Activity sequence learning in mission critical tasks

In this paper, we present an interface agent, Commander's Learning Agent (CLearn), that aims to learn a commander's mission model and intent in the form of sequences of activities based on frequency. The major benefits of CLearn include automation of repetitive actions performed by the user and near real-time monitoring of available critical resources leading to alert generation when resource degradation will impact missions dependent upon those resources. We develop and implement passive and active monitoring techniques in conjunction with attribute-based learning and sequential pattern mining. While CLearn is relevant to many applications, including information security management, we describe our sequence learning approach in the context of how it can be used to provide IPB (Intelligence Preparation of the Battlespace) support for planning, operations, and assessment missions in Air and Space Operation Centers (AOCs). We describe in detail our plan to enhance the proposed sequence learning approach to a more robust HMM-based approach to learn sequences of activities at various levels of abstractions. The approach is in line with the network centric command and control structure within the military.

[1]  David Heckerman,et al.  A Tutorial on Learning with Bayesian Networks , 1998, Learning in Graphical Models.

[2]  Paul J. Krause,et al.  Learning probabilistic networks , 1999, The Knowledge Engineering Review.

[3]  George Karypis,et al.  SLPMiner: an algorithm for finding frequent sequential patterns using length-decreasing support constraint , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..

[4]  Robert F. Mills,et al.  A Tactical Framework for Cyberspace Situational Awareness , 2010 .

[5]  Qiming Chen,et al.  PrefixSpan,: mining sequential patterns efficiently by prefix-projected pattern growth , 2001, Proceedings 17th International Conference on Data Engineering.

[6]  Michael R. Grimaila,et al.  Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process , 2009, Security and Management.

[7]  Jiawei Han,et al.  IncSpan: incremental mining of sequential patterns in large database , 2004, KDD.

[8]  Yoram Singer,et al.  The Hierarchical Hidden Markov Model: Analysis and Applications , 1998, Machine Learning.

[9]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[10]  R. Agrawal,et al.  Research Report Mining Sequential Patterns: Generalizations and Performance Improvements Limited Distribution Notice Mining Sequential Patterns: Generalizations and Performance Improvements , 1996 .

[11]  Subrata Das High-Level Data Fusion , 2008 .

[12]  Richard E. Neapolitan,et al.  Learning Bayesian networks , 2007, KDD '07.