A Novel RNN Model with Enhanced Behavior Semantic for Network User Profile

被引:0
作者
Li, Ming [1 ]
Han, Xingwang [1 ]
Sheng, Hua [1 ]
Ma, Lin [1 ]
Kong, Hanzhang [1 ]
Liu, Weite [1 ]
Mao, Bo [2 ]
机构
[1] State Grid Shandong Elect Power Co, Jinan, Peoples R China
[2] Nanjing Univ Finance & Econ, Nanjing, Peoples R China
来源
2022 TENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, CBD | 2022年
关键词
User Profile; Behavior Modelling; RNN; Semantic mapping;
D O I
10.1109/CBD58033.2022.00041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User profile is an essential task especially in zero trust network. It can be used to evaluate the security level of the system by separating the normal users from the attackers. In this paper, we propose a network user profile method based on semantic behavior modelling and Recurrent Neural Network (RNN). The user behavior in the network is enhanced with semantic detection and the semantic features include source, target, content and time. The semantic mapping is implemented with the predefined tags, and the overall behavior trajectory of the user in the network will be further classified to different types (normal users or attackers) with RNN algorithm. According to the experiment results, the proposed method shows a good performance in the user profile task. The overall accuracy is increased by 17% compared with the method without semantic information.
引用
收藏
页码:190 / 193
页数:4
相关论文
共 11 条
  • [1] Adib J., 2022, PROCEDIA COMPUT SCI, V198, P417, DOI [10.1016/j.procs.2021.12.263, DOI 10.1016/J.PROCS.2021.12.263]
  • [2] Flexibility management of electric vehicles based on user profiles: The Arnhem case study
    Canigueral, Marc
    Mlendez, Joaquim
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 133 (133)
  • [3] Web attack detection using deep learning models
    Eunaicy, J. I. Christy
    Suguna, S.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4806 - 4813
  • [4] A novel zero-trust network access control scheme based on the security profile of devices and users
    Garcia-Teodoro, P.
    Camacho, J.
    Macia-Fernandez, G.
    Gomez-Hernandez, J. A.
    Lopez-Marin, V. J.
    [J]. COMPUTER NETWORKS, 2022, 212
  • [5] User profiling via application usage pattern on digital devices for digital forensics
    Kwon, Hongkyun
    Lee, Sangjin
    Jeong, Doowon
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 168
  • [6] Nasir J.A., 2021, INT J INFORM MANAGEM, V1, P1, DOI [DOI 10.1016/J.JJIMEI.2020.100007, 10.1016/j.jjimei.2020.100007]
  • [7] Human identification based on accelerometer sensors obtained by mobile phone data
    Oguz, Abdulhalik
    Ertugrul, Omer Faruk
    [J]. BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2022, 77
  • [8] Item feature refinement using matrix factorization and boosted learning based user profile generation for content-based recommender systems
    Pujahari, Abinash
    Sisodia, Dilip Singh
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 206
  • [9] Optimized recommendations by user profiling using apriori algorithm
    Singh, Pradeep Kumar
    Othman, Esam
    Ahmed, Rafeeq
    Mahmood, Awais
    Dhahri, Habib
    Choudhury, Prasenjit
    [J]. APPLIED SOFT COMPUTING, 2021, 106
  • [10] A deep recurrent neural network approach to learn sequence similarities for user-identification
    Vamosi, Stefan
    Reutterer, Thomas
    Platzer, Michael
    [J]. DECISION SUPPORT SYSTEMS, 2022, 155