Sie sind auf Seite 1von 5

|| Volume 1 ||Issue 6 ||Sept 2016||ISSN (Online) 2456-0774

INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH


AND ENGINEERING TRENDS

Home Security using Intrusion Detection System


Sachin Ashok Shinde1, Nitin Roy2
Asst.Prof, Computer Science & Engineering ,Hi-Tech Polytechnic College , Aurangabad, Maharashtra, India.

Abstract In 2001, there were 383,500 home fires in the communication system. The same system also can be used as
United States, resulting in 3,110 deaths, 15,200 injuries, fire detector and this information also can be transmitted
and $5.5 billion in direct property damage 1. Also, there through the same communication system to the nearest fire
are an estimated 2,329,950 annual burglaries, with an station. Another feature is also implemented in this system,
annual loss by victims of approximately $3.1 billion 2 . such that in case of any emergency , means if any violence
Homes without security systems are 2.7 times more likely created by the anti-social elements or the robbers are trying to
to be targeted by a burglar and 60% of residential attack the family members, at that time the owner of the house
burglaries occur during the daylight. The Home Security can be informed this information to the nearest police station
System, HSS, is intended to provide a full security for using the same communication system. . Therefore with these
houses when house owners are either home or away. We important features, the system is called as multipurpose security
developed a system that monitors the house with sensors system. Since the system is designed with two receivers, it is
and informs the house owners and fire department when also called as multiple receivers security system.
it detects a fire with smoke sensor, house owners and Nowadays we have to give lot of importance for the
police department when it detects a thief with sensors. In security aspects. Once upon a time much importance is not
theft case the system records the current camera view to given to security of either a person or to a property. But as we
its database to help police to identify the thief or the see today lot of terrorism has grown up across the country,
thieves. dacoits are raising their hands towards the locked houses and
As a result, by adding a number of sensors, a need has a rise to develop security systems to protect the
number of cameras, and a mobile to a PC we turned it to properties. In order to check the un-authorized entry of persons
a low-priced full security system for homes and offices into isolated locked houses, the electronic security systems are
and we called it the Home Security System which is developed and have become one of the important fields in the
supported by some GSM properties like SMS. electronics. This kind of security system also can be used to
highly secured places where the unauthorized persons are
Keywords:- Home Security System, Intrusion, Sensor, Thief. strictly restricted.
In order to check the unauthorized entry of persons in
I INTRDUCTION highly restricted areas, especially at military zones. Many types
A brief introduction of the concept of Home of electronic systems are available in the market, such as, digital
Security System Using Intrusion Detection is followed by code locking system, Metal detectors, intruder alarms, touch
detailed discussion of design consideration and design detectors, fire alarms, closed circuit television systems, coded
verification. The description is prepared based on the cards and magnetic cards for identifying the persons, scanners,
Prototype Module developed for the demonstration purpose. burglar alarms, sound operated light switches, etc.; These type
This system will guard your home while you are of security systems are readily available in the Market, but the
away, and automatically transmit the theft information to the one which is mentioned in this report is designed using latest
home owner or can be to nearest security office. This type of techniques in the Market. This project work comes under
security systems is well suited for the isolated colonies at communication field.
city outskirts, since it is a multipurpose security system, it 1.1 Project Benefits:-
can be enhanced by implementing other features to meet the
latest trends in security systems. The present system can be Home security systems help to protect your home from
used in various organizations like Banks, Industries, Jeweler the risk of theft, fire and vandalism
shops, Temples, Godowns, Museum's and other vital After installation of security camera in home, you will
important places where the valuable material is stored. feel relaxation for security of your home and family.
The security system designed with infrared sensors In wireless home security system you increase your
for detecting the presence of a person who is inside the protection options and add a system that can easily be
locked house can transmit the information through wireless changed or added to meet your needs.
Another wonderful aspect of the wireless versions is
they are some of the most affordable home security
systems.

WWW.IJASRET.COM 141
|| Volume 1 ||Issue 6 ||Sept 2016||ISSN (Online) 2456-0774
INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH
AND ENGINEERING TRENDS
1.2 Project scope:- a. Project budget

Image matching and counting. b. Project time frame


As the security purpose we can implement one
button, when it get pressed it directly calls to c. Conceptual problem solution
nearest police and this is useful for elder people &
I. The following task are performed at this stage
handicapped people.
1.3 Project Goals:- d. The project feasibility is estimated

To implement the concept of java, oracle that we e. Risk and Benefits are identified
learnt during 4th and 5th semester and which are
useful. f. Project scope is defined
To learn new hardware concept and implement the
same. II. The project is roughly planned System Development
To try out something innovative and different than 1. Feasibility report- Description of the proposed solution
what is usually done. and list of high level functional requirement.
To test our technical as well as other capabilities to
2. Project structure - Description of the project
its maximum.
organization.
II LITERATURE SURVEY
3. Project plan Project schedule.
2.1 Survey Detail:-
Organizational Feasibility:-
Human race is advancing like never before. Every The organization is currently planning to provide
now and then something new is being invented. In this fast computer based high security. The proposed system tries to
developing era way of living is getting so sophisticated day support these goals since it generates the image of intrusion
by day. It has also given rise to threats to human safety. which can be viewed by user.
With the crime on a rise human security is one of the major Economical Feasibility:-
concern of the technocrats and we being one though of Economical Feasibility involves study of established the
developing a security system is not only to help prevent cost benefit analysis. Money spend on the system must be
unwanted intrusions. This project is supposed to add recovered in the form of benefit from the system. The proposed
completely new dimensions to home security making people system generates saving towards security guard expenses.
feel safer at home. We cant sleep safely in our home by System proposed to use the database system i.e. currently
employing few means or dogs merely because there could available with the organization. Hence no new investment has to
be lapses. be made towards software requirements.
There are various existing security system available
Technical Feasibility :-
in the market. Companies like Zicom, Bosch, and JMK etc. For any proposed system the technical description of the
provides systems for the home security. The existing hardware requirement makes an important contribution
security systems which are available are merely expensive. towards system development. The technical requirements of
Somewhere these systems are not affordable to common the new system are necessary the hardware and software. The
people, so we are trying to develop the home security
computer is ideally best because the images are generated as
system with low price. On the basis of that we developed a and when required which is actually the objectives of the
new home security system with the new feature. system.
1. A pc with processor pentiuum-4 or above.
2.2 Feasibility Study:-
2. A VGA desktop resolution in 800 x 600 pixels.
At this stage the clients business needs are
analyzed, information about project participants are 3. Minimum 50MB of drive space, 256MB RAM.
collected, and the requirement for the system are gathered
and analyzed. The client expectations for system 4. Any windows operating system.
implementation are studied and proposed solution is offered.
During the feasibility study stage, the projects goals, III SYSTEM DEVELOPMENT
parameter and restraints are agreed upon with the client
The majority of the Home security equipments are
including:-
used to involve security for homes and various shop. Home

WWW.IJASRET.COM 142
|| Volume 1 ||Issue 6 ||Sept 2016||ISSN (Online) 2456-0774
INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH
AND ENGINEERING TRENDS
security has been a major issue where crime is increasing 3.1Designing Database:-
and everybody wants to take the proper measures to prevent Looking at project it does not seem that it contains the
intrusion. Burglary is most often a crime of opportunity. A database. The project has large database. Database includes the
thief will usually look for the easiest target. It is typically no. of tables, attributes, relationship etc. It is not easy to create,
implemented as an overlay to an existing Wireless LAN delete, modify and maintain all tables every time as project
infrastructure. proceeds. One option is to design the data model (database
This system can be control using wireless RF schema) containing all tables, attribute & relationship. for the
interface. The user is able to receive the intrusion detection design of data model , the tool DB designer is used. Through
information remotely on his cell phone and handle the the synchronization option, data model is converted into
situation. We can monitor the condition in home or building database using MYSQL server instance.
through Internet, and receive a message of the detection
information to cellular phone. This project is useful for the Why to use DB-Designer?
people for secure his home or his shop from unauthorized
DB-Designer is a visual database system that integrates
persons. The structure of this project is very simple & it is
database design, modelling, creation and maintenance into a
easy to handle. We can use this project for our home as well
single, seamless environment. It combines professional features
as we can use this project for the shop, parking & offices.
and a clear and simple user interface to offer the most efficient
way to handle databases.

Features:
Design mode /query mode
User defined schema, generation
Index support
Automatic foreign key placement
Weak entity support
Standard inserts storing and sync
Full documentation capabilities
Advanced model printing
Output as image
All oracle data types with all options
User defined data types
SQL Query builder
SQL Command history
SQL Command storage within model
Why to use Oracle?

The main thrust of the new features and enhancements for


Oracle 10g are geared towards grid computing which is an
extension of the clustering features (Real Application Clusters)
introduced with Oracle 9i. The idea of Oracle 10g is that the
database will be able to dynamically "requisition" resources
from the grid to meet levels of peak demand. Other
enhancements for Oracle 10g are aimed at reducing costs and
improving the quality of service by making the database easier
to deploy and manage including enhancements to backup and
Figure 1 Proposed intrusion detection System.
recovery and data warehousing.
Above figure-1, shows the proposed working status for
1. Ease of Management
intrusion detection system. The web cam is used for
As with Oracle 9i, one of the major focuses of Oracle 10g
capturing the image when any intrusion enters in the home
is on reducing costs and increasing up-time by making the
and sensor is used for the ringing the alarm which is
database easier to manage. One way of doing this is to automate
connected with the sensor. The captured image is stored in
tasks that previously had to be done manually by the DBA. To
the database of the system. This is helpful for the
achieve this for Oracle 10g, a new Automated Storage
identification of the intrusion.
Management (ASM) sub-system has been introduced. This

WWW.IJASRET.COM 143
|| Volume 1 ||Issue 6 ||Sept 2016||ISSN (Online) 2456-0774
INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH
AND ENGINEERING TRENDS
feature removes the need to have a file system or a volume
manager for managing the database files and eliminates the
complexity of balancing data across disks and controllers (GUI) User Interface Testing
manually. Instead, the ASM stripes data across the disks
perform a series of tests that ensure the user interface of
automatically, thereby maximizing throughput and
your application compiles with your application specification in
minimizing the risk of data loss. The ASM also maintains
terms of display, organization and language. This includes
the data striping as disks are added/removed and re-balances
testing to ensure that the user interface is visually appealing,
the i/o load dynamically.
intuitive and effective. We have used various input to see the
2. Availability
proper output is coming or not as said.
Oracle 10g Real Application Clusters have been
enhanced to provide Automatic Service Provisioning - Conduct regular usability Testing
servers are automatically allocated to work loads and clients
are automatically assigned to the server with the least load. Usability testing is often conducted towards the end of a
Also on failure of a server, the surviving servers are redesign project. However, it is just as useful to undertake
automatically reallocated to work loads. usability testing throughout the life of a smart administrator.
3. Data Warehousing Ensure the smart administrator continues to align with business
Oracle 10g Data Warehousing enhancements include: strategies.
An increase in the size limits of the database to
support ultra-large databases of millions of 4.2 Test cases:
terabytes in size and ultra-large files of terabytes in
size. The 4GB restriction on LOBs has been raised 4.1 Table for Test Cases.
to 128 terabytes.
An improvement to Real Application Clusters Page/feature Action Result
(RAC) enable resources to be allocated
automatically and means that operational data can 1. Login form Click OK Displays main form
be used immediately without the need to copy it to
another database. 2.MDI form click Displays intrusion details
Enhancements to OLAP analytic, a data-mining intrusion
GUI and a new SQL model allow query results to
3.Intrusion form Click show Displays input form
be treated as sets of multi-dimensional arrays on
which complex inter-dependent operations - such
4.Input form Click ok Displays Image Panel
as forecasting - can be run without the need to
extract data to spreadsheets or perform complex 5.Intrusion form Click delete Display delete information
joins and unions on the data.
A new changed data capture facility based on 6.MDI form Click help Displays help
Oracle Streams provides low or zero latency trickle
feeds that combined with integrated extraction,
transformation and loading enable real-time Table 4.2 Creation of image table.
warehousing.
Column DataType Null Default Primary
IV PERFORMANCE ANALYSIS Name Key

4.1-Testing- The various test stages are

Drawing up the test strategy. IMGID NUMBER NO - 1

Definition of the test plan and specification of the IMAGE JPG NO - -


tests.
IDATE DATE NO - -
Implementation of the tests.

Support of the approval process.

WWW.IJASRET.COM 144
|| Volume 1 ||Issue 6 ||Sept 2016||ISSN (Online) 2456-0774
INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH
AND ENGINEERING TRENDS
This is main database table named image store transmit the theft information to the home owner or can be to
for storing and retrieving image from database. Image id nearest security office.
with date is stored.
Table 4.3 Data store in database about intrusion. V CONCLUSION
Project is made with an intension of studying the
IMGID IMAGE IDATE current technological progress in the security and automation
1 [datatype] 5-Sept-16 technology. The project we had started in the beginning has
2 [datatype] 6-Sept-16 now emerged as a efficient system for security purpose. In this
3 [datatype] 6-Sept-16 project we have smartly implemented maximum possible
functions necessary for the INTRUSION DETECTION
Table store the data in database about intrusion. SYSTEM which makes it secure, platform independent, easy to
use and having great functionality. Also available at a very
4.3 Hardware interface: cheap cost as compared to what the market offers.

1. Microcontroller (89C51). REFERENCES


2. Encoder (HT640). [1] Addison Wesley, The complete reference J2ME, 2nd
Edition.
3. Decoder (HT648).
[2] James R. Groff and Paul N. Weinberg, The complete
4. IC555 TIMER. reference MySQL.
[3] Textbook of Applied Electronics (R.S.SEDHA) [4] Web
5. Infrared Transmitter. Site http://www.eng123.com.
[5] Web Site www.Robotics.co.in.
6. Infrared receiver.
[6]Corinne Lawrence- IPS The Future of Intrusion
7. Radio frequency transmitter. Detection- University of Auckland - 26th October 2004.
[7] Karthikeyan .K.R and A. Indra- Intrusion Detection Tools
8. Radio frequency receiver. and Techniques a Survey
[8] Anita K. Jones and Robert S. Sielken Computer System
9. Registers. Intrusion Detection A Survey International Journal of
Computer Theory and Engineering,Vol.2, No.6, December,
10. Capacitors.
2010
11. Monitor [9] Vera Marinova-Boncheva-A Short Survey of Intrusion
Detection Systems-. Bulgarian academy of sciences.
12. Mouse [10] Carl Endorf, Eugene Schultz, Jim Mellander Intrusion
detection & prevention by Written published by McGraw-Hill.
13. Keyboard [11] Top 125 Network Security Tools- SecTools.Org-
http://sectools.org/tag/ids/sec.
14. Pen drive

4.4 Software interface:

1. Java media framework (Jmf):Jmf is a java library that


enables audio, video and other time-based media to be added
to java applications and applets. This can capture, play,
stream and transcode multiple media formats, extends java
platform, java SE and allows development of cross-platform
multimedia applications.

4.5 Communication interface:

In communication interface the home security


system will interact with administrator by sending the
message when any intrusion comes in home. This system
will guard your home while you are away, and automatically

WWW.IJASRET.COM 145

Das könnte Ihnen auch gefallen