Abstract
This paper introduces a novel method of tracking user computer behavior to create highly granular profiles of usage patterns. These profiles, then, are used to detect deviations in a users’ online behavior, detecting intrusions, malicious insiders, misallocation of resources, and out-of-band business processes. Successful detection of these behaviors significantly reduces the risk of leaking sensitive data, or inadvertently exposing critical assets.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Brown B, Aaron M (2001) The politics of nature. In: Smith J (ed) The rise of modern genomics, 3rd edn. Wiley, New York.
Olmez A E (2006), Exploring the Culture-Performance Link in Heterogeneous Coalition Oganizations. PhD Thesis, George Mason University, Fairfax, VA.
Smith J, Jones M Jr, Houghton L et al (1999) Future of health insurance. N Engl J Med 965:325-329
South J, Blass B (2001) The future of modern genomics. Blackwell, London
Tantipathananandh C, Berger-Wolf T Y, Kempe D (2007) A framework for community identification in dynamic social networks. In: proceedings of the 13th international conference on knowledge discovery and data mining 717-726
V. Berk an G. Cybenko, “Process Query Systems”, IEEE Computer, January 2007, p 62-71
Qradar, http://www.q1labs.com
Mazu Profiler, http://www.mazunetworks.com
Ian H. Witten and Eibe Frank, “Data Mining, Practical Machine Learning Tools and Techniques”, 2nd edition, MK publishers 2005
Lu J, Callan J (2006) User Modeling for Full-Text Federated Search in Peer-to-Peer Networks. In: Annual ACM Conference on Research and Development in Information Retrieval Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval 332-339
Quatse, Jesse and Najmi, Amir (2007) "Empirical Bayesian Targeting," Proceedings, WORLDCOMP’07, World Congress in Computer Science, Computer Engineering, and Applied Computing
Parsons, J., Ralph, P., & Gallagher K. (2004) Using viewing time to infer user preference in recommender systems. AAAI Workshop in Semantic Web Personalization, San Jose, California, July.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this paper
Cite this paper
Robinson, D.J., Berk, V.H., Cybenko, G.V. (2008). Online Behavioral Analysis and Modeling Methodology (OBAMM). In: Liu, H., Salerno, J.J., Young, M.J. (eds) Social Computing, Behavioral Modeling, and Prediction. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-77672-9_12
Download citation
DOI: https://doi.org/10.1007/978-0-387-77672-9_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-77671-2
Online ISBN: 978-0-387-77672-9
eBook Packages: Computer ScienceComputer Science (R0)