Abstract
Based on the research of network user behavior, this paper studies and proposes an evaluation model of user behavior credibility. Firstly, the behavior evaluation index system is constructed by AHP analytic hierarchy process. Then, the information entropy is used to optimize the behavior evidence after data collection. Finally, the weight of each behavior attribute is calculated by the intuitionistic fuzzy judgment matrix, and the attribute layer and target layer of user behavior are calculated. Comprehensive credibility and based on comprehensive credibility to judge whether user behavior is credible. The simulation experiments show that the proposed application behavior credibility evaluation model has a good effect in evaluating the credibility of user behavior and can be used in increasingly complex and variable network systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ji, T., Tian, L., Hu, Z., Sun, J.: A user behavior evaluation method based on AHP in trusted network. Comput. Eng. Appl. 42(19), 123–126 (2007)
Jiang, Z., Li, S., Yin, C.: Evaluation of network user behavior credibility based on multi-dimensional decision attributes. Appl. Res. Comput. 28(06), 2289–2293+2320 (2011)
Lin, C., Tian, L., Wang, Y.: Research on user behavior credibility in trusted network. Comput. Res. Dev. 45(12), 2033–2043 (2008)
Ma, J., Zhao, Z., Ye, X.: Evaluation of trusted network user behavior based on fuzzy decision analysis. Comput. Eng. 37(13), 125–127+131 (2011)
Shen, J., Du, S., Luo, W., Luo, J., Yang, Q., Chen, Z.: Fuzzy comprehensive evaluation method based on cloud model and its application. Fuzzy Syst. Math. 26(06), 115–123 (2012)
Zhang, J., Zhang, X., Zhang, G.: User behavior evaluation method based on fuzzy comprehensive strategy. Comput. Technol. Dev. 27(05), 138–143 (2017)
Lü, Q.: Trustworthy Evaluation Model Based on Cloud User Behavior. Hebei University (2015)
Wu, Q., Bao, B.: Comprehensive framework for user behavior reliability evaluation. Digital Library Forum (05), 54–60 (2017)
Atanassov, K.T.: Intuitionistic fuzzy sets. Fuzzy Sets Syst. 20(1), 87–96 (1986)
Ning, M., Guan, J., Liu, P., Zhang, Z., O’Hare, G.M.P.: GA-BP air quality evaluation method based on fuzzy theory. Comput. Mater. Continua 58(1), 215–227 (2019)
Li, D., Wu, H., Gao, J., Liu, Z., Li, L., Zheng, Z.: Uncertain knowledge reasoning based on the fuzzy multi entity Bayesian networks. Comput. Mater. Continua 61(1), 301–321 (2019)
Tan, T., Wang, B., Tang, Y., Zhou, X., Han, J.: A method for vulnerability database quantitative evaluation. Comput. Mater. Continua 61(3), 1129–1144 (2019)
Acknowledgments
The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work was supported in part by the National Key Research and Development Project of China (No. 2017YFB0802302).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Yang, C., Wan, G., He, P., Huang, Y., Zhang, S. (2020). User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy Process. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-57881-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57880-0
Online ISBN: 978-3-030-57881-7
eBook Packages: Computer ScienceComputer Science (R0)