Observing Consistency in Online Communication Patterns for User Re-Identification

被引:13
作者
Adeyemi, Ikuesan Richard [1 ,2 ]
Razak, Shukor Abd [1 ]
Salleh, Mazleena [1 ]
Venter, Hein S. [2 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Informat Assurance & Secur Res Grp, Skudai, Johor Bahru, Malaysia
[2] Univ Pretoria, Informat & Comp Secur Architecture Res Grp, Dept Comp Sci, Lynnwood, South Africa
关键词
TIME;
D O I
10.1371/journal.pone.0166930
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role in online user identification, online profile development, and recommender systems. However, building a characteristic model of human dynamics on the Internet involves a complete analysis of the variations in human activity patterns, which is a complex process. This complexity is inherent in human dynamics and has not been extensively studied to reveal the structural composition of human behavior. A typical method of anatomizing such a complex system is viewing all independent inter-connectivity that constitutes the complexity. An examination of the various dimensions of human communication pattern in online interactions is presented in this paper. The study employed reliable server-side web data from 31 known users to explore characteristics of human-driven communications. Various machine-learning techniques were explored. The results revealed that each individual exhibited a relatively consistent, unique behavioral signature and that the logistic regression model and model tree can be used to accurately distinguish online users. These results are applicable to one-to-one online user identification processes, insider misuse investigation processes, and online profiling in various areas.
引用
收藏
页数:27
相关论文
共 32 条
[1]  
Abramson M., 2013, 2013 AAAI Fall Symposium Series
[2]  
Abramson M, 2013, P 26 INT FLOR ART IN, P268
[3]  
Adeyemi IR, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P198, DOI 10.1109/ISBAST.2014.7013121
[4]  
Amatriain X, 2011, RECOMMENDER SYSTEMS HANDBOOK, P39, DOI 10.1007/978-0-387-85820-3_2
[5]  
[Anonymous], NEW TRAFFIC MODEL CU
[6]  
Banse C, 2012, IFIP ADV INF COMM TE, V376, P235
[7]   The origin of bursts and heavy tails in human dynamics [J].
Barabási, AL .
NATURE, 2005, 435 (7039) :207-211
[8]   CHARACTERIZING BROWSING STRATEGIES IN THE WORLD-WIDE-WEB [J].
CATLEDGE, LD ;
PITKOW, JE .
COMPUTER NETWORKS AND ISDN SYSTEMS, 1995, 27 (06) :1065-1073
[9]   Dynamics of information access on the web [J].
Dezso, Z. ;
Almaas, E. ;
Lukacs, A. ;
Racz, B. ;
Szakadat, I. ;
Barabasi, A. -L. .
PHYSICAL REVIEW E, 2006, 73 (06)
[10]  
Ester M., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P226