A Cyber-based Behavioral Model

While long considered an important aspect of strategic and theater planning, situational awareness (SA) is the linchpin to both cyber planning and execution. As stated in Joint doctrine, before military activities in the information environment can be accurately and effectively planned, the “state” of the environment must be understood. At its core, cyber situational awareness requires understanding the environment in terms of how information, events, and actions will impact goals and objectives, both now and in the near future. Joint Information Operations (IO) doctrine defines three layers of information inherent to this; physical, informational, and cognitive. While a fair amount of time and effort has been focused on the physical and informational aspects of cyber situational awareness, very little emphasis has been placed on the cognitive layer as it relates to cyber space and how best to model and analyze it. This research examines aspects of the cognitive level by defining a cyber-based behavioral model contingent on the activities a user performs while on the Internet. We believe this is foundational to completely defining a cyber situational awareness model, thus providing commanders and decision makers a more comprehensive and real time view of the environment in which they are operating.

[1]  John D. Lafferty,et al.  Dynamic topic models , 2006, ICML.

[2]  Vincent H. Berk,et al.  Online Behavioral Analysis and Modeling Methodology (OBAMM) , 2008 .

[3]  Thomas L. Griffiths,et al.  Integrating Topics and Syntax , 2004, NIPS.

[4]  Huan Liu,et al.  Social Computing, Behavioral Modeling, and Prediction , 2008 .

[5]  Sergio A. Alvarez,et al.  Efficient Adaptive-Support Association Rule Mining for Recommender Systems , 2004, Data Mining and Knowledge Discovery.

[6]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[7]  John D. Lafferty,et al.  Correlated Topic Models , 2005, NIPS.

[8]  John Riedl,et al.  Recommender systems in e-commerce , 1999, EC '99.

[9]  ChengXiang Zhai,et al.  Automatic labeling of multinomial topic models , 2007, KDD '07.

[10]  Bernard J. Jaworski,et al.  Introduction to E-Commerce , 2001 .

[11]  Thomas L. Griffiths,et al.  Probabilistic Topic Models , 2007 .

[12]  W. M. Bolstad Introduction to Bayesian Statistics , 2004 .

[13]  James P. Callan,et al.  Automatically labeling hierarchical clusters , 2006, DG.O.

[14]  Thomas L. Griffiths,et al.  The Author-Topic Model for Authors and Documents , 2004, UAI.

[15]  Das Amrita,et al.  Mining Association Rules between Sets of Items in Large Databases , 2013 .

[16]  D. J. Robinson,et al.  Cyber-based behavioral modeling , 2010 .

[17]  William M. Bolstad,et al.  Introduction to Bayesian Statistics , 2004 .

[18]  Daqing He,et al.  Detecting session boundaries from Web user logs , 2000 .

[19]  George Cybenko,et al.  HBML: A Language for Quantitative Behavioral Modeling in the Human Terrain , 2009 .

[20]  Yee Whye Teh,et al.  Sharing Clusters among Related Groups: Hierarchical Dirichlet Processes , 2004, NIPS.

[21]  Thomas L. Griffiths,et al.  Hierarchical Topic Models and the Nested Chinese Restaurant Process , 2003, NIPS.