Jing Xu, F. Xu, Fanshu Ma, Lei Zhou, Shuanglin Jiang, Zhibo Rao
{"title":"从代理日志中挖掘Web使用概况:用户识别","authors":"Jing Xu, F. Xu, Fanshu Ma, Lei Zhou, Shuanglin Jiang, Zhibo Rao","doi":"10.1109/DSC49826.2021.9346276","DOIUrl":null,"url":null,"abstract":"Personal web-surfing habits of individual users vary drastically. Thus, the selection and frequency of requested URLs can be viewed as an individual finger-print allowing to identify a user, which has many security and target marketing applications. In this paper, to model web usage, we derive web usage profiles for each user and employ instance-based classification methods to predict the most likely user in the monitored network. Thus, the proposed methods are scalable for large numbers of users. In our experimental evaluation, the accuracy of user identification is verified.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Mining Web Usage Profiles from Proxy Logs: User Identification\",\"authors\":\"Jing Xu, F. Xu, Fanshu Ma, Lei Zhou, Shuanglin Jiang, Zhibo Rao\",\"doi\":\"10.1109/DSC49826.2021.9346276\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Personal web-surfing habits of individual users vary drastically. Thus, the selection and frequency of requested URLs can be viewed as an individual finger-print allowing to identify a user, which has many security and target marketing applications. In this paper, to model web usage, we derive web usage profiles for each user and employ instance-based classification methods to predict the most likely user in the monitored network. Thus, the proposed methods are scalable for large numbers of users. In our experimental evaluation, the accuracy of user identification is verified.\",\"PeriodicalId\":184504,\"journal\":{\"name\":\"2021 IEEE Conference on Dependable and Secure Computing (DSC)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Conference on Dependable and Secure Computing (DSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DSC49826.2021.9346276\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSC49826.2021.9346276","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mining Web Usage Profiles from Proxy Logs: User Identification
Personal web-surfing habits of individual users vary drastically. Thus, the selection and frequency of requested URLs can be viewed as an individual finger-print allowing to identify a user, which has many security and target marketing applications. In this paper, to model web usage, we derive web usage profiles for each user and employ instance-based classification methods to predict the most likely user in the monitored network. Thus, the proposed methods are scalable for large numbers of users. In our experimental evaluation, the accuracy of user identification is verified.