计算机科学 ›› 2019, Vol. 46 ›› Issue (3): 180-187.doi: 10.11896/j.issn.1002-137X.2019.03.027
李志,马春来,马涛,单洪
LI Zhi, MA Chun-lai, MA Tao, SHAN Hong
摘要: 针对当前轨迹异常检测中轨迹演化和检测结果类型单一的问题,结合用户历史行为模式、群体结构信息和近邻用户行为,提出一种基于位置信息的移动终端用户异常检测方法。该方法将位置数据转换为时空共现区,进一步挖掘用户行为模式,提取用户群体结构信息。在此基础上,根据历史行为模式异常、伴随行为模式异常、时空共现区行为模式异常、时空共现区流量模式异常和异常用户群体属性5种异常特征,采用随机森林方法构建多分类异常检测模型,识别移动终端用户个体异常、群体异常、时空异常和事件异常现象。在真实数据集上的实验结果表明,所提方法可以有效识别移动终端用户的轨迹演化行为,检测多种类型的异常现象,与同类方法相比具有较高的召回率和较低的误差率。
中图分类号:
[1]SHIKHA A,JITENDRA A.Survey on Anomaly Detection using Data Mining Techniques[J].Procedia Computer Science,2015,60(1):708-713. [2]LIU T B,LIU S P.Fraud detection model & application for credit card acquiring business based on data mining technology[C]∥4th International Conference on Electrical & Electronics Engineering and Computer Science.Atlantis Press,2016. [3]CHRISTIANA I,VASOS V,CHARALAMPOS S.An Intrusion Detection System for Wireless Sensor Networks[C]∥International Conference on Telecommunications.2017. [4]ZHOU J,YANG Y,DING S,et al.A Fault Detection and Health Monitoring Scheme for Ship Propulsion Systems using SVM Technique[J].IEEE Access,2018,PP(99):1. [5]WANG T,HICHEM S.Detection of Abnormal Visual Events via Global Optical Flow Orientation Histogram[J].IEEE Transa-ctions on Information Forensics & Security,2014,9(6):988-998. [6]LI A,MIAO Z J,CEN Y G,et al.Anomaly detection using sparse reconstruction in crowded scenes[J].Multimedia Tools &Applications,2017,76(24):26249-26271. [7]ANIND D,JEFFREY H,EYALDE L,et al.Location-Based Services[J].IEEE Pervasive Computing,2017,9(1):11-12. [8]MAO J L,JIN C Q,ZHANG Z G,et al.Anomaly detection for trajectory big data:Advancements and framework[J].Journal of Software,2017,28(1):17-34.(in Chinese) 毛嘉莉,金澈清,章志刚,等.轨迹大数据异常检测:研究进展及系统框架[J].软件学报,2017,28(1):17-34. [9]ZHENG Y U,LIU Y C,YUAN J,et al.Urban computing with taxicabs[C]∥International Conference on Ubiquitous Computing.ACM,2011. [10]ZHENG Y.Urban computing and large data[J].Communication of China Computer Federation,2013,9(8):8-18.(in Chinese) 郑宇.城市计算与大数据[J].中国计算机学会通讯,2013,9(8):8-18. [11]LIU H P,JIN C Q,ZHOU A Y.Popular Route Planning with Travel Cost Estimation[C]∥Proceedings,Part II,of the 21st International Conference on Database Systems for Advanced Applications-Volume 9643.2016. [12]DUAN X Y,JIN C Q,WANG X L,et al.Real-Time Personali- zed Taxi-Sharing[M].Springer International Publishing,2016. [13]PANG L,CHAWLA S,LIU W,et al.On detection of emerging anomalous traffic patterns using GPS data[J].Data & Know-ledge Engineering,2013,87(9):357-373. [14]REN M Q,SONG R X,WANG M,et al.Detection of Students’ Abnormal Behavior in the Intelligent Campus[J].Natural Science Journal of Harbin Normal University,2017,33(3):20-24.(in Chinese) 任孟其,宋汝鑫,王萌,等.面向智慧校园的学生异常行为检测[J].哈尔滨师范大学自然科学学报,2017,33(3):20-24. [15]DONGHER S,MINGHUNG S,DAVIDC Y,et al.Personal mobility pattern mining and anomaly detection in the GPS era[J].American Cartographer,2016,43(1):55-67. [16]YANG S,ZHOU W B.Anomaly Detection on Collective Moving Patterns:Manifold Learning Based Analysis of Traffic Streams[C]∥IEEE Third International Conference on Privacy,Security,Risk and Trust.2012. [17]PAN B,ZHENG Y,WILKIE D,et al.Crowd sensing of traffic anomalies based on human mobility and social media[C]∥ACM Sigspatial International Conference on Advances in Geographic Information Systems.2013. [18]PANG L,CHAWLA S,LIU W,et al.On detection of emerging anomalous traffic patterns using GPS data[J].Data & Know-ledge Engineering,2013,87(9):357-373. [19]EUNJOON C,SETHA M,JURE L.Friendship and mobility:user movement in location-based social networks[C]∥ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.San Diego,CA,USA,2011. [20]ZHAO G Z,QI J P,YU Y W,et al.Online check-in exception detection in mobile social networking[J].CAAI Transactions on Intelligent Systems,2017,12(5):752-759.(in Chinese) 赵冠哲,齐建鹏,于彦伟,等.移动社交网络异常签到在线检测算法[J].智能系统学报,2017,12(5):752-759. [21]YU Y W,CAO L,ELKEA R,et al.Detecting moving object outliers in massive-scale trajectory streams[C]∥ACM SIGKDD International Conference on Knowledge Discovery and Data Mi-ning.2014:422-431. [22]CRANDALL D J,BACKSTROM L,COSLEY D,et al.Inferring social ties from geographic coincidences[J].Proceedings of the National Academy of Sciences of the United States of America,2010,107(52):22436-22441. [23]TAN R,GU J Z,CHEN P,et al.Link Prediction Using Protected Location History[C]∥Fifth International Conference on Computational and Information Sciences.IEEE,2013. [24]RODRIGUEZ A,LAIO A.Machine learning.Clustering by fast search and find of density peaks[J].Science,2014,344(6191):1492. [25]LIM K,CHAN J,LECKIE C,et al.Detecting Location-centric Communities using Social-Spatial Links with Temporal Constraints[C]∥European Conference on Information Retrieval.2015. [26]CHLO B,VINCENZO N,SALVATORE S,et al.Social and place-focused communities in location-based online social networks[J].European Physical Journal B,2013,86(6):1-10. [27]VISHNU J,KINSHUK B,ANSHU K,et al.Discovering Local Social Groups using Mobility Data[J].International Journal of Computer Applications,2015,120:15-19. [28]MA C L,SHAN H,MA T,et al.An Improved Random Forests Algorithm with Application to Social Ties Inferring of LBS Users[J].Journal of Chinese Computer Systems,2016,37(12):2708-2712.(in Chinese) 马春来,单洪,马涛,等.随机森林改进算法在LBS用户社会关系推断中的应用[J].小型微型计算机系统,2016,37(12):2708-2712. [29]CHEN J,WAN Y.Research on label propagation algorithm based on modularity maximization in the social network[J].Journal on Communications,2017,38(2):25-33.(in Chinese) 陈晶,万云.社交网络中基于模块度最大化的标签传播算法的研究[J].通信学报,2017,38(2):25-33. [30]WANG Z,ZHANG D Q,ZHOU X S,et al.Discovering and Profiling Overlapping Communities in Location-Based Social Networks[J].IEEE Transactions on Systems Man & Cybernetics Systems,2014,44(4):499-509. [31]GUO J,SONG P.Community Discovery with Location-Interaction Disparity in Mobile Social Networks[J].ZTE Communications,2015,13(2):53-61. [32]MA C L,SHAN H,MA T,et al.Random Forests Based Method for Inferring Social Ties of LBS Users[J].Computer Science,2016,43(12):218-222.(in Chinese) 马春来,单洪,马涛,等.一种基于随机森林的LBS用户社会关系判断方法[J].计算机科学,2016,43(12):218-222. [33]ZHENG Y,ZHANG H C,YU Y.Detecting collective anomalies from multiple spatio-temporal datasets across different domains[C]∥Sigspatial International Conference on Advances in Geographic Information Systems.Bellevue,WA,USA:ACM,2015. |
[1] | 于滨, 李学华, 潘春雨, 李娜. 基于深度强化学习的边云协同资源分配算法 Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning 计算机科学, 2022, 49(7): 248-253. https://doi.org/10.11896/jsjkx.210400219 |
[2] | 姚烨, 朱怡安, 钱亮, 贾耀, 张黎翔, 刘瑞亮. 一种基于异质模型融合的 Android 终端恶意软件检测方法 Android Malware Detection Method Based on Heterogeneous Model Fusion 计算机科学, 2022, 49(6A): 508-515. https://doi.org/10.11896/jsjkx.210700103 |
[3] | 吴成凤, 蔡莉, 李劲, 梁宇. 基于多源位置数据的居民出行频繁模式挖掘 Frequent Pattern Mining of Residents’ Travel Based on Multi-source Location Data 计算机科学, 2021, 48(7): 155-163. https://doi.org/10.11896/jsjkx.200800072 |
[4] | 蔡莉, 李英姿, 江芳, 梁宇. 面向城市热点区域的不平衡数据聚类挖掘研究 Study on Clustering Mining of Imbalanced Data Fusion Towards Urban Hotspots 计算机科学, 2019, 46(8): 16-22. https://doi.org/10.11896/j.issn.1002-137X.2019.08.003 |
[5] | 朱德利, 杨德刚, 胡蓉, 万辉. 适于移动终端字符识别环境的自适应多阈值二值化方法 Adaptive Multi-level Threshold Binaryzation Method for Optical Character Recognition in Mobile Environment 计算机科学, 2019, 46(8): 315-320. https://doi.org/10.11896/j.issn.1002-137X.2019.08.052 |
[6] | 石志凯,朱国胜. WF-C4.5:WiFi环境下基于C4.5决策树的手持终端流量识别方法 WF-C4.5:Handheld Terminal Traffic Identification Method Based on C4.5 Decision Tree in WiFi Environment 计算机科学, 2017, 44(Z6): 270-273. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.062 |
[7] | 冯谷,李尼格. 模型驱动的移动应用测试方法 Model-driven Testing for Mobile Applications 计算机科学, 2017, 44(11): 232-239. https://doi.org/10.11896/j.issn.1002-137X.2017.11.035 |
[8] | 董丽鹏 陈性元 杨英杰 石 旺. 网络隐蔽信道实现机制及检测技术研究 Implementation and Detection of Network Covert Channel 计算机科学, 2015, 42(7): 216-221. https://doi.org/10.11896/j.issn.1002-137X.2015.07.047 |
[9] | 崔建群,江 波,吴黎兵. 基于移动应用层组播终端主动反馈的自适应负载均衡机制研究 Research on Load Balancing Mechanism of Adaptive Mobile Application Layer Multicast Terminal Based on Feedback 计算机科学, 2015, 42(4): 40-43. https://doi.org/10.11896/j.issn.1002-137X.2015.04.006 |
[10] | 徐海浪,袁家斌. 面向移动终端的云监控研究 Research on Cloud Monitoring Oriented to Mobile Terminal 计算机科学, 2012, 39(8): 55-. |
[11] | . 移动终端三维用户界面的可用性评估 计算机科学, 2008, 35(2): 65-68. |
[12] | 章宏才 陈卫东. 移动终端实现网络远程管理的研究和设计 计算机科学, 2007, 34(9): 73-76. |
[13] | . 移动终端系统的访问控制框架 计算机科学, 2006, 33(6): 79-82. |
[14] | 谭劲 朱光喜. 基于GPRS网络的强一致性两级缓存系统框架 计算机科学, 2005, 32(8): 40-43. |
[15] | 李国徽. 基于层次组织位置数据库的连续位置相关查询处理 计算机科学, 2003, 30(4): 85-88. |
|