp. 212-214). [6284311] https://doi.org/10.1109/ISI.2012.6284311

Using burst detection techniques to identify suspicious vehicular traffic at border crossings. / Kaza, Siddharth; Lu, Hsin Min; Zeng, Dajun; Chen, Hsinchun.

ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. 2012. p. 212-214 6284311.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kaza, S, Lu, HM, Zeng, D & Chen, H 2012, Using burst detection techniques to identify suspicious vehicular traffic at border crossings. in ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities., 6284311, pp. 212-214, 2012 10th IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, United States, 6/11/12. https://doi.org/10.1109/ISI.2012.6284311
Kaza S, Lu HM, Zeng D, Chen H. Using burst detection techniques to identify suspicious vehicular traffic at border crossings. In ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. 2012. p. 212-214. 6284311 https://doi.org/10.1109/ISI.2012.6284311
Kaza, Siddharth ; Lu, Hsin Min ; Zeng, Dajun ; Chen, Hsinchun. / Using burst detection techniques to identify suspicious vehicular traffic at border crossings. ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. 2012. pp. 212-214
@inproceedings{e68fd06c982d41848ea0a17b07845aec,
title = "Using burst detection techniques to identify suspicious vehicular traffic at border crossings",
abstract = "Border safety is a critical part of national and international security. The Department of Homeland Security (DHS) searches vehicles entering the country at land borders for drugs and other contraband. However, this process is time-consuming and operational efficiency is needed for smooth operations at the border. To aid in the screening of vehicles, we propose to examine traffic patterns at checkpoints using burst detection algorithms. Our results show that the overall traffic at the border shows bursting patterns attributable to week days and the holiday seasons. In addition, using local law-enforcement data we also find that traffic with prior contacts with law-enforcement shows a bursting pattern distinct from other traffic. We also find that such bursts in suspicious traffic can be attributable to increases in vehicular traffic associated with certain kinds of criminal activity. This information can be used to specifically target vehicles searches during primary screening at ports and in the surrounding areas.",
keywords = "border crime, border crossing traffic, burst detection, primary screening",
author = "Siddharth Kaza and Lu, {Hsin Min} and Dajun Zeng and Hsinchun Chen",
year = "2012",
doi = "10.1109/ISI.2012.6284311",
language = "English (US)",
isbn = "9781467321037",
pages = "212--214",
booktitle = "ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities",

}

TY - GEN

T1 - Using burst detection techniques to identify suspicious vehicular traffic at border crossings

AU - Kaza, Siddharth

AU - Lu, Hsin Min

AU - Zeng, Dajun

AU - Chen, Hsinchun

PY - 2012

Y1 - 2012

N2 - Border safety is a critical part of national and international security. The Department of Homeland Security (DHS) searches vehicles entering the country at land borders for drugs and other contraband. However, this process is time-consuming and operational efficiency is needed for smooth operations at the border. To aid in the screening of vehicles, we propose to examine traffic patterns at checkpoints using burst detection algorithms. Our results show that the overall traffic at the border shows bursting patterns attributable to week days and the holiday seasons. In addition, using local law-enforcement data we also find that traffic with prior contacts with law-enforcement shows a bursting pattern distinct from other traffic. We also find that such bursts in suspicious traffic can be attributable to increases in vehicular traffic associated with certain kinds of criminal activity. This information can be used to specifically target vehicles searches during primary screening at ports and in the surrounding areas.

AB - Border safety is a critical part of national and international security. The Department of Homeland Security (DHS) searches vehicles entering the country at land borders for drugs and other contraband. However, this process is time-consuming and operational efficiency is needed for smooth operations at the border. To aid in the screening of vehicles, we propose to examine traffic patterns at checkpoints using burst detection algorithms. Our results show that the overall traffic at the border shows bursting patterns attributable to week days and the holiday seasons. In addition, using local law-enforcement data we also find that traffic with prior contacts with law-enforcement shows a bursting pattern distinct from other traffic. We also find that such bursts in suspicious traffic can be attributable to increases in vehicular traffic associated with certain kinds of criminal activity. This information can be used to specifically target vehicles searches during primary screening at ports and in the surrounding areas.

KW - border crime

KW - border crossing traffic

KW - burst detection

KW - primary screening

UR - http://www.scopus.com/inward/record.url?scp=84867365367&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84867365367&partnerID=8YFLogxK

U2 - 10.1109/ISI.2012.6284311

DO - 10.1109/ISI.2012.6284311

M3 - Conference contribution

SN - 9781467321037

SP - 212

EP - 214

BT - ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities

ER -