信息网络安全 ›› 2021, Vol. 21 ›› Issue (3): 44-52.doi: 10.3969/j.issn.1671-1122.2021.03.006

• 技术研究 • 上一篇    下一篇

一种基于用户行为模式的匿名数据鉴定方法

刘延华1,2(), 刘志煌1,2   

  1. 1.福州大学数学与计算机科学学院,福州 350108
    2.福建省网络计算与智能信息处理重点实验室,福州 350108
  • 收稿日期:2020-10-12 出版日期:2021-03-10 发布日期:2021-03-16
  • 通讯作者: 刘延华 E-mail:lyhwa@fzu.edu.cn
  • 作者简介:刘延华(1972—),男,山东,副教授,博士,主要研究方向为网络空间安全、智能计算及应用|刘志煌(1998—),男,福建,硕士研究生,主要研究方向为网络空间安全、数据分析与可视化
  • 基金资助:
    国家自然科学基金(61772136);福建省大数据应用技术重大研发平台项目(2014H2005);福建省科技厅重点项目(2014H0024)

An Anonymous Data Authentication Method Based on User Behavior Pattern

LIU Yanhua1,2(), LIU Zhihuang1,2   

  1. 1. College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China
    2. Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou 350108, China
  • Received:2020-10-12 Online:2021-03-10 Published:2021-03-16
  • Contact: LIU Yanhua E-mail:lyhwa@fzu.edu.cn

摘要:

针对匿名用户数据的海量性与冗余性等特点,为提高数字证据的用户身份鉴定性能,文章提出基于用户行为模式的匿名数据鉴定方法。首先,文章研究了基于BIDE算法的用户频繁行为模式挖掘方法,为数据鉴定提供了高质量的用户频繁序列行为模式库。然后,采用基于最长公共子序列的相似度方法得到模式综合相似度,全面描述用户数据之间的吻合程度。最后,分别使用Web浏览数据集和Unix操作命令行数据集进行实验,结果表明,文章所提出的数字证据鉴定方法具有良好的适用性和计算效率,为匿名数据的同一鉴定提供了技术支撑。

关键词: 数据鉴定, 数字证据, BIDE, 用户行为模式, 相似度

Abstract:

Aiming at the characteristics of massive and redundant anonymous user data, in order to improve the performance of user identification based on digital evidence, this paper proposes an anonymous data authentication method based on user behavior pattern. Firstly, this paper studies the mining method of frequent user behavior patterns based on BIDE algorithm, which provides a high-quality user frequent sequence behavior pattern library for data authentication. Then, the similarity method based on the longest common subsequence is used to obtain the comprehensive similarity of patterns, which can comprehensively describe the matching degree between user data. Finally, experiments are carried out using Web browsing data set and Unix operating command line data set. The results show that the proposed digital evidence authentication method has good applicability and computational efficiency, which provides technical support for the same authentication of anonymous data.

Key words: data authentication, digital evidence, BIDE, user behavior pattern, similarity

中图分类号: