Identification of trusted interactive behavior based on mouse behavior considering web User's emotions

被引:8
|
作者
Yi, Qian [1 ]
Xiong, Shiquan [2 ]
Wang, Biao [2 ]
Yi, Shuping [2 ]
机构
[1] Chongqing Univ, Dept Mech Design & Mfg, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Dept Ind Engn, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Mouse behavior characteristics; Trusted interaction; Behavior pattern; Emotional response; Big data; RECOGNITION; DESIGN;
D O I
10.1016/j.ergon.2019.102903
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Under existing network security technology, it is still possible for hackers to impersonate legitimate users and invade a system for malicious destruction. Therefore, this study constructs a user's unique mouse behavior pattern to identify a trusted interaction behavior in a real environment and quantify the effects of different emotions on mouse behavior and the accuracy of the user's trusted interaction behavior identification. First, mouse data was collected for 8 user's trusted interactions on an academic study website (AML). These data were used to construct the basic trusted interaction model by a big data analysis method called a random forest. Second, in a repeated measurement experiment, 18 participants completed tasks on the AML under different emotions, and the emotions' impact on the mouse behavior and accuracy of the user's trusted interaction identification was analyzed. In the results, the accuracy of the trusted interaction behavior identification based on mouse behavior reached 91.82%, and the error rate was lower than 8.18%. Significant differences were observed in horizontal velocity, velocity, and traveled distance under different emotions. However, there was no significant difference in the accuracy of a user's trusted interaction behavior identification under different emotions. Based on these results, the trusted interaction behavior of web users can be accurately identified based on the user's mouse behavior pattern. The user's mouse behavior differs under different emotions, but there is no significant difference on the identification of the user's trusted interaction behavior. The findings help to provide another protection layer for network information security.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] The Prediction of Web User's Behavior Based on Web Usage Mining
    Bai Xiaoli
    Chen Fei
    2010 ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2010), 2010, : 32 - 35
  • [2] User behavior identification and personalized recommendation based on web data mining
    Wang Y.
    International Journal of Circuits, Systems and Signal Processing, 2021, 15 : 651 - 660
  • [3] User behavior under the microscope - Can the behavior indicate a Web user's task?
    Gutschmidt, Anne
    Cap, Clemens H.
    WEBIST 2008: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2008, : 215 - 222
  • [4] Research on Trusted Evaluation Method of User Behavior Based on AHP Algorithm
    Ma, Jie
    Zhang, Yongsheng
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 588 - 592
  • [5] The impact of user's dynamic behavior on web performance
    Pena-Ortiz, Raul
    Gil, Jose A.
    Sahuquillo, Julio
    Pont, Ana
    2012 11TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2012, : 143 - 150
  • [6] User's Emotion Profiling in Web Browsing Behavior
    Yoshida, Yusuke
    Masuda, Kana
    Takano, Kosuke
    Li, Kin Fun
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, INCOS-2022, 2022, 527 : 1 - 8
  • [7] WEB USER PROFILING BASED ON BROWSING BEHAVIOR ANALYSIS
    Fan, Xiao-Xi
    Chow, Kam-Pui
    Xu, Fei
    ADVANCES IN DIGITAL FORENSICS X, 2014, 433 : 57 - 71
  • [8] User Classification Algorithm Based on Web Browsing Behavior
    Wan, Hongxin
    Peng, Yun
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 57 - 62
  • [9] User Behavior Analysis Based on User Interest by Web Log Mining
    Luo, Xipei
    Wang, Jing
    Shen, Qiwei
    Wang, Jingyu
    Qi, Qi
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 486 - 490
  • [10] User behavior on an interactive computer system
    Boies, SJ
    IBM SYSTEMS JOURNAL, 1999, 38 (2-3) : 162 - 179