Online Behavioral Analysis and Modeling Methodology (OBAMM)
This paper introduces a novel method of tracking user computer behavior to create highly granular profiles of usage patterns. These profiles, then, are used to detect deviations in a users’ online behavior, detecting intrusions, malicious insiders, misallocation of resources, and out-of-band business processes. Successful detection of these behaviors significantly reduces the risk of leaking sensitive data, or inadvertently exposing critical assets.
KeywordsBusiness Process Recommender System User Profile Computer Security Business Process Modeling
Unable to display preview. Download preview PDF.
- 1.Brown B, Aaron M (2001) The politics of nature. In: Smith J (ed) The rise of modern genomics, 3rd edn. Wiley, New York.Google Scholar
- 2.Olmez A E (2006), Exploring the Culture-Performance Link in Heterogeneous Coalition Oganizations. PhD Thesis, George Mason University, Fairfax, VA.Google Scholar
- 3.Smith J, Jones M Jr, Houghton L et al (1999) Future of health insurance. N Engl J Med 965:325-329Google Scholar
- 4.South J, Blass B (2001) The future of modern genomics. Blackwell, LondonGoogle Scholar
- 5.Tantipathananandh C, Berger-Wolf T Y, Kempe D (2007) A framework for community identification in dynamic social networks. In: proceedings of the 13th international conference on knowledge discovery and data mining 717-726Google Scholar
- 6.V. Berk an G. Cybenko, “Process Query Systems”, IEEE Computer, January 2007, p 62-71Google Scholar
- 7.Qradar, http://www.q1labs.comGoogle Scholar
- 8.Mazu Profiler, http://www.mazunetworks.comGoogle Scholar
- 9.Ian H. Witten and Eibe Frank, “Data Mining, Practical Machine Learning Tools and Techniques”, 2nd edition, MK publishers 2005Google Scholar
- 10.Lu J, Callan J (2006) User Modeling for Full-Text Federated Search in Peer-to-Peer Networks. In: Annual ACM Conference on Research and Development in Information Retrieval Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval 332-339Google Scholar
- 11.Quatse, Jesse and Najmi, Amir (2007) "Empirical Bayesian Targeting," Proceedings, WORLDCOMP’07, World Congress in Computer Science, Computer Engineering, and Applied ComputingGoogle Scholar
- 12.Parsons, J., Ralph, P., & Gallagher K. (2004) Using viewing time to infer user preference in recommender systems. AAAI Workshop in Semantic Web Personalization, San Jose, California, July.Google Scholar