Machine Learning Methods for High Level Cyber Situation Awareness

  • Thomas G. Dietterich
  • Xinlong Bao
  • Victoria Keiser
  • Jianqiang Shen
Chapter
Part of the Advances in Information Security book series (ADIS, volume 46)

Abstract

Cyber situation awareness needs to operate at many levels of abstraction. In this chapter, we discuss situation awareness at a very high level—the behavior of desktop computer users. Our goal is to develop an awareness of what desktop users are doing as they work. Such awareness has many potential applications including

Keywords

Sorting Editing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

Acknowledgements

This material is based upon work supported by the Defense Advanced Research Projects Agency (DARPA) under Contract No. FA8750-07-D-0185/0004. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the DARPA or the Air Force Research Laboratory (AFRL).

References

  1. 1.
    Bellotti, V., Dalal, B., Good, N., Bobrow, D.G., Ducheneaut, N.: What a to-do: studies of task management towards the design of a personal task list manager. In: ACM Conference on Human Factors in Computing Systems (CHI2004), pp. 735–742. ACM, NY (2004)CrossRefGoogle Scholar
  2. 2.
    Crammer, K., Dekel, O., Keshet, J., Shalev-Shwartz, S., Singer, Y.: Online passive-aggressive algorithms. Journal of Machine Learning Research 7, 551–585 (2006)MathSciNetGoogle Scholar
  3. 3.
    Dietterich, T.G., Slater, M., Bao, X., Cao, J., Lonsdale, H., Spence, C., Hadley, G., Wynn, E.: Quantifying and supporting multitasking for intel knowledge workers. Tech. rep., Oregon State University, School of EECS (2009)Google Scholar
  4. 4.
    Doucet, A., de Freitas, N., Murphy, K.P., Russell, S.J.: Rao-Blackwellised particle filtering for dynamic Bayesian networks. In: UAI’00: Proceedings of the 16th Conference in Uncertainty in Artificial Intelligence, pp. 176–183. Morgan Kaufmann (2000)Google Scholar
  5. 5.
    Dredze, M., Crammer, K., Pereira, F.: Confidence-weighted linear classification. In: A. McCallum, S. Roweis (eds.) Proceedings of the 25th Annual International Conference on Machine Learning (ICML 2008), pp. 264–271. Omnipress (2008)Google Scholar
  6. 6.
    Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, Second Edition. John Wiley and Sons, Inc. (2000)Google Scholar
  7. 7.
    Gonzalez, V.M., Mark, G.: “constant, constant, multi-tasking craziness”: Managing multiple working spheres. In: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 113–120. ACM Press (2004)Google Scholar
  8. 8.
    Joachims, T.: Transductive inference for text classification using support vector machines. In: Proceedings of the 16th International Conference on Machine Learning (ICML), pp. 200–209. Morgan Kaufmann, Bled, Slovenia (1999)Google Scholar
  9. 9.
    Kaptelinin, V.: UMEA: Translating interaction histories into project contexts. In: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 353–360. ACM Press (2003)Google Scholar
  10. 10.
    Kersting, K., De Raedt, L., Raiko, T.: Logial hidden Markov models. Journal of Artificial Intelligence Research (JAIR) 25, 425–456 (2006)MATHGoogle Scholar
  11. 11.
    McCallum, A., Nigam, K.: A comparison of event models for naive Bayes text classification. In: AAAI-98 Workshop on Learning for Text Categorization (1998)Google Scholar
  12. 12.
    Nijssen, S., Kok, J.N.: A quickstart in frequent structure mining can make a difference. In: Proceedings of KDD-2004, pp. 647–652 (2004)Google Scholar
  13. 13.
    Rennie, J.D.M., Shih, L., Teevan, J., R., K.D.: Tackling the poor assumptions of naive Bayes text classifiers. In: Proceedings of the International Conference on Machine Learning (ICML2003), pp. 616–623 (2003)Google Scholar
  14. 14.
    Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. In: Information Processing and Management, pp. 513–523 (1988)Google Scholar
  15. 15.
    Shen, J., Fitzhenry, E., Dietterich, T.: Discovering frequent work procedures from resource connections. In: Proceedings of the International Conference on Intelligent User Interfaces (IUI-2009), pp. 277–286. ACM, New York, NY (2009)Google Scholar

Copyright information

© Springer-Verlag US 2010

Authors and Affiliations

  • Thomas G. Dietterich
    • 1
  • Xinlong Bao
    • 1
  • Victoria Keiser
    • 1
  • Jianqiang Shen
    • 1
  1. 1.Oregon State University, 1148 Kelley Engineering CenterCorvallisUSA

Personalised recommendations