计算机科学 ›› 2024, Vol. 51 ›› Issue (5): 12-20.doi: 10.11896/jsjkx.230300172

• 学科前沿 • 上一篇    下一篇

网络空间用户身份对齐技术研究及应用综述

王庚润   

  1. 信息工程大学国家数字交换系统工程技术研究中心 郑州 450002
  • 收稿日期:2023-03-21 修回日期:2023-11-27 出版日期:2024-05-15 发布日期:2024-05-08
  • 通讯作者: 王庚润(wanggengrun@gmail.com)
  • 基金资助:
    国家自然科学基金(61803384);河南省科技重大专项(221100210700-2)

Survey of Research and Application of User Identity Linkage Technology in Cyberspace

WANG Gengrun   

  1. National Digital Switching System Engineering&Technological R&D Center,Information Engineering University,Zhengzhou 450002,China
  • Received:2023-03-21 Revised:2023-11-27 Online:2024-05-15 Published:2024-05-08
  • About author:WANG Gengrun,born in 1987,Ph.D,associate researcher.His main research interests include telecommunication network security and user behavior analysis in cyberspace.
  • Supported by:
    National Natural Science Foundation of China(61803384) and Major Science and Technology Program of Henan Province(221100210700-2).

摘要: 近年来,随着移动互联网技术的发展和用户需求的增加,网络空间中各种虚拟账号越来越多,同一用户在不同应用甚至同一平台拥有多个账号。同时,由于网络空间的虚拟性导致用户的虚拟身份与真实社会身份之间的关联通常较弱,网络空间违法用户存在发现难和取证难的问题。因此,在服务推荐和调查取证等需求的推动下,以网络空间用户虚拟身份聚合和虚实身份映射为主要研究内容的用户身份对齐技术得到了快速发展。为此,对网络空间用户身份对齐技术进行了梳理,首先对该技术解决的科学问题进行了阐述;其次介绍了该技术所用到的用户身份典型特征和涉及的相关技术;然后对可供研究的数据集与验证标准进行介绍;最后对所提技术面向的应用场景进行了详细分析,并基于此讨论了用户身份对齐技术未来的研究方向以及面临的挑战。

关键词: 网络空间安全, 用户身份对齐, 虚拟身份聚合, 虚实身份映射, 用户身份特征, 社交网络, 流量数据

Abstract: In recent years,with the development of mobile Internet technology and the increase of user demand,there are more and more various virtual accounts in cyberspace,and users always have multiple accounts in different applications or even the same platform.At the same time,due to the virtual nature of cyberspace,the relationship between the users' virtual identity and the real social identity is usually weak,and the illegal users in cyberspace are difficult to find.Therefore,driven by the needs of service recommendation and evidence collection,the user identity linkage technology,with cyberspace user virtual identity aggregation and virtual-real identity mapping as the main research content,has been developed rapidly.For this reason,the user identity linkage technology in cyberspace is summarized.Firstly,the scientific problems solved by this technology is defined,and then the typical characteristics of the user identity and the related technologies are introduced.Finally,the datasets and verification stan-dards are presented,and the challenges of the user identity linkage are discussed.

Key words: Cyberspace security, User identity linkage, Virtual identity aggregation, Virtual and real identity mapping, User identity feature, Social network, Traffic data

中图分类号: 

  • TP393
[1]XIE L.Research on Information Investigation of Telecom Network Fraud [J].Journal of People's Public Security University of China(Science and Technology),2020,26(3):85-93.
[2]ADOMAVICIUS G,TUZHILIN A.Toward the next generation of recommender systems:A survey of the state-of-the-art and possible extensions [J].IEEE Transactions on Knowledge and Data Engineering,2005,17(6):734-749.
[3]LIU X Z,XIA T,YU Y Y,et al.Cross social media recommendation[C]//The International AAAI Conference on Web and Social Media.[S.l.]:AAAI,2016:1-10.
[4]XING L,DENG K,WU H,et al.A Survey of Across Social Net-works User Identification [J].IEEE Access,2019,7:137472-137488.
[5]ZAHRA K,AZAM F,BUTT W H,et al.User Identification on Social Networks Through Text Mining Techniques:A Syste-matic Literature Review[C]//International Conference on Information Science and Applications.Singapore:Springer,2019.
[6]GOMAA W H,FAHMY A A.A Survey of Text Similarity Approaches [J].International Journal of Computer Applications,2013,68(13):13-18,.
[7]XING L,DENG K K,WU H H,et al.Review of User Identification across Social Networks:The Complex Network Approach [J].Journal of University of Electronic Science and Technology of China,2020,49(6):905-917.
[8] LUAN M M,ZHAO T,YANG X H,et al.A Survey of Cross Social Network User Identification at Home and Abroad [J].Journal of Qilu University of Technology,2020,34(4):55-60.
[9]SHEN W,WANG J Y,LUO P,et al.Linking named entities in Tweets with knowledge base via user interest modeling[C]//Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2013:68-76.
[10]LIU S,WANG S,ZHU F,et al.HYDRA:Large-Scale socialidentity linkage via heterogeneous behavior modeling[C]//Proceedings of the 2014 ACM SIGMOD International Conference.on Management of Data.New York:ACM Press,2014:51-62.
[11]MOHAMED A,QIAN K,ELHOSEINY M,et al.Social-STGCNN:A Social Spatio-Temporal Graph Convolutional Neural Network for Human Trajectory Prediction[C]//2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).IEEE,2020.
[12]ZHOU F,LIU L,ZHANG K,et al.DeepLink:A Deep Learning Approach for User Identity Linkage[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,1313-1321.
[13]DENG K K,XING L,ZHENG L,et al.A User IdentificationAlgorithm Based on User Behavior Analysis in Social Networks [J].IEEE Access,2019,7:47114-47123.
[14]ZAFARANI R,TANG L,LIU H.User identification across social media [J].ACM Transactions on Knowledge Discovery from Data,2015,10(2):1-30.
[15]GANG H,SHA C.Implement Of Network User Virtual Identity Merging Based on Spark[C]//International Conference on Communication and Electronic Information Engineering(CEIE 2016).2017.
[16]ZHOU F,GAO Q,TRAJCEVSKI G,et al.Trajectory-user lin-king via variational autoencoder[C]//Proceedings of the 27th International Joint Conference on Artificial Intelligence.Stockholm,Sweden,2018:3212-3218.
[17]CHEN H C,XU Q,HUANG R Y,et al.User IdentificationAcross Social Networks Based on User Trajectory [J].Journal of Electronics & Information Technology,2018,40(11):2758-2764.
[18]FU S,WANG G,XIA S,et al.A Multi-Granularity Representation Learning Framework for User Identification Across Social Networks[C]//2019 International Joint Conference on Rough Sets(IJCRS).Springer,2019.
[19]XING L,DENG K K,WU H H,et al.Behavioral Habits-Based User Identification Across Social Networks [J].Symmetry,2019,11(9):1134.
[20]JAMJUNTRA L,CHARTSUWAN P,WONGLIMSAMUT P,et al.Social network user identification[C]//2017 9th International Conference on Knowledge and Smart Technology(KST).IEEE,2017.
[21]ZHAO D,NING Z,MING X,et al.An Improved User Identification Method Across Social Networks Via Tagging Behaviors[C]//2018 IEEE 30th International Conference on Tools with Artificial Intelligence(ICTAI).IEEE,2018.
[22]GAO Q,ZHOU F,ZHANG K,et al.Identifying human mobility via trajectory embeddings[C]//Proceedings of the 26th International Joint Conference on Artificial Intelligence.Melbourne,Australia,2017:1689-1695.
[23]ZHOU F,CHEN S,WU J,et al.Trajectory-User Linking via Graph Neural Network[C]//IEEE International Conference on Communications(ICC 2021).IEEE,2021.
[24]ZHOU X,LIANG X,ZHANG H,et al.Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks [J].IEEE Transactions on Knowledge and Data Engineering,2016,28(2):411-424.
[25]ZHANG W,LI Y,ZHANG J,et al.A User Trajectory Identification Model with Fusion of Spatio-Temporal Behavior and Social Relation [J].Chinese Journal of Computers,2021(11):44.
[26]KONG X,ZHANG J,YU P S.Inferring anchor links acrossmultiple heterogeneous social networks[C]//ACM Interna-tional Conference on Information & Knowledge Management.ACM,2013.
[27]YANG Y,ZHAN D C,WU Y F,et al.Multi-network UserIdentification via Graph-Aware Embedding[C]//2018 Pacific-Asia Conference on Knowledge Discovery and Data Mining.Springer,2018.
[28]KOJIMA K,IKEDA K,TANI M.Short Paper:User Identification across Online Social Networks Based on Similarities among Distributions of Friends' Locations[C]//2019 IEEE Interna-tional Conference on Big Data(Big Data).IEEE,2019.
[29]ZENG W,TANG R,WANG H,et al.User Identification Based on Integrating Multiple User Information across Online Social Networks [J].Security and Communication Networks,2021:1-14.
[30]YING C X,CAI T L,LUO S J,et al.Do transformers really perform badly for graph representation?[C]//Advances in Neural Information Processing Systems 34.2021:28877-28888.
[31]CHEN H,YIN H,SUN X,et al.Multi-level Graph Convolu-tional Networks for Cross-platform Anchor Link Prediction[C]//Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.ACM,2020:1503-1511.
[32]LIU Q,LI Y,DUAN H,et al.Knowledge Graph ConstructionTechniques [J].Journal of Computer Research and Development,2016,53(3):582-600.
[33]WU X,JIANG T,ZHU Y,et al.Knowledge graph for china's genealogy [J].IEEE Transactions on Knowledge and Data Engineering,2021,35(1):634-646.
[34]SUN Z,WANG C,HU W,et al.Knowledge Graph AlignmentNetwork with Gated Multi-Hop Neighborhood Aggregation [J].Proceedings of the AAAI Conference on Artificial Intelligence,2020,34(1):222-229.
[35]LI J,WANG Z,XIAO Z,et al.Large scale instance matching via multiple indexes and candidate selection [J].Knowledge-Based Systems,2013,50:112-120.
[36]LU W,WU C.Literature Review on Entity Linking [J].Journal of the China Society for Scientific and Technical Information,2015,34(1):105-112.
[37]ZHENG Y,WANG L H,ZHANG R C,et al.GeoLife:managing and understanding your past life over maps[C]//Proceedings of the 9th International Conference on Mobile Data Management.IEEE Press,2008:211-212.
[38]SANG J T,LU D Y,XU C S.Overlapped User-based Cross-network Analysis:Exploring Variety in Big Social Media Data [J].Chinese Science Bulletin,2014,59(36):3554-3560.
[39]TAO F,LIU W R,LIU J H,et al.Digital Twin and Its Potential Application Exploring [J].Computer Integrated Manufacturing Systems,2018,24(1):4-21.
[40]LI L,MIN Z.The Strategy of Mining Association Rule Based on Cloud Computing[C]//2011 International Conference on Business Computing and Global Informatization(BCGIN).IEEE,2011.
[41]SUN Y,KAMEL M S,WONG A,et al.Cost-sensitive boosting for classification of imbalanced data[J].Pattern Recognition,2007,40(12):3358-3378.
[42]PING R,ZHOU Y S,LI D.Cost sensitive random forest classifi-cation algorithm for highly unbalanced data [J].Pattern Recognition and Artificial Intelligence 2020,33(3):249-257.
[43]LI T,SRIKUMAR V.Augmenting neural networks with first-order logic[C]//Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics.ACL,2019:102-113.
[44]LV L Y.Link Prediction on Complex Networks [J].Journal of University of Electronic Science and Technology of China,2010,39(5):651-661.
[45]LIN Y J,WU Y,LI H B.Internet Hirelings Semi-supervised Detection of Weibo Based on Affinity Propagation Algorithm [J].Netinfo Security,2022,22(3):85-96.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!