×

A closed sets based learning classifier for implicit authentication in web browsing. (English) Zbl 1430.68263

Summary: Faced with both identity theft and the theft of means of authentication, users of digital services are starting to look rather suspiciously at online systems. To increase access security it is necessary to introduce some new factor of implicit authentication such as user behavior analysis. A behavior is made up of a series of observable actions and taken as a whole, the most frequent of these actions amount to habit. The challenge is to detect identity theft as quickly as possible and, reciprocally, to validate a legitimate identity for as long as possible. To take up this challenge, we introduce in this paper a closed set-based learning classifier. This classifier is inspired by classification in concept lattices from positive and negative examples and several works on emerging patterns. We also rely on the tf-idf parameter used in the context of information retrieval. We propose three heuristics named \(H_{\text{tf-idf}}^c, H_{\mathrm{sup}}^c\) and \(H_{\mathrm{supMin}}^c\) to select closed patterns for each class to be described. To compute performance of our models we have followed an experimental protocol described in a previous study which had the same purpose. Then, we compared the results from our own dataset of web navigation connection logs of 3,000 users over a six-month period with the heuristic \(H_{\mathrm{sup}}\) introduced in this study. Moreover, to strengthen our analysis, we have designed and set up one model based on the naive Bayes classifier to be used as a reference statistical tool.

MSC:

68T05 Learning and adaptive systems in artificial intelligence
68T20 Problem solving in the context of artificial intelligence (heuristics, search strategies, etc.)
94A62 Authentication, digital signatures and secret sharing

Software:

SPADE; CORON
PDFBibTeX XMLCite
Full Text: DOI Link

References:

[1] M. Abramson, D.W. Aha, User authentication from web browsing behavior, in: Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, 2013, pp. 268-273.
[2] A. Buzmakov, S. Kuznetsov, A. Napoli, On evaluating interestingness measures for closed itemsets, in: 7th European starting AI researcher symposium, STAIRS 2014, vol. 264, 2014, pp. 71-80.
[3] Filson, D., The impact of e-commerce strategies on firm value: Lessons from Amazon.com and its early competitors, J. Bus., 77, S2, S135-S154 (2004)
[4] Finn, V., Plausible reasonning in systems of JSM-type, Itogi Nauki Tekh., Inform, 15, 54-101 (1991)
[5] Ganter, B.; Wille, R., Formal Concept Analysis — Mathematical Foundations (1999), Springer · Zbl 0909.06001
[6] García-Borroto, M.; Martínez-Trinidad, J.; Carrasco-Ochoa, J., A survey of emerging patterns for supervised classification, Artif. Intell. Rev., 42, 4, 705-721 (2014)
[7] S. Goel, J.M. Hofman, M.I. Sirer, Who does what on the web: a large-scale study of browsing behavior, in: ICWSM, 2012.
[8] C.I. Guvence-Rodoper, I. Benbasat, R.T. Cenfetelli, Adoption of B2B exchanges: Effects of IT-mediated website services, website functionality, benefits, and costs, in: ICIS 2008 Proceedings, 2008.
[9] He, R.; Yuan, M.; Hu, J.; Zhang, H.; Kan, Z.; Ma, J., A novel service-oriented AAA architecture, (Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on, vol. 3 (2003), IEEE), 2833-2837
[10] Herrmann, D.; Banse, C.; Federrath, H., Behavior-based tracking: Exploiting characteristic patterns in DNS traffic, Comput. Secur., 1-17 (2013)
[11] M. Klimushkin, S.A. Obiedkov, C. Roth, Approaches to the selection of relevant concepts in the case of noisy data, in: Formal Concept Analysis, 8th International Conference, ICFCA 2010, Agadir, Morocco, March 15-18, 2010. Proceedings, 2010, pp. 255-266. · Zbl 1274.68489
[12] Kumar, R.; Tomkins, A., A characterization of online browsing behavior, (Proceedings of the 19th International Conference on World Wide Web (2010), ACM), 561-570
[13] Kuznetsov, S. O., Complexity of learning in concept lattices from positive and negative examples, Discrete Appl. Math., 142, 1-3, 111-125 (2004) · Zbl 1077.68039
[14] Kuznetsov, S. O., Machine learning and formal concept analysis, (Eklund, P., Proceedings Second International Conference on Formal Concept Analysis, Lecture note in Artificial Intelligence, vol. 2961 (2004)), 287-312 · Zbl 1198.68194
[15] Kuznetsov, S. O., On stability of a formal concept, Ann. Math. Artif. Intell., 49, 1-4, 101-115 (2007) · Zbl 1129.68086
[16] Kuznetsov, S. O.; Makhalova, T. P., On interestingness measures of formal concepts, Inform. Sci., 442-443, 202-219 (2018) · Zbl 1440.68282
[17] Lagier, F., Cybercriminalité : 120.000 victimes d’usurpation d’identité chaque année en france (2013), Le populaire du centre, (in French)
[18] Novak, P. K.; Lavrač, N.; Webb, G. I., Supervised descriptive rule discovery: A unifying survey of contrast set, emerging pattern and subgroup mining, J. Mach. Learn. Res., 10, 377-403 (2009) · Zbl 1235.68178
[19] Ramamohanarao, K.; Fan, H., Patterns based classifiers, World Wide Web, 10, 1, 71-83 (2007)
[20] Salton, G., Automatic Text Processing: the Transformation, Analysis and Retrieval of Information by Computer (1989), Addison Wesley
[21] E. Shi, Y. Niu, M. Jakobsson, R. Chow, Implicit authentication through learning user behavior, in: Information Security — 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, 2010, pp. 99-113.
[22] Srikant, R.; Agrawal, R., Mining Sequential Patterns: Generalizations and Performance Improvements (1996), Springer
[23] Stockinger, T., Implicit authentication on mobile devices, (The Media Informatics Advanced Seminar on Ubiquitous Computing (2011))
[24] Szathmary, L., Symbolic Data Mining Methods with the Coron Platform (2006), University Henri Poincaré - Nancy 1: University Henri Poincaré - Nancy 1 France, (Ph.D. thesis in computer science)
[25] I. Ullah, G. Bonnet, G. Doyen, D. Gaïti, Un classifieur du comportement des utilisateurs dans les applications pair-à-pair de streaming vidéo, in: CFIP 2011 — Colloque Francophone sur l’Ingénierie des Protocoles, 2011 (in French).
[26] Yang, Y. C., Web user behavioral profiling for user identification, Decis. Support Syst., 49, 3, 261-271 (2010)
[27] Zaki, M. J., SPADE: an efficient algorithm for mining frequent sequences, Mach. Learn., 42, 1-2, 31-60 (2001) · Zbl 0970.68052
[28] Zaki, M. J.; Hsiao, C., Efficient algorithms for mining closed itemsets and their lattice structure, IEEE Trans. Knowl. Data Eng., 17, 4, 462-478 (2002)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.