DocumentCode :
3585487
Title :
A Kind of Identity Authentication Method Based on Browsing Behaviors
Author :
Junzhu Zhong ; Chungang Yan ; Wangyang Yu ; Peihai Zhao ; Mimi Wang
Author_Institution :
Dept. of Comput. Sci. & Technol., Tongji Univ., Shanghai, China
Volume :
2
fYear :
2014
Firstpage :
279
Lastpage :
284
Abstract :
Due to the continued growth threat in Phishing, a kind of stable identity authentication method is highly needed based on individual characteristics just like browsing behaviors. Most of the existing researches focused on browsing behavior patterns of group users are used in personal recommendation, website structure optimization or web prediction. In order to ensure the validity of user identity and the security of e-commerce, we construct personalized user browsing behavior model based on ARM (Association Rule Mining) from Web usage log. We compare real-time browsing behaviors with history model to identify a user´s real identity in Web pages accessed. According to the results of the experiments, for the illegal users, this method can attain 91.3% detection rate with below 10% false alarm rate. Thus, it can achieve high real-time and recognition efficiency.
Keywords :
Internet; Web sites; computer crime; data mining; electronic commerce; message authentication; ARM; Web usage log; association rule mining; browsing behavior pattern; e-commerce security; identity authentication method; personal recommendation; phishing; Association rules; Authentication; Classification algorithms; Decision trees; Real-time systems; Web pages; identity authentication; user browsing behavior model; web usage log;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on
Print_ISBN :
978-1-4799-7004-9
Type :
conf
DOI :
10.1109/ISCID.2014.205
Filename :
7081989
Link To Document :
بازگشت