Skip to main content
Log in

A survey for user behavior analysis based on machine learning techniques: current models and applications

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Significant research has been carried out in the field of User Behavior Analysis, focused on understanding, modeling and predicting past, present and future behaviors of users. However, the heterogeneity of the approaches makes their comprehension very complicated. Thus, domain and Machine Learning experts have to work together to achieve their objectives. The main motivation for this work is to obtain an understanding of this field by providing a categorization of state-of-the-art works grouping them based on specific features. This paper presents a comprehensive survey of the existing literature in the areas of Cybersecurity, Networks, Safety and Health, and Service Delivery Improvement. The survey is organized based on four different topic-based features which categorize existing works: keywords, application domain, Machine Learning algorithm, and data type. This paper aims to thoroughly analyze the existing references, to promote the dissemination of state-of-the-art approaches discussing their strong and weak points, and to identify open challenges and prospective future research directions. In addition, 127 discussed papers have been scored and ranked according to relevance-based features: paper reputation, maximum author reputation, novelty, innovation and data quality. Both types of features, topic-based and relevance-based have been combined to build a similarity metric enabling a rich visualization of all considered publications. The obtained graphic representation provides a guide of recent advancements in User Behavior Analysis by topic, highlighting the most relevant ones.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abdallah A, Maarof MA, Zainal A (2016) Fraud detection system: a survey. J Netw Comput Appl 68:90–113

    Article  Google Scholar 

  2. Afridi MW, Ali T, Alghamdi T, Ali T, Yasar M (2018) Android application behavioral analysis through intent monitoring. In: 2018 6th International symposium on digital forensic and security (ISDFS). IEEE, pp 1–8

  3. Agard B, Morency C, Trépanier M (2006) Mining public transport user behaviour from smart card data. IFAC Proc 39(3):399–404

    Article  Google Scholar 

  4. Akiyama T, Okushima M (2009) Analysis of railway user travel behaviour patterns of different age groups. IATSS Res 33(1):6–17

    Article  Google Scholar 

  5. Alemdar H, Tunca C, Ersoy C (2015) Daily life behaviour monitoring for health assessment using machine learning: bridging the gap between domains. Pers Ubiquit Comput 19(2):303–315

    Article  Google Scholar 

  6. Alieksieiev V, Strelnitskiy A, Gavva D, Gorelov D, Synytsia Y (2018) Studying of keystroke dynamics statistical properties for biometrie user authentication. In: 2018 14th International conference on advanced trends in radioelecrtronics, telecommunications and computer engineering (TCSET). IEEE, pp 559–563

  7. Alimolaei S (2015) An intelligent system for user behavior detection in internet banking. In: 2015 4th Iranian joint congress on fuzzy and intelligent systems (CFIS). IEEE, pp 1–5

  8. Aljohani O, Aljohani N, Bours P, Alsolami F (2018) Continuous authentication on PCs using artificial immune system. In: 2018 1St international conference on computer applications & information security (ICCAIS). IEEE, pp 1–6

  9. Allen Institute for Artificial Intelligence (2015) Semantic scholar. https://www.semanticscholar.org/, [Online: accessed 08-Sept-2020]

  10. Anguita D, Ghio A, Oneto L, Parra X, Reyes-Ortiz JL (2012) Human activity recognition on smartphones using a multiclass hardware-friendly support vector machine. In: International workshop on ambient assisted living. Springer, pp 216–223

  11. Arbabzadeh N, Jafari M (2017) A data-driven approach for driving safety risk prediction using driver behavior and roadway information data. IEEE Trans Intell Transport Sys 19(2):446–460

    Article  Google Scholar 

  12. Arel I, Liu C, Urbanik T, Kohls A (2010) Reinforcement learning-based multi-agent system for network traffic signal control. IET Intell Transp Syst 4(2):128–135

    Article  Google Scholar 

  13. Arroyo JM, Conejo AJ (2000) Optimal response of a thermal unit to an electricity spot market. IEEE Trans Power Sys 15(3):1098–1104

