A survey for user behavior analysis based on machine learning techniques: current models and applications

A G. Martín, A Fernández-Isabel, I Martín de Diego… - Applied …, 2021 - Springer
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …

Building and evaluating user network profiles for cybersecurity using serverless architecture

A Parres-Peredo, I Piza-Davila… - 2019 42nd International …, 2019 - ieeexplore.ieee.org
Serverless computing is a novel usage of cloud computing that offers programmers an
environment to execute functions with no concerns on the infrastructure where the code …

Behavior-aware network segmentation using ip flows

J Smeriga, T Jirsik - Proceedings of the 14th International Conference on …, 2019 - dl.acm.org
Network segmentation is a powerful tool for network defense. In contemporary complex,
dynamic, and multilayer networks, network segmentation suffers from lack of visibility into …

Behavior rhythm: A new model for behavior visualization and its application in system security management

Z Liu, X Guan, S Li, T Qin, C He - IEEE Access, 2018 - ieeexplore.ieee.org
The widespread use of social media, cloud computing, and Internet of Things generates
massive behavior data recorded by system logs, and how to utilize these data to improve the …

Towards a user network profiling for internal security using top-k rankings similarity measures

A Parres-Peredo, I Piza-Davila… - 2017 40th International …, 2017 - ieeexplore.ieee.org
A major goal of current computer network security systems is to protect the network from
outside attackers; however, protecting the network from its own users is still an unattended …

Research on user behavior clustering algorithm based on mobile application

Q Su, Z Jia, L Lu - Journal of Intelligent & Fuzzy Systems, 2018 - content.iospress.com
In mobile applications, user behavior clustering analysis divides users into different groups
so that operators can provide personalized services, optimize page organization and …

A survey on traffic-behavioral profiling of network end-target

M Wang, H Hu, G Hu - Proceedings of the ACM Turing Celebration …, 2019 - dl.acm.org
The traffic-behavioral profiling of end-targets can provide the network administrators with
user information both depictive and precise for better decision-making. Based on the …

User Profiling and Behavior Evaluation Based on Improved Logistics Algorithm

X Xiong, W Wu, N Li, D Tu, S Xu… - … , Sensing and Control …, 2020 - ieeexplore.ieee.org
With the development of big data technologies and algorithms, the in-depth analysis of user
data collected by user call center becomes possible. Traditional customer call center has …

Internet traffic analysis in a large university town: A graphical and clustering approach

W Weng, K Lei, K Xu, X Liu, T Sun - … WAIM 2016, Nanchang, China, June 3 …, 2016 - Springer
Campus networks consist of a rich diversity of end hosts including wired desktops, servers,
and wireless BYOD devices such as laptops and smartphones, which are often …

User profiling based on network application traffic monitoring

F Shaman - 2020 - pearl.plymouth.ac.uk
There is increasing interest in identifying users and behaviour profiling from network traffic
metadata for traffic engineering and security monitoring. However, user identification and …