Paper
28 April 2010 Synchronization properties of cyber behaviors
David C. Twardowski, George V. Cybenko
Author Affiliations +
Abstract
In recent years the internet has facilitated an explosion of growth in social networks, allowing individuals to interact with one another in a variety of different contexts. Interactions between individuals in networks such as twitter and NASDAQ produce events which co-occur in time. If we make the assumption that events in networks are anonymized such that there is no mapping from the event back to the individual who produced it, we are left with a data stream consisting of spatially and temporally interleaved events with no attribution. We model this property of event co-occurrence in order to recreate this mapping by assuming a strong coupling between temporal co-occurrence and spatial variance an arbitrary individual's behavior. We present a few algorithms based on this model, which produce partitions of tracks, where each track is indicative of the behaviors from a single individual in the network. Results using the algorithms indicate that the models are valid showing a high degree of spatio-temporal consistency among behaviors in networks. This suggests the need for further exploration of new behavior models and algorithms centered around this property.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
David C. Twardowski and George V. Cybenko "Synchronization properties of cyber behaviors", Proc. SPIE 7709, Cyber Security, Situation Management, and Impact Assessment II; and Visual Analytics for Homeland Defense and Security II, 77090C (28 April 2010); https://doi.org/10.1117/12.850220
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Data modeling

Databases

Algorithm development

Associative arrays

Computer networks

Homeland security

RELATED CONTENT


Back to Top