Yabin Xu1,2,*, Meishu Zhang2, Xiaowei Xu3
Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 17-28, 2021, DOI:10.32604/jihpp.2021.017497
- 21 April 2021
Abstract In order to quickly and accurately find the implementer of the network
crime, based on the user portrait technology, a rapid detection method for users
with abnormal behaviorsis proposed. This method needs to construct the abnormal
behavior rule base on various kinds of abnormal behaviors in advance, and
construct the user portrait including basic attribute tags, behavior attribute tags and
abnormal behavior similarity tagsfor network users who have abnormal behaviors.
When a network crime occurs, firstly get the corresponding tag values in all user
portraits according to the category of the network crime. Then, use More >