RESEARCH ON SOFTWARE USER BEHAVIOR CREDIBILITY ANALYSIS MODEL BASED ON MULTI-STRATEGY LEARNING ALGORITHM

被引:0
|
作者
Yu, Xuejun [1 ]
Liu, Yang [2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing, Peoples R China
[2] Beijing Univ Technol, Fac Informat Technol, Software Engn, Beijing, Peoples R China
关键词
software credibility; feature extraction; user behavior; ensemble learning;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is necessary to evaluate the credibility of software user behavior for the timely identification and control of abnormal user behavior risks in order to ensure the security of the software system and the credibility of user behavior. The user behavior log dataset is generated by using the simulated county and city government office system, and the credibility analysis algorithm model of numerous individual learning and ensemble learning are constructed to evaluate the effect of the credibility analysis model in the study, and by comparing and analyzing the heterogeneous ensemble learning algorithm models of different combinations, the accuracy of software user behavior credibility analysis has been improved to more than 97%. This study shows that the model is able to identify untrusted users in a flexible yet accurate manner and guarantees the security of the fixed domain work system.
引用
收藏
页码:15 / 26
页数:12
相关论文
共 50 条
  • [21] Improved Seagull Optimization Algorithm Based on Multi-Strategy Integration
    Shi, Haibin
    Li, Baoda
    2022 34TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2022, : 2234 - 2239
  • [22] Research on UAV Path Planning Based on an Improved Dwarf Mongoose Algorithm with Multi-strategy Fusion
    Wang, Haocheng
    Zhang, Yu
    Xu, Sitong
    Wang, Fangchao
    Chen, Baolong
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT I, ICIC 2024, 2024, 14862 : 348 - 359
  • [23] Sina Microblog Big Data Grabbing and Analysis based on Multi-strategy Model
    Sun, Xiao
    Ye, Jia-qi
    Tang, Chen-yi
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [24] Dynamic multi-strategy integrated differential evolution algorithm based on reinforcement learning for optimization problems
    Yang, Qingyong
    Chu, Shu-Chuan
    Pan, Jeng-Shyang
    Chou, Jyh-Horng
    Watada, Junzo
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (02) : 1845 - 1877
  • [25] Dynamic multi-strategy integrated differential evolution algorithm based on reinforcement learning for optimization problems
    Qingyong Yang
    Shu-Chuan Chu
    Jeng-Shyang Pan
    Jyh-Horng Chou
    Junzo Watada
    Complex & Intelligent Systems, 2024, 10 : 1845 - 1877
  • [26] Optimization of WSN localization algorithm based on improved multi-strategy seagull algorithm
    Yu, Xiuwu
    Liu, Yinhao
    Liu, Yong
    TELECOMMUNICATION SYSTEMS, 2024, 86 (03) : 547 - 558
  • [27] Analysis and research on library user behavior based on apriori algorithm
    Zhang X.
    Zhang J.
    Measurement: Sensors, 2023, 27
  • [28] DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
    Li, Chunhui
    Wang, Xiaoying
    Zhang, Qingjie
    Liang, Jiaye
    Zhang, Aijing
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (01): : 645 - 674
  • [29] Path Exploration Strategy for Symbolic Execution based on Multi-strategy Active Learning
    He, Lianying
    Zhang, Dalin
    Zhu, Dongqing
    Zhang, Junwen
    Wang, Rui
    Liu, Jiqiang
    PROCEEDINGS OF THE 15TH ASIA-PACIFIC SYMPOSIUM ON INTERNETWARE, INTERNETWARE 2024, 2024, : 165 - 168
  • [30] A self-learning particle swarm optimization algorithm with multi-strategy selection
    Sun, Bo
    Li, Wei
    Zhao, Yue
    Huang, Ying
    EVOLUTIONARY INTELLIGENCE, 2023, 16 (05) : 1487 - 1502