Approaches to the Creation of Behavioural Patterns of Information System Users

Pavels Osipovs, Arkady Borisov

Abstract


During the development of the system for anomaly detection in the electronic information system, there is a need to review the existing research in the field of user behaviour modelling. Approaches to user behaviour modelling are very diverse: the algorithms based on neural networks, agent-based approach, Bayesian networks and ontologies. Each approach has its advantages and disadvantages, features, and the applicability for the infrastructure of modern complex electronic systems.

Keywords:

Anomaly detection; user behaviour model; ontology; Bayesian network; neural network; multi-agent system

Full Text:

PDF

References


Infected User Behavioral Modeling for Cyber Defense Exercises: Part I URL http://www.breakingpointsystems.com/resources/blog/cyber- defense-exercises-part1/ Last accessed 2012.05.12

Laskey, K.B., Alghamdi, G., Wang, X., Barbara, D., Shackleford, T., Wright, E., and Fitzgerald, J., Detecting Threatening Behavior Using Bayesian Networks, Proceedings of the Conference on Behavioral Representation in Modeling and Simulation, 2004.

The Eighth Annual CSI/FBI 2003 report: Computer Crime and Security Survey.

Razmerita, L., Modeling Behavior of Users in Adaptive and Semantic- enhanced Information Systems: The role of a User Ontology, Authoring of Adaptive and Adaptable Hypermedia workshop, in conjunction with Adaptive Hypermedia Conference, 29 of July-1 August 2008, Hanover 2008.

Bunge. (1977) Treatise on Basic Philosophy: Ontology I - The Furniture of the World. Reidel.

M. Uschold and M. Gruninger, Ontologies: principles, methods, and applications, Knowledge Engineering Review, vol. 11, pp. 93-155, 1996.

A. Shelestov, S. Skakun, N. Kussul, Agent-based approach to implementing a model of user behavior Grid-systems; Space Research Institute NASU-NSAU; Інформатика, кібернетика та обчислювальна техніка, вып. 9 (132), Донецк, ДонНТУ, 2008. – С.8-14. ISSN: 1996-1588.

Foster Ian The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers. — ISBN 1-55860-475-8 , 677p, 1999.

Adams C., Lloyd S. Understanding PKI: Concepts, Standards, and Deployment Considerations. 2nd ed. Addison-Wesley, 2000.

Seung-Hyun K., Kyong H.K., Jong K., Sung-Je H., Sangwan K. Workflow-Based Authorization Service in the Grid. J. of Grid Computing, 2004, Num. 2, Р. 43–55.

Shingo T., Susumu D., Shinji S. A user-oriented secure file system on the Grid // The 3rd IEEE/ACM Int. Symp. on Cluster Computing and the Grid (CCGrid 2003), May, 2003.

Haykin S. Neural Networks: a comprehensive foundation. Upper Saddle River, New Jersey: Prentice Hall, 1999.

P. A. Osipov and A. N. Borisov; Abnormal action detection based on Markov models; Automatic Control and Computer Sciences; Volume 41 / 2007 - Volume 45 / 2011; ISSN 0146-4116 (Print) 1558-108X (Online); May 05, 2011.

https://gilda.ct.infn.it/ Last accessed 2012-04-24

http://www.eu-egee.org/ Last accessed 2012-04-24 IMS Learner Information Packaging Information Model Specification, Final Specification; Version 1.0; http://www.imsglobal.org/profiles/lipinfo01.html Last accessed 2012- 04-24


Refbacks

  • There are currently no refbacks.


Copyright (c) 2012 Pavels Osipovs, Arkady Borisov

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.