Javascript must be enabled to continue!
Topological Methods of Analysis in Behavioral Analytics Systems
View through CrossRef
Purpose of the article: development of a methodology for the application of methods for analyzing big data based on topological constructions in relation to behavioral analytics systems to ensure corporate and cyber-physical security. Method: the technique is based on the algebraic theory of persistent homology. Along with algebraic topology, embedology (Takens-Mane embedding theory) and the theory of metric spaces are used. Result: the necessary concepts of algebraic topology are given, which underlie the analysis of user / entity behavior profiles: Vietoris-Rips simplicial complex, filtering by a set of cloud points, homology groups, persistence modules, topological characteristics and dependencies. At the first stage of the technique, the time series that describe the time-varying behavior of the user / entity are transformed into a cloud of points in the topological space. For this transformation, the methods of the Takens-Mane embedding theory and the algorithm of the method of false neighbors are used. At the subsequent stages of the methodology for the base and current point clouds, topological dependencies, diagrams (persistence, bar codes) characterizing the base and current behavior profiles, respectively, are built. At the final stage, the deviation of the current behavior profile from the baseline is revealed. To estimate the deviation, the Wasserstein, Chebyshev, bottleneck metrics and scaling based on the generalized Harrington desirability function are used. The results of practical testing of the proposed method of applying topological algorithms to the data of the monitoring system for the work of corporate network users with information resources are presented
Title: Topological Methods of Analysis in Behavioral Analytics Systems
Description:
Purpose of the article: development of a methodology for the application of methods for analyzing big data based on topological constructions in relation to behavioral analytics systems to ensure corporate and cyber-physical security.
Method: the technique is based on the algebraic theory of persistent homology.
Along with algebraic topology, embedology (Takens-Mane embedding theory) and the theory of metric spaces are used.
Result: the necessary concepts of algebraic topology are given, which underlie the analysis of user / entity behavior profiles: Vietoris-Rips simplicial complex, filtering by a set of cloud points, homology groups, persistence modules, topological characteristics and dependencies.
At the first stage of the technique, the time series that describe the time-varying behavior of the user / entity are transformed into a cloud of points in the topological space.
For this transformation, the methods of the Takens-Mane embedding theory and the algorithm of the method of false neighbors are used.
At the subsequent stages of the methodology for the base and current point clouds, topological dependencies, diagrams (persistence, bar codes) characterizing the base and current behavior profiles, respectively, are built.
At the final stage, the deviation of the current behavior profile from the baseline is revealed.
To estimate the deviation, the Wasserstein, Chebyshev, bottleneck metrics and scaling based on the generalized Harrington desirability function are used.
The results of practical testing of the proposed method of applying topological algorithms to the data of the monitoring system for the work of corporate network users with information resources are presented.
Related Results
People Analytics
People Analytics
People analytics refers to the systematic and scientific process of applying quantitative or qualitative data analysis methods to derive insights that shape and inform employee-rel...
Reprogrammable plasmonic topological insulators with ultrafast control
Reprogrammable plasmonic topological insulators with ultrafast control
Abstract
Topological photonics has revolutionized our understanding of light propagation, providing a remarkably robust way to manipulate light. Despite the intensive resea...
Distinguishing between topological isomorphism and topological equivalence of power electronic converters
Distinguishing between topological isomorphism and topological equivalence of power electronic converters
In the process of deducing the topology of power electronic converters, scholars often use topological equivalence or topological isomorphism to identify topologies with different ...
Enhancing business performance: The role of data-driven analytics in strategic decision-making
Enhancing business performance: The role of data-driven analytics in strategic decision-making
In today’s highly competitive business landscape, organizations are increasingly turning to data-driven analytics to enhance performance and inform strategic decision-making. This ...
Floquet topological physics in photonics
Floquet topological physics in photonics
Floquet topological physics, an area exploring periodically driven systems and leveraging degrees of freedoms in the temporal dimension, has opened new avenues in photonics by enab...
Understanding topological phases of matter with statistical methods
Understanding topological phases of matter with statistical methods
Topological phases set themselves apart from other phases since they cannot be understood in terms of the usual Landau theory of phase transitions. This fact, which is a consequenc...
Book Review: Learning Analytics Explained by Niall Sclater
Book Review: Learning Analytics Explained by Niall Sclater
Sclater’s book Learning Analytics Explained is not unique in its goal to present a practitioner audience with a synopsis of the “what and how” of learning analytics. Throughout LA’...
Topological state transitions in electromagnetic topological defects
Topological state transitions in electromagnetic topological defects
Abstract
The recent emergence of electromagnetic topological defects has attracted wide interest in fields from topological photonics to deep-subwavelength light-mater inte...

