2014
DOI: 10.1007/978-3-662-44952-3_5
|View full text |Cite
|
Sign up to set email alerts
|

Web User Profiling Based on Browsing Behavior Analysis

Abstract: Part 1: Internet Crime InvestigationsInternational audienceDetermining the source of criminal activity requires a reliable means to estimate a criminal’s identity. One way to do this is to use web browsing history to build a profile of an anonymous user. Since an individual’s web use is unique, matching the web use profile to known samples provides a means to identify an unknown user. This paper describes a model for web user profiling and identification. Two aspects of browsing behavior are examined to constr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 9 publications
0
1
0
Order By: Relevance
“…While the field has advanced in big leaps, research in the various (sub-)domains also tend to drift apart. This is particularly the case for domains that deal with processing of sequential data, such as geo-locations [75], shopping paths [47], text [54], video streaming [46], [78], music [12], [95], clickstreams [15], internet browsing behavior [28], financial transactions [60], electronic health records [6] or water treatment. These data stem from dynamic phenomena which are at the heart of many fields of research, but they pose significant challenges for modelers and analysts.…”
Section: Introductionmentioning
confidence: 99%
“…While the field has advanced in big leaps, research in the various (sub-)domains also tend to drift apart. This is particularly the case for domains that deal with processing of sequential data, such as geo-locations [75], shopping paths [47], text [54], video streaming [46], [78], music [12], [95], clickstreams [15], internet browsing behavior [28], financial transactions [60], electronic health records [6] or water treatment. These data stem from dynamic phenomena which are at the heart of many fields of research, but they pose significant challenges for modelers and analysts.…”
Section: Introductionmentioning
confidence: 99%
“…Research on user identification in areas of behavioral inference (Fan et al 2014;Yang 2010;Adeyemi et al 2014), biometric dynamics (Ernsberger et al 2017;Ikuesan and Venter 2018;Ikuesan et al 2019), and network traffic analysis (Li et al 2013a;Melnikov and Schönwälder 2010a;Adeyemi et al 2016) are methods adapted for user identification through pattern extraction. The process employed for network traffic pattern extraction includes logs and media scavenging, mining of audit trails, client-side caching, and extraction of flow records from captured network traffic.…”
Section: Introductionmentioning
confidence: 99%