首页> 外文会议>International Conference on HCI for Cybersecurity, Privacy and Trust;International Conference on Human-Computer Interaction >Time-Lapse Detection for Evolution of Trustworthy Network User Operation Behavior Using Bayesian Network
【24h】

Time-Lapse Detection for Evolution of Trustworthy Network User Operation Behavior Using Bayesian Network

机译:使用贝叶斯网络的可信赖网络用户操作行为演变的时空检测

获取原文

摘要

In the environment of human-computer interaction of information systems, people are paying more attention to user identity authentication based on operation behaviors. Behavior science research shows that each user has a his/her own behavioral pattern that reflects the unique habits, and maintains stability over a period. As known, most of the previous research have explored the user's behavior using static authentication models. However, the user's behavior is evolutionary, even the same user will develop different behavioral tendencies under various times and conditions (job position change or promotion, business content change, increase in age, etc.), causing the difficulty of user authentication under the evolution of user's behavior. This paper proposes a method named time-lapse detection attempting to establish the authentication model based on the evolution of user's behavior. We obtained the log data of several years period of the information system of a publishing house. Firstly, we extracted the data of employees' early operation behaviors and the Bayesian network is used to identify a detection model. Next, the behavior data are divided into multiple test sets according to the time series, and multiple authentication models are carried out to observe the change of authentication accuracy over time. The result shows that, for employees with stable positions and business content, the characteristics of their behavior patterns will change when the number of interactions increases. Moreover, the consequences of the initial detection model fluctuate to different degrees, reducing the accuracy of authentication. Therefore, in future we need to grasp the rules of user behavior and continue to optimize the existing authentication methods of information systems.
机译:在信息系统的人机交互环境中,人们越来越重视基于操作行为的用户身份认证。行为科学研究表明,每个用户都有自己的行为模式,可以反映独特的习惯并在一段时间内保持稳定性。众所周知,大多数以前的研究都使用静态身份验证模型来探索用户的行为。但是,用户的行为是进化的,即使同一位用户在不同的时间和条件下(工作职位的变化或晋升,业务内容的变化,年龄的增长等)也会表现出不同的行为倾向,导致用户在进化过程中的身份验证变得困难用户行为。提出了一种延时检测方法,试图根据用户行为的发展建立认证模型。我们获得了出版社信息系统几年时间的日志数据。首先,我们提取员工的早期运营行为数据,然后使用贝叶斯网络来识别检测模型。接下来,根据时间序列将行为数据分为多个测试集,并执行多个身份验证模型以观察身份验证准确性随时间的变化。结果表明,对于具有稳定职位和业务内容的员工,其行为模式的特征将随着交互次数的增加而改变。此外,初始检测模型的结果会在不同程度上波动,从而降低了身份验证的准确性。因此,将来我们需要掌握用户行为规则,并继续优化现有的信息系统身份验证方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号