    Article  Google Scholar 

  14. Aztiria A, Izaguirre A, Basagoiti R, Augusto JC, Cook DJ (2010) Automatic modeling of frequent user behaviours in intelligent environments. In: 2010 Sixth international conference on intelligent environments (IE). IEEE, pp 7–12

  15. Bai T, Zhao W X, He Y, Nie J Y, Wen J R (2018) Characterizing and predicting early reviewers for effective product marketing on e-commerce websites. IEEE Trans Knowl Data Eng 30(12):2271–2284

    Article  Google Scholar 

  16. Balaji P, Srinivasan D (2010) Multi-agent system in urban traffic signal control. IEEE Comput Intell Mag 5(4):43–51

    Google Scholar 

  17. Banokin PI, Tsapko GP (2014) Architecture of software system for corporate and technological control software users’ behavior analysis. In: 2014 International conference on mechanical engineering, automation and control systems (MEACS). IEEE, pp 1–5

  18. Bayer J (2010) Customer segmentation in the telecommunications industry. J Database Market Cust Strat Manag 17(3-4):247–256

    Article  Google Scholar 

  19. Bhargava N, Sharma G, Bhargava R, Mathuria M (2013) Decision tree analysis on j48 algorithm for data mining. Proc Int J Adv Res Comput Sci Softw Eng 3(6):114–1119

    Google Scholar 

  20. Birant D, Kut A (2007) ST-DBSCAN: An algorithm for clustering spatial–temporal data. Data Knowl Eng 60(1):208–221

    Article  Google Scholar 

  21. Bohge M, Trappe W (2003) An authentication framework for hierarchical ad hoc sensor networks. In: Proceedings of the 2nd ACM workshop on Wireless security. ACM, pp 79–87

  22. Bouhoute A, Oucheikh R, Boubouh K, Berrada I (2018) Advanced driving behavior analytics for an improved safety assessment and driver fingerprinting. IEEE Trans Intell Transp Syst 20(6):2171–2184

    Article  Google Scholar 

  23. Bourobou STM, Yoo Y (2015) User activity recognition in smart homes using pattern clustering applied to temporal ANN algorithm. Sensors 15(5):11953–11971

    Article  Google Scholar 

  24. Brosso I, La Neve A, Bressan G, Ruggiero WV (2010) A continuous authentication system based on user behavior analysis. In: ARES’10 international conference on availability, reliability, and security, 2010. IEEE, pp 380–385

  25. BV E (1997) ScienceDirect. https://www.sciencedirect.com/, [Online: accessed 08-Sept-2020]

  26. Cai Y, Jiang H, Chen D, Huang MC (2018) Online learning classifier based behavioral biometric authentication. In: 2018 15th International conference on wearable and implantable body sensor networks (BSN). IEEE, pp 62–65

  27. Cao L, Joachims T, Wang C, Gaussier E, Li J, Ou Y, Luo D, Zafarani R, Liu H, Xu G et al (2014) Behavior informatics: a new perspective. IEEE Intell Syst 29(4):62–80

    Article  Google Scholar 

  28. Cao L, Philip SY, Kumar V (2015a) Nonoccurring behavior analytics: a new area. IEEE Intell Syst 30(6):4–11

    Article  Google Scholar 

  29. Cao N, Shi C, Lin S, Lu J, Lin YR, Lin CY (2015b) Targetvue: Visual analysis of anomalous user behaviors in online communication systems. IEEE Trans Visual Comput Graph 22(1):280–289

    Article  Google Scholar 

  30. Cao Z, Chi C, Hao R, Xiao Y (2008) User behavior modeling and traffic analysis of IMS presence servers. In: Global telecommunications conference, 2008. IEEE GLOBECOM 2008. IEEE, pp 1–5

  31. Carter I (2017) Human behavior in the social environment: A social systems approach. Routledge, Abingdon

    Book  Google Scholar 

  32. Čegan