Trajectory based behavior analysis for user verification

  • Authors:
  • Hsing-Kuo Pao;Hong-Yi Lin;Kuan-Ta Chen;Junaidillah Fadlil

  • Affiliations:
  • Dept. of Computer Science & Information Engineering, National Taiwan University of Science & Technology, Taipei, Taiwan;Dept. of Computer Science & Information Engineering, National Taiwan University of Science & Technology, Taipei, Taiwan;Institute of Information Science, Academia Sinica, Taipei, Taiwan;Dept. of Computer Science & Information Engineering, National Taiwan University of Science & Technology, Taipei, Taiwan

  • Venue:
  • IDEAL'10 Proceedings of the 11th international conference on Intelligent data engineering and automated learning
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a general approach for user verification based on user trajectory inputs. The approach is labor-free for users and is likely to avoid the possible copy or simulation from other non-authorized users or even automatic programs like bots. Our study focuses on finding the hidden patterns embedded in the trajectories produced by account users.We employ a Markov chain model with Gaussian distribution in its transitions to describe the behavior in the trajectory. To distinguish between two trajectories, we propose a novel dissimilarity measure combined with a manifold learnt tuning for catching the pairwise relationship. Based on the pairwise relationship, we plug-in any effective classification or clustering methods for the detection of unauthorized access. The method can also be applied for the task of recognition, predicting the trajectory type without pre-defined identity. Given a trajectory input, the results show that the proposed method can accurately verify the user identity, or suggest whom owns the trajectory if the input identity is not provided.