Analytical method of web user behavior using Hidden Markov Model

被引:0
|
作者
Kawazu, Hirotaka [1 ]
Toriumi, Fujio [1 ]
Takano, Masanori [2 ]
Wada, Kazuya [2 ]
Eukuda, Ichiro [2 ]
机构
[1] Univ Tokyo, Sch Engn, Dept Syst Innovat, Bunkyo Ku, Tokyo, Japan
[2] CyberAgent Inc, Chiyoda Ku, Tokyo, Japan
关键词
Hidden Markov Model; web; clickstream; social network game;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new analytical method to classify web user behavior based on such latent states of users as intention, interest, or motivation. First, we put the clickstream data of many users into a Hidden Markov Model in which the number of hidden states is large enough to build a state transition network. Since the variable hidden states represent different latent states of users, the movement on the state transition network can represent user behavior. Second, we divide each piece of clickstream data into sessions, which we classify using network movement as feature values. These cluster labels represent the latent states of users during their stay in the web service. In this paper, we applied our method to the data of a social network game named Girl Friend BETA, which is an online game that is mainly provided on social networking services. We observed the following hidden states that represent the variable latent states of users, such as enthusiasm for the main contents of the service, playing basic content, and daily routines that are well observed by visiting the service: e.g. receiving login bonuses. Also, we classified the sessions by the latent states of users, such as light user sessions, low motivation sessions, and sessions in which users seem addicted to the main contents.
引用
收藏
页码:2518 / 2524
页数:7
相关论文
共 50 条
  • [1] Prediction of the intention of purchase of the user surfing on the web using hidden Markov model
    Wu, F
    Chin, IH
    Lin, JR
    [J]. 2005 INTERNATIONAL CONFERENCE ON SERVICES SYSTEMS AND SERVICES MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2005, : 387 - 390
  • [2] An Assessment Method of Internet of Vehicles User Behavior Based on Hidden Markov Model
    Xie, Peng-Shou
    Wang, Yi-Fan
    Wang, Zong-Liang
    Li, Nan-Nan
    Feng, Tao
    Yan, Yan
    [J]. International Journal of Network Security, 2022, 24 (03): : 493 - 500
  • [3] Method of Behavior Modeling for Detection of Anomaly Behavior using Hidden Markov Model
    Ishii, Haruka
    Kimino, Keisuke
    Inoue, Masahiro
    Arahira, Masaki
    Suzuki, Yayoi
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 151 - 154
  • [4] Network User Behavior Authentication Based on Hidden Markov Model
    Wu, Zenan
    Tian, Liqin
    Wang, Zhigang
    Wang, Yan
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2021), 2021, : 76 - 82
  • [5] Keystroke Biometric User Verification Using Hidden Markov Model
    Ali, Md Liakat
    Thakur, Kutub
    Tappert, Charles C.
    Qiu, Meikang
    [J]. 2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 204 - 209
  • [6] Web information extraction using generalized hidden Markov model
    Zhong, Ping
    Chen, Jinlin
    Cook, Terry
    [J]. 2006 1ST IEEE WORKSHOP ON HOT TOPICS IN WEB SYSTEMS AND TECHNOLOGIES, 2006, : 142 - +
  • [7] Dynamic Web Services Selection Using a Hidden Markov Model
    Moo-Mena, F. J.
    Uc-Cetina, V. M.
    Canton-Puerto, D. G.
    [J]. 2012 9TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2012,
  • [8] Web Services Reputation Assessment Using a Hidden Markov Model
    Malik, Zaki
    Akbar, Ihsan
    Bouguettaya, Athman
    [J]. SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 576 - +
  • [9] An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection
    Ye, Xiaoyun
    Han, Myung-Mook
    [J]. INFORMATION AND COMPUTER SECURITY, 2022, 30 (01) : 19 - 36
  • [10] Hidden Markov Model for Inferring User Task Using Mouse Movement
    Elbahi, Anis
    Mahjoub, Mohamed Ali
    Omri, Mohamed Nazih
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY AND ACCESSIBILITY (ICTA), 2013,