ABSTRACT
Based on software system user historical access data, this paper studies user visiting access behaviors and habits, Through the construction of co-occurrence model of user behavior, the credibility calculation method of user behavior is proposed. The co-occurrence model of user behavior consists of co-occurrence probability matrix and synchronization distance matrix. These two matrices are still based on user history access data, through the data processing process, the behavior sequence data is converted into the form of matrix. The calculation method of user's behavior credibility is based on the above two matrices. This method can effectively quantify the trust degree of users' behavior sequences compared with their historical behavior habits by dividing the behavior confidence interval and setting the trust threshold. Finally, the simulation results show that the method is effective.
- Lian Yifeng, Dai Yingxia, Wang Hang. Abnormal user behavior detection based on pattern mining. Journal of computer science, 2002(3):325--330.Google Scholar
- Lai Jianhua, Tang Min. Research and application of user abnormal behavior analysis method. Software guide: 1-5[2019-05-27]Google Scholar
- Wu Qingqiang, Bao Binbin.Comprehensive framework of user behavior reliability evaluation. Digital library BBS,2017(05):54--60.Google Scholar
- Yin Qian. Research on trusted QR code generation and certification scheme based on digital signature. University of electronic science and technology of China, 2018.Google Scholar
- Zhang Benhui, Jiang Wei, Tang Yuansheng. Verifiable multiple key sharing scheme for untrusted third parties. Journal of yangzhou university (natural science edition), 2012, 15(02):65--69.Google Scholar
- Banoth Rajkumar, G. Narsimha. Trust Based Certificate Revocation for Secure Routing in MANET[J]. Procedia Computer Science,2016,92.Google Scholar
- J. Vossaert, J. Lapon, B. De Decker,V. Naessens. User-centric identity management using trusted modules[J]. Mathematical and Computer Modelling, 2013, 57(7-8).Google Scholar
- Agrawal, R.. "Mining association rules between sets of items in large databases." Proceedings of the 1993 International Conference on Management of Data (SIGMOD 93) 1993.Google Scholar
- Park, J. S., Chen, M. S., & Yu, P. S. (1995). An effective hash-based algorithm for mining association rules. Acm Sigmod Record, 24(2), DOI= http://doi.acm.org/1175-186.10.1145/568271.223813Google Scholar
Index Terms
- A User Behavior Credibility Calculation Method Based on Behavior Co-occurrence
Recommendations
Research on User Clustering Algorithm Based on Software System User Behavior Trajectory
ICBDT '19: Proceedings of the 2nd International Conference on Big Data TechnologiesThis paper studies and analyzes software system user behavior, proposes a clustering algorithm based on user behavior trajectory data. Through a series of data processing steps, the original user access and operation data are transformed into user ...
User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy Process
Artificial Intelligence and SecurityAbstractBased on the research of network user behavior, this paper studies and proposes an evaluation model of user behavior credibility. Firstly, the behavior evaluation index system is constructed by AHP analytic hierarchy process. Then, the information ...
Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud Environment
ICBDC '19: Proceedings of the 4th International Conference on Big Data and ComputingThe openness, dynamics, randomness and other characteristics of cloud computing make the malicious attack in the cloud environment more destructive and influential than the traditional environment. Existing identity authentication technology can verify ...
Comments