An Adaptive Approach Foe Creating Behaviour Profiles and Recognizing Computer Users

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-1                           
Year of Publication : 2013
Authors :Mounika Reddy Mereddy , Devi Sudha.

MLA

Mounika Reddy Mereddy , Devi Sudha."An Adaptive Approach Foe Creating Behaviour Profiles and Recognizing Computer Users"International Journal of Computer Trends and Technology (IJCTT),V5(1):32-36 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- A detail of a persons who use the computer is plays a vital role in assisting them, foreseeing their future actions. Through this paper, an attempt for creating and recognizing the profile behavior of a person who uses the computer is presented by itself. In this case, a person who uses the computer behavior is shown as the series of the instructions while the person is using keypad during operations. This series is converted into a distribution of relevant subseries of instructions in order to puzzle out a profile that specifies its behavior and a user profile may not necessarily the same but rather it evolves/changes. We suggest an developing method to maintain day to day updating profiles which were created with the help of developing Systems approach. Through this paper, we mix or join the developing classifier with a tree-based user profiling to obtain a manually crafted self-learning networking. We further implemented the ability criteria of recursive formula a data point to become a nodal center with the utilization of cosine distance that was present in the Appendix. The way of approaching suggested through this paper can be applied to any consequence of dynamic/developing user behavior modeling where it can be shown as a series of operations. It several real data streams that will get evaluated.

 

References -

[1] D. Godoy and A. Amandi, “User Profiling in Personal Information Agents: A Survey,” Knowledge Eng. Rev., vol.20, no. 4, pp. 329-361, 2005.
[2] J.A. Iglesias, A. Ledezma, and A. Sanchis, “Creating User Profiles from a Command-Line Interface: A Statistical Approach,” Proc. Int’l Conf. User Modeling, Adaptation, and Personalization (UMAP), pp. 90-101, 2009.
[3] M. Schonlau, W. Dumouchel, W.H. Ju, A.F. Karr, and Theus, “Computer Intrusion: Detecting Masquerades,” Statistical Science, vol. 16, pp. 58-74, 2001.
[4] R.A. Maxion and T.N. Townsend, “Masquerade Detection Using Truncated Command Lines,” Proc. Int’l Conf. Dependable Systems and Networks (DSN), pp. 219-228, 2002.
[5] A. Alaniz-Macedo, K.N. Truong, J.A. Camacho-Guerrero, and M. Graca-Pimentel, “Automatically Sharing Web Experiences through a Hyperdocument Recommender System,” Proc. ACM Conf. Hypertext and Hypermedia (HYPERTEXT ’03), pp. 48-56, 2003.
[6] D.L. Pepyne, J. Hu, and W. Gong, “User Profiling for Computer Security,” Proc. Am. Control Conf., pp. 982-987, 2004.
[7] D. Godoy and A. Amandi, “User Profiling for Web Page Filtering,” IEEE Internet Computing, vol. 9, no. 4, pp. 56-64, July/ Aug. 2005.
[8] J. Anderson, Learning and Memory: An Integrated Approach. John Wiley and Sons, 1995.
[9] Y. Horman and G.A. Kaminka, “Removing Biases in Unsupervised Learning of Sequential Patterns,” Intelligent Data Analysis, vol. 11, no. 5, pp. 457-480, 2007.
[10] T. Lane and C.E. Brodley, “Temporal Series Learning and Data Reduction for Anomaly Detection,” Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 150-158, 1998.

Keywords :— Evolving fuzzy systems, fuzzy-rule-based (FRB) classifiers, user modeling.