Characterization and Planning for Computer Network Operations

نویسندگان

  • George Cybenko
  • David John Robinson
چکیده

Whom we e-mail, where we browse, what we purchase, and the things we search for on the World Wide Web all leave identifiable traces of who we are as individuals. In today’s technology focused landscape, cyberspace represents the new environment in which we communicate, work, shop, and play, and the cyber behaviors we exhibit there give a great deal of insight into our individual identities. This dissertation proposes a novel approach to the modeling and analysis of behaviors based on a user’s cyber activities. We present a methodology to identify, extract, and analyze cyber behaviors providing the foundation for cyber-based behavioral modeling. In addition, we define the underpinnings necessary to support this approach through our behavioral extraction, Bayesian sample size estimation, and behavioral state-based techniques, then empirically evaluate their use. Methods are implemented to characterize, predict, and detect change in individual and group behaviors and we demonstrate their effectiveness using real world data. This research offers valuable contributions to a number of areas. Within the Department of Defense, this work provides the foundation to accurately and effectively represent and analyze the behavioral layers of the cyber situational awareness environment, which in turn will provide planners and decision makers critical information to achieve their mission. In addition, the financial sector may leverage behavioral models for fraud prevention and credit scoring while human resources can track employees by monitoring their behavior for malicious activity (insider threat) and for classifying and ranking user’s skills. E-commerce can use these techniques to further expand the scope of its profiling techniques to best characterize and predict purchase patterns for individuals and groups of online shoppers as well.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sustainable closed-loop supply chain network design and operations planning considering human resource employment and training

Modeling and optimal solving of supply chain management problems lead to efficient decision making in strategic planning and supply chain operations, resulting in a competitive advantage. Today, with the planning of a sustainable supply chain, in addition to achieving economic goals, it is possible to meet social and environmental objectives and considerations. This research deal with sustainab...

متن کامل

Multiple-organizational coordination planning for humanitarian relief operations

In humanitarian relief operations (HRO), due to the excessive number of relief organizations, multiple organizational coordination is a demanding and complicated task. Considering such a problem, this paper proposes a two-phase mechanism to coordinate multiple heterogeneous relief organizations in a decentralized HRO logistics network. To address such a problem, first a bi-level mixed integer l...

متن کامل

Improvement of Routing Operation Based on Learning with Using Smart Local and Global Agents and with the Help of the Ant Colony Algorithm

Routing in computer networks has played a special role in recent years. The cause of this is the role of routing in a performance of the networks. The quality of service and security is one of the most important challenges in routing due to lack of reliable methods. Routers use routing algorithms to find the best route to a particular destination. When talking about the best path, we consider p...

متن کامل

Optimal Distributed Generation Planning in Radial Distribution Networks Considering Protection Coordination Limits

Distributed generation (DG) has been widely used in distribution network to reduce the energy losses, improve voltage profile and system reliability, etc.  The location and capacity of DG units can influence on probability of protection mal-operation in distribution networks. In this paper, a novel model for DG planning is proposed to find the optimum DG location and sizing in radial distr...

متن کامل

On exponential domination and graph operations

An exponential dominating set of graph $G = (V,E )$ is a subset $Ssubseteq V(G)$ such that $sum_{uin S}(1/2)^{overline{d}{(u,v)-1}}geq 1$ for every vertex $v$ in $V(G)-S$, where $overline{d}(u,v)$ is the distance between vertices $u in S$ and $v  in V(G)-S$ in the graph $G -(S-{u})$. The exponential domination number, $gamma_{e}(G)$, is the smallest cardinality of an exponential dominating set....

متن کامل

Improvement of Routing Operation Based on Learning with Using Smart Local and Global Agents and with the Help of the Ant Colony Algorithm

Routing in computer networks has played a special role in recent years. The cause of this is the role of routing in a performance of the networks. The quality of service and security is one of the most important challenges in routing due to lack of reliable methods. Routers use routing algorithms to find the best route to a particular destination. When talking about the best path, we consider p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012