Computer Science ›› 2018, Vol. 45 ›› Issue (2): 181-188.doi: 10.11896/j.issn.1002-137X.2018.02.032

Previous Articles     Next Articles

Authentication Method Synthesizing Multi-factors for Web Browsing Behavior

CHEN Dong-xiang, DING Zhi-jun, YAN Chun-gang and WANG Mi-mi   

  • Online:2018-02-15 Published:2018-11-13

Abstract: In the process of electronic trades,users trade through the PC browser.Due to the threats of phishing sites and other hacking way, there is a failure risk in the traditional account-password-authentication mode.The existing methods of user Web-browsing-authentication mainly aim at authenticating one aspect of the user’s behaviors.For a large number of users,if the authentication is done only from the single aspect,it is difficult to distinguish the features among similar users,which will result in authentication invalidation.Based on the sequence behavior of user browsing Web,the behavior of hyperlink usage and browser manipulation,a authentication method synthesizing multi-factors was proposed by using the machine learning method.The experimental results show that this method achieves more than 90% detection rate under a certain false positive rate.

Key words: Web browsing,Behavior authentication,Multi-factors,Machine learning

[1] 艾瑞网 .2017中国电商导购行业研究报告.
[2] 360互联网安全中心.《2016年中国互联网安全报告》.
[3] NENADIC A,ZHANG N,BARTON S.A security protocol for certified e-goods delivery[C]∥International Conference on Information Technology:Coding and Computing.2004:22-28.
[4] HUANG L,LIU G.On data security in e-commerce[C]∥2012 IEEE Symposium on Electrical and Electronics Engineering.2012:94-97.
[5] KALAYE M R G,NIK M H,KORDESTANI H.Using tem-plate-based passwords for authentication in e-banking[C]∥Ecommerce in Developing Countries:with Focus on E-security.2013:1-9.
[6] HONG L,JAIN A.Integrating faces and fingerprints for personal identification[C]∥Asian Conference on Computer Vision.1998:16-23.
[7] WANG D,WANG P.Two Birds with One Stone:Two-FactorAuthentication with Security Beyond Conventional Bound[J].IEEE Transactions on Dependable & Secure Computing,2016(99):1.
[8] GE Y,YAN C,DING Z,et al.Web Access Patterns Mining for Individuals with Timing and Link Sequence[J].InformationTechnology Journal,2014,13(4):746-753.
[9] ZHONG J,YAN C,YU W,et al.A Kind of Identity Authentication Method Based on Browsing Behaviors[J].International Symposium on Computational Intelligence & Design,2015,2:279-284.
[10] ABRAMSON M,AHA D W.User Authentication from WebBrowsing Behavior[C]∥FLAIRS Conference.2013.
[11] LIU Q,WANG M M,ZHAO P H,et al.A Behavioral Authentication Method for MobileGesture Against Resilient User Posture[C]∥The 2016 3rd International Conference on Systems and Informatics (ICSAI 2016).2016.
[12] ANIMA B A,JASIM M,RAHMAN K A,et al.User Authentication from Mouse Movement Data Using SVM Classifier[C]∥International Conference on Cryptology & Network Security.2016:692-700.
[13] BARABSI A L.The origin of bursts and heavy tails in human dynamics[J].Nature,2005,5(7039):207.
[14] QUINLAN J R.C4.5:Programs for Machine Learning[M].San Francisco:Morgan Kaufman,1993 .
[15] TAX D M J,DUIN R P W.Support vector domain description[J].Pattern Recognition Letters,1999,20(11-13):1191-1199.
[16] ABDI H,WILLIAMS L J.Principal component analysis[J].Wiley Interdisciplinary Reviews Computational Statistics,2010,2(4):433-459.
[17] SPACKMAN K A.Signal detection theory:Valuable tools for evaluating inductive learning[C]∥Proceedings of the 6th International Workshop on Machine Learning(IWML).Ithaca,NY,1989:160-163.

No related articles found!
Full text



No Suggested Reading articles found!