skip to main content
10.1145/3358528.3358573acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdtConference Proceedingsconference-collections
research-article

A User Behavior Credibility Calculation Method Based on Behavior Co-occurrence

Authors Info & Claims
Published:28 August 2019Publication History

ABSTRACT

Based on software system user historical access data, this paper studies user visiting access behaviors and habits, Through the construction of co-occurrence model of user behavior, the credibility calculation method of user behavior is proposed. The co-occurrence model of user behavior consists of co-occurrence probability matrix and synchronization distance matrix. These two matrices are still based on user history access data, through the data processing process, the behavior sequence data is converted into the form of matrix. The calculation method of user's behavior credibility is based on the above two matrices. This method can effectively quantify the trust degree of users' behavior sequences compared with their historical behavior habits by dividing the behavior confidence interval and setting the trust threshold. Finally, the simulation results show that the method is effective.

References

  1. Lian Yifeng, Dai Yingxia, Wang Hang. Abnormal user behavior detection based on pattern mining. Journal of computer science, 2002(3):325--330.Google ScholarGoogle Scholar
  2. Lai Jianhua, Tang Min. Research and application of user abnormal behavior analysis method. Software guide: 1-5[2019-05-27]Google ScholarGoogle Scholar
  3. Wu Qingqiang, Bao Binbin.Comprehensive framework of user behavior reliability evaluation. Digital library BBS,2017(05):54--60.Google ScholarGoogle Scholar
  4. Yin Qian. Research on trusted QR code generation and certification scheme based on digital signature. University of electronic science and technology of China, 2018.Google ScholarGoogle Scholar
  5. Zhang Benhui, Jiang Wei, Tang Yuansheng. Verifiable multiple key sharing scheme for untrusted third parties. Journal of yangzhou university (natural science edition), 2012, 15(02):65--69.Google ScholarGoogle Scholar
  6. Banoth Rajkumar, G. Narsimha. Trust Based Certificate Revocation for Secure Routing in MANET[J]. Procedia Computer Science,2016,92.Google ScholarGoogle Scholar
  7. J. Vossaert, J. Lapon, B. De Decker,V. Naessens. User-centric identity management using trusted modules[J]. Mathematical and Computer Modelling, 2013, 57(7-8).Google ScholarGoogle Scholar
  8. Agrawal, R.. "Mining association rules between sets of items in large databases." Proceedings of the 1993 International Conference on Management of Data (SIGMOD 93) 1993.Google ScholarGoogle Scholar
  9. Park, J. S., Chen, M. S., & Yu, P. S. (1995). An effective hash-based algorithm for mining association rules. Acm Sigmod Record, 24(2), DOI= http://doi.acm.org/1175-186.10.1145/568271.223813Google ScholarGoogle Scholar

Index Terms

  1. A User Behavior Credibility Calculation Method Based on Behavior Co-occurrence

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICBDT '19: Proceedings of the 2nd International Conference on Big Data Technologies
      August 2019
      382 pages
      ISBN:9781450371926
      DOI:10.1145/3358528

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 August 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader