HBML: A Language for Quantitative Behavioral Modeling in the Human Terrain
Human and machine behavioral modeling and analysis are active areas of study in a variety of domains of current interest. Notions of what behavior means as well as how behaviors can be represented, compared, shared, integrated and analyzed are not well established and vary from domain to domain, even from researcher to researcher. Our current research suggests that a common framework for the systematic analysis of behaviors of people, networks, and engineered systems is both possible and much needed. The main contribution of this paper is the presentation of the Human Behavioral Modeling Language (HBML). We believe that the proposed schema and framework can support behavioral modeling and analysis by large-scale computational systems across a variety of domains.
KeywordsBehavioral Modeling Anomaly Detection Order Behavior Insider Threat Functional Subgroup
Unable to display preview. Download preview PDF.
- 1.V. Berk and G. Cybenko. Process query systems. IEEE Computer, pages 62–70, January 2007.Google Scholar
- 2.V. Berk and N. Fox. Process query systems for network security monitoring. In Proceedings of the SPIE 0277-786X Defense and Security Symposium, Orlando, Florida, March/April 2005.Google Scholar
- 3.W. Chung et al. Dynamics of process-based social networks. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, Orlando, FL, April 2006.Google Scholar
- 4.G. Cybenko, V. H. Berk, V. Crespi, G. Jiang, and R. S. Gray. An overview of process query systems. In Proc. SPIE 5403: Sensors, and Command, Control, Communications, and Intelligence, pages 183–197, 2004.Google Scholar
- 5.S. Das. Intelligent market-making in artificial financial markets. PhD Thesis, Dpmt EECS, MIT, 2005.Google Scholar
- 6.R. W. Lucky. Silicon Dreams. St. Martin's Press, New York, 1989.Google Scholar
- 8.S. Oh, L. Schenato, P. Chen, and S. Sastry. A scalable real-time multiple-target tracking algorithm for sensor networks. University of California, Berkeley, Technical Report UCB//ERL M05/9, Feb. 2005.Google Scholar
- 9.A. Putt. Putt's Law and the Successful Technocrat: How to Win in the Information Age. Wiley-IEEE Press, 2006.Google Scholar
- 10.R. Savell and G. Cybenko. Mining for social processes in intelligence data streams. Social Computing, Jan 2008.Google Scholar
- 11.S.Stolfo et al. Insider Attack and Cyber Security: Beyond the Hacker. Springer, New York, March, 2008.Google Scholar
- 12.D. Twardowski, R. Savell, and G. Cybenko. Process learning of network interactions in market microstructures. submitted for publication, preprint available, 2008.Google Scholar
- 13.B. Warrender and S. Forrest. Detecting intrusion using system calls: alternative data models. In 1999 IEEE Symp. on Security and Privacy, pages 133–145, Oakland, CA, 1999.Google Scholar