首页> 外文期刊>Knowledge-Based Systems >Trajectory analysis for user verification and recognition
【24h】

Trajectory analysis for user verification and recognition

机译:轨迹分析,用于用户验证和识别

获取原文
获取原文并翻译 | 示例
           

摘要

For many computer activities, user verification is necessary before the system will authorize access. The objective of verification is to separate genuine account owners from intruders or miscreants. In this paper, we propose a general user verification approach based on user trajectories. A trajectory consists of a sequence of coordinated inputs. We study several kinds of trajectories, including on-line game traces, mouse traces, handwritten characters, and traces of the movements of animals in their natural environments. The proposed approach, which does not require any extra action by account users, is designed to prevent the possible copying or duplication of information by unauthorized users or automatic programs, such as bots. Specifically, the approach focuses on finding the hidden patterns embedded in the trajectories produced by account users. We utilize a Markov chain model with a Gaussian distribution in its transition to describe trajectory behavior. To distinguish between two trajectories, we introduce a novel dissimilarity measure combined with a manifold learned tuning technique to capture the pairwise relationship between the two trajectories. Based on that pairwise relationship, we plug-in effective classification or clustering methods to detect attempts to gain unauthorized access. The method can also be applied to the task of recognition, and used to predict the type of trajectory without the user's predefined identity. Our experiment results demonstrate that, the proposed method can perform better, or is competitive to existing state-of-the-art approaches, for both of the verification and recognition tasks.
机译:对于许多计算机活动,在系统授权访问之前,必须先进行用户验证。验证的目的是将真实的帐户所有者与入侵者或不法之徒区分开。在本文中,我们提出了一种基于用户轨迹的通用用户验证方法。轨迹由一系列协调的输入组成。我们研究了几种轨迹,包括在线游戏轨迹,鼠标轨迹,手写字符以及动物在自然环境中的运动轨迹。提议的方法不需要帐户用户采取任何额外的措施,旨在防止未经授权的用户或自动程序(例如漫游器)复制或复制信息。具体来说,该方法着重于找到嵌入在帐户用户产生的轨迹中的隐藏模式。我们利用马尔可夫链模型在过渡过程中具有高斯分布来描述轨迹行为。为了区分两条轨迹,我们引入了一种新颖的相异性测度,并结合了多种学习的调整技术来捕获两条轨迹之间的成对关系。基于这种成对关系,我们插入了有效的分类或聚类方法来检测尝试进行未经授权的访问。该方法还可以应用于识别任务,并用于在没有用户预定义身份的情况下预测轨迹的类型。我们的实验结果表明,对于验证和识别任务,所提出的方法可以执行得更好,或与现有的最新方法竞争。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号