Online Behavioral Analysis and Modeling Methodology (OBAMM)

  • David J. Robinson
  • Vincent H. Berk
  • George V. Cybenko


This paper introduces a novel method of tracking user computer behavior to create highly granular profiles of usage patterns. These profiles, then, are used to detect deviations in a users’ online behavior, detecting intrusions, malicious insiders, misallocation of resources, and out-of-band business processes. Successful detection of these behaviors significantly reduces the risk of leaking sensitive data, or inadvertently exposing critical assets.


Business Process Recommender System User Profile Computer Security Business Process Modeling 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Brown B, Aaron M (2001) The politics of nature. In: Smith J (ed) The rise of modern genomics, 3rd edn. Wiley, New York.Google Scholar
  2. 2.
    Olmez A E (2006), Exploring the Culture-Performance Link in Heterogeneous Coalition Oganizations. PhD Thesis, George Mason University, Fairfax, VA.Google Scholar
  3. 3.
    Smith J, Jones M Jr, Houghton L et al (1999) Future of health insurance. N Engl J Med 965:325-329Google Scholar
  4. 4.
    South J, Blass B (2001) The future of modern genomics. Blackwell, LondonGoogle Scholar
  5. 5.
    Tantipathananandh C, Berger-Wolf T Y, Kempe D (2007) A framework for community identification in dynamic social networks. In: proceedings of the 13th international conference on knowledge discovery and data mining 717-726Google Scholar
  6. 6.
    V. Berk an G. Cybenko, “Process Query Systems”, IEEE Computer, January 2007, p 62-71Google Scholar
  7. 7.
    Qradar, http://www.q1labs.comGoogle Scholar
  8. 8.
    Mazu Profiler, http://www.mazunetworks.comGoogle Scholar
  9. 9.
    Ian H. Witten and Eibe Frank, “Data Mining, Practical Machine Learning Tools and Techniques”, 2nd edition, MK publishers 2005Google Scholar
  10. 10.
    Lu J, Callan J (2006) User Modeling for Full-Text Federated Search in Peer-to-Peer Networks. In: Annual ACM Conference on Research and Development in Information Retrieval Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval 332-339Google Scholar
  11. 11.
    Quatse, Jesse and Najmi, Amir (2007) "Empirical Bayesian Targeting," Proceedings, WORLDCOMP’07, World Congress in Computer Science, Computer Engineering, and Applied ComputingGoogle Scholar
  12. 12.
    Parsons, J., Ralph, P., & Gallagher K. (2004) Using viewing time to infer user preference in recommender systems. AAAI Workshop in Semantic Web Personalization, San Jose, California, July.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • David J. Robinson
    • 1
  • Vincent H. Berk
    • 1
  • George V. Cybenko
    • 1
  1. 1.Thayer School of Engineering at Dartmouth CollegeHanover

Personalised recommendations