Whom we e-mail, where we browse, what we purchase, and the things we search for on the World Wide Web all leave identifiable traces of who we are as individuals. In today's technology focused landscape, cyberspace represents the new environment in which we communicate, work, shop, and play, and the cyber behaviors we exhibit there give a great deal of insight into our individual identities.
This dissertation proposes a novel approach to the modeling and analysis of behaviors based on a user's cyber activities. We present a methodology to identify, extract, and analyze cyber behaviors providing the foundation for cyber-based behavioral modeling. In addition, we define the underpinnings necessary to support this approach through our behavioral extraction, Bayesian sample size estimation, and behavioral state-based techniques, then empirically evaluate their use. Methods are implemented to characterize, predict, and detect change in individual and group behaviors and we demonstrate their effectiveness using real world data.
This research offers valuable contributions to a number of areas. Within the Department of Defense, this work provides the foundation to accurately and effectively represent and analyze the behavioral layers of the cyber situational awareness environment, which in turn will provide planners and decision makers critical information to achieve their mission. In addition, the financial sector may leverage behavioral models for fraud prevention and credit scoring while human resources can track employees by monitoring their behavior for malicious activity (insider threat) and for classifying and ranking user's skills. E-commerce can use these techniques to further expand the scope of its profiling techniques to best characterize and predict purchase patterns for individuals and groups of online shoppers as well.
|Commitee:||Berk, Vincent, Jabbour, Kamal, Taylor, Stephen|
|School Location:||United States -- New Hampshire|
|Source:||DAI-B 71/11, Dissertation Abstracts International|
|Subjects:||Computer Engineering, Computer science|
|Keywords:||Bayesian sample size, Behavioral ontology, Behavioral state, Cyber behavior, Fingerprinting|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be