A Dynamic Trust Evaluation Model of User Behavior Based on Transformer

被引:0
|
作者
Yu, Xiuwen [1 ]
Huang, Rong [1 ]
Li, Yuancheng [1 ]
Qiu, Rixuan [2 ]
Zhou, Xin [2 ]
Liang, Liang [2 ]
Jing, Sitong [3 ]
机构
[1] School of Control and Computer Engineering & North China Electric Power University, No. 2 Beinong Road, Changping District,Beijing, China
[2] Information & Telecommunication Branch of State Grid Jiangxi Electric Power Supply Co., Ltd., No. 7077 Changdong Avenue,High-tech Zone,Jiangxi, Nanchang, China
[3] PowerChina Jiangxi Electric Power Engineering Co., Ltd., 426,Jingdong Avenue,Jiangxi, Qingshanhu,Nanchang, China
关键词
D O I
10.6633/IJNS.202211_24(6).02
中图分类号
学科分类号
摘要
In the boundary-based protection system, although user authentication can provide a certain degree of security, when user information is leaked, this method will be difficult to deal with the attacking threat from internal and external legitimate users. Aiming at the attacking threat of legitimate users, we analyze the user behavior and constructs a dynamic trust evaluation model of user behavior based on the Transformer network. Firstly, unsupervised pre-training of the Transformer network and extracting the time characteristics of data can effectively improve the model’s generalization ability. Then, fine-tune the network parameters, build the trust model of users’ historical behavior, predict a user’s future behavior through the established trust model, and calculate the similarity between the predicted behavior and users’ actual behavior to evaluate the trust of users’ behavior. Finally, we design and conduct experiments on a public data set. The experimental results prove the effectiveness of this method and also show that this method can reduce the training time and improve the accuracy of trust evaluation. © 2022, International Journal of Network Security. All Rights Reserved.
引用
收藏
页码:975 / 983
相关论文
共 50 条
  • [1] Trust evaluation model of cloud user based on behavior data
    Chen, Zhenguo
    Tian, Liqin
    Lin, Chuang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (05):
  • [2] A Statistical User-Behavior Trust Evaluation Algorithm Based on Cloud Model
    Yang, Xiaoqiong
    Liu, Lianzhong
    Zou, Rongbo
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 598 - 603
  • [3] Web User Behavior Trust Evaluation Model Based on Fuzzy Petri Net
    Wu, Zenan
    Tian, Liqin
    Wang, Zhigang
    Wang, Yan
    [J]. 2021 IEEE 6TH INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (ICBDA 2021), 2021, : 344 - 348
  • [4] A user behavior based trust model for mobile applications
    Yan, Zheng
    Niemi, Valtteri
    Dong, Yan
    Yu, Guoliang
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 455 - +
  • [5] Dynamic user optimal model based on the user traveling behavior
    [J]. Gongku jiaotong Keji, 4 (39-41):
  • [6] Trust Evaluation Model Based on User Trust Cloud and User Capability in E-Learning Service
    Tan, Wenan
    Li, Jingxian
    Tang, Anqiong
    Wang, Tong
    Hu, Xiaoming
    [J]. COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 583 - +
  • [7] A Dynamic Trust Model Based on User Interaction for E-commerce
    Shreya, Shashi
    Chatterjee, Kakali
    [J]. RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 433 - 443
  • [8] A Computational Dynamic Trust Model for User Authorization
    Zhong, Yuhui
    Bhargava, Bharat
    Lu, Yi
    Angin, Pelin
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (01) : 1 - 15
  • [9] User's Behavior Trust Evaluate Algorithm Based On Cloud Model
    Li Jun-Jian
    Tian Li-Qin
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 555 - 560
  • [10] Trust Evaluation Model based Node Behavior Character
    Tian, Junfeng
    Liu, Yuling
    Du, Ruizhong
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (10): : 3351 - 3371