Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Generalized approach to modeling user activity graphs for network security and public safety monitoring
Sergeev N., Tselykh A., Tselykh A.  SIN 2013 (Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, Nov 26-28, 2013)117-122.2013.Type:Proceedings
Date Reviewed: Mar 24 2014

Analysis and monitoring of user behaviors in social media and online social networks are of key concern for information security, public safety, and situation awareness. The authors’ goal is to model user activities, which are typically very dynamic. They propose a generalized hypergraph (GH) model to model user activity graphs.

The authors identify key abstractions for modeling user activities in a network: the level of terminal events; the level of actors (identifiers and characteristics); the level of real-life users; the level of services for evaluating activities; the collection of branded services; and the level of social events and processes. The authors then propose the GH model. In this model, the actor corresponds to a special edge in a hypergraph, rather than to a node. The generalized hypergraph allows for effective representation of the relationship between nodes on different hypergraph edges. The proposed GH model can accommodate relations of several functional types within an edge of a generalized hypergraph. It is also in essence a hierarchical hypergraph, in which nodes and edges can belong to different hierarchical groups with different functional modes.

After proposing the GH model, different types of relationships (edges) between actors and their activities are discussed: undirected or directed relationships (or both) between nodes; a multitype relationship between nodes; non-oriented or oriented edges of a hypergraph; complex relationships between nodes within edges of a hypergraph; node-to-node graph relations within different hypergraph edges; relations between hypergraph edges; and relations between a node and a hypergraph edge.

Overall, the paper provides interesting information about the use of a hypergraph-based approach for modeling dynamic user activities in a complex network for cyber-security and monitoring.

Reviewer:  Debraj De Review #: CR142099 (1406-0446)
Bookmark and Share
 
Information Flow Controls (D.4.6 ... )
 
 
Hypergraphs (G.2.2 ... )
 
 
Computer-Communication Networks (C.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Information Flow Controls": Date
Protecting privacy using the decentralized label model
Myers A., Liskov B. ACM Transactions on Software Engineering and Methodology 9(4): 410-442, 2000. Type: Article
Apr 1 2001
Buffer overflow and format string overflow vulnerabilities
Lhee K., Chapin S. Software--Practice & Experience 33(5): 423-460, 2003. Type: Article
Aug 4 2003
A Hookup Theorem for Multilevel Security
McCullough D. IEEE Transactions on Software Engineering 16(6): 563-568, 1990. Type: Article
Apr 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy