首页> 外文会议>Intelligent data engineering and automated learning-IDEAL 2009 >Trajectory Based Behavior Analysis for User Verification
【24h】

Trajectory Based Behavior Analysis for User Verification

机译:用于用户验证的基于轨迹的行为分析

获取原文
获取原文并翻译 | 示例

摘要

Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a general approach for user verification based on user trajectory inputs. The approach is labor-free for users and is likely to avoid the possible copy or simulation from other non-authorized users or even automatic programs like bots. Our study focuses on finding the hidden patterns embedded in the trajectories produced by account users. We employ a Markov chain model with Gaussian distribution in its transitions to describe the behavior in the trajectory. To distinguish between two trajectories, we propose a novel dissimilarity measure combined with a manifold learnt tuning for catching the pairwise relationship. Based on the pairwise relationship, we plug-in any effective classification or clustering methods for the detection of unauthorized access. The method can also be applied for the task of recognition, predicting the trajectory type without pre-defined identity. Given a trajectory input, the results show that the proposed method can accurately verify the user identity, or suggest whom owns the trajectory if the input identity is not provided.
机译:我们在计算机上进行的许多活动都需要验证步骤才能获得授权访问。验证的目的是将真正的帐户所有者与入侵者区分开。我们提出了一种基于用户轨迹输入的用户验证的通用方法。该方法对用户而言是省力的,并且可能避免从其他未经授权的用户甚至是自动程序(如bot)中进行复制或模拟。我们的研究着重于发现嵌入在帐户用户产生的轨迹中的隐藏模式。我们使用马尔可夫链模型在其过渡过程中具有高斯分布来描述轨迹的行为。为了区分两条轨迹,我们提出了一种新颖的相异性测度,并结合了用于学习成对关系的流形学习调整。基于成对关系,我们插入了任何有效的分类或聚类方法来检测未经授权的访问。该方法还可以用于识别任务,无需预先定义的身份即可预测轨迹类型。在给定轨迹输入的情况下,结果表明,所提出的方法可以准确地验证用户身份,或者如果不提供输入身份,则可以提示谁拥有轨迹。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号