Skip to main content

Trajectory Based Behavior Analysis for User Verification

  • Conference paper
Intelligent Data Engineering and Automated Learning – IDEAL 2010 (IDEAL 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6283))

Abstract

Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a general approach for user verification based on user trajectory inputs. The approach is labor-free for users and is likely to avoid the possible copy or simulation from other non-authorized users or even automatic programs like bots. Our study focuses on finding the hidden patterns embedded in the trajectories produced by account users. We employ a Markov chain model with Gaussian distribution in its transitions to describe the behavior in the trajectory. To distinguish between two trajectories, we propose a novel dissimilarity measure combined with a manifold learnt tuning for catching the pairwise relationship. Based on the pairwise relationship, we plug-in any effective classification or clustering methods for the detection of unauthorized access. The method can also be applied for the task of recognition, predicting the trajectory type without pre-defined identity. Given a trajectory input, the results show that the proposed method can accurately verify the user identity, or suggest whom owns the trajectory if the input identity is not provided.

Research partially supported by Taiwan National Science Council Grants # 98-2221-E-011-105 and # 98-2221-E-001-017.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tenenbaum, J.B., de Silva, V., Langford, J.C.: A global geometric framework for nonlinear dimensionality reduction. Science 290, 2319–2323 (2000)

    Article  Google Scholar 

  2. Lee, Y.J., Mangasarian, O.L.: SSVM: A smooth support vector machine for classification. Comput. Optim. Appl. 20, 5–22 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  3. Jain, A.K., Griess, F.D., Connell, S.D.: On-line signature verification. Pattern Recognition 35, 2963–2972 (2002)

    Article  MATH  Google Scholar 

  4. Qiao, Y., Liu, J., Tang, X.: Offline signature verification using online handwriting registration. In: CVPR (2007)

    Google Scholar 

  5. Munich, M.E., Perona, P.: Visual identification by signature tracking. IEEE Trans. Pattern Anal. Mach. Intell. 25, 200–217 (2003)

    Article  Google Scholar 

  6. Richiardi, J., Drygajlo, A.: Gaussian mixture models for on-line signature verification. In: WBMA ’03: Proceedings of the 2003 ACM SIGMM workshop on Biometrics Methods and Applications, pp. 115–122. ACM, New York (2003)

    Chapter  Google Scholar 

  7. von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: EUROCRYPT, pp. 294–311 (2003)

    Google Scholar 

  8. Lin, J., Keogh, E.J., Lonardi, S., chi Chiu, B.Y.: A symbolic representation of time series, with implications for streaming algorithms. In: DMKD, pp. 2–11 (2003)

    Google Scholar 

  9. Lee, J.G., Han, J., Li, X., Gonzalez, H.: TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering. In: PVLDB, vol. 1, pp. 1081–1094 (2008)

    Google Scholar 

  10. Keogh, E., Lonardi, S., Ratanamahatana, C.A.: Towards parameter-free data mining. In: KDD ’04: Proceedings of the Tenth ACM SIGKDD Inter. Conf. on Knowledge Discovery and Data Mining, pp. 206–215. ACM, New York (2004)

    Chapter  Google Scholar 

  11. Pao, H.K., Case, J.: Computing entropy for ortholog detection. In: International Conference on Computational Intelligence, pp. 89–92 (2004)

    Google Scholar 

  12. Li, M., Badger, J.H., Chen, X., Kwong, S., Kearney, P., Zhang, H.: An information-based sequence distance and its application to whole mitochondrial genome phylogeny. Bioinformatics 17, 149–154 (2001)

    Article  Google Scholar 

  13. Li, M., Vitányi, P.: An Introduction to Kolmogorov Complexity and Its Applications, 2nd edn. Springer, New York (1997)

    MATH  Google Scholar 

  14. Chen, K.T., Liao, A., Pao, H.K.K., Chu, H.H.: Game bot detection based on avatar trajectory. In: Proceedings of IFIP ICEC 2008 (2008)

    Google Scholar 

  15. Chen, K.T., Pao, H.K.K., Chang, H.C.: Game bot identification based on manifold learning. In: Proceedings of ACM NetGames 2008 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pao, HK., Lin, HY., Chen, KT., Fadlil, J. (2010). Trajectory Based Behavior Analysis for User Verification. In: Fyfe, C., Tino, P., Charles, D., Garcia-Osorio, C., Yin, H. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2010. IDEAL 2010. Lecture Notes in Computer Science, vol 6283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15381-5_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15381-5_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15380-8

  • Online ISBN: 978-3-642-15381-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics