• DocumentCode
    3585487
  • Title

    A Kind of Identity Authentication Method Based on Browsing Behaviors

  • Author

    Junzhu Zhong ; Chungang Yan ; Wangyang Yu ; Peihai Zhao ; Mimi Wang

  • Author_Institution
    Dept. of Comput. Sci. & Technol., Tongji Univ., Shanghai, China
  • Volume
    2
  • fYear
    2014
  • Firstpage
    279
  • Lastpage
    284
  • Abstract
    Due to the continued growth threat in Phishing, a kind of stable identity authentication method is highly needed based on individual characteristics just like browsing behaviors. Most of the existing researches focused on browsing behavior patterns of group users are used in personal recommendation, website structure optimization or web prediction. In order to ensure the validity of user identity and the security of e-commerce, we construct personalized user browsing behavior model based on ARM (Association Rule Mining) from Web usage log. We compare real-time browsing behaviors with history model to identify a user´s real identity in Web pages accessed. According to the results of the experiments, for the illegal users, this method can attain 91.3% detection rate with below 10% false alarm rate. Thus, it can achieve high real-time and recognition efficiency.
  • Keywords
    Internet; Web sites; computer crime; data mining; electronic commerce; message authentication; ARM; Web usage log; association rule mining; browsing behavior pattern; e-commerce security; identity authentication method; personal recommendation; phishing; Association rules; Authentication; Classification algorithms; Decision trees; Real-time systems; Web pages; identity authentication; user browsing behavior model; web usage log;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on
  • Print_ISBN
    978-1-4799-7004-9
  • Type

    conf

  • DOI
    10.1109/ISCID.2014.205
  • Filename
    7081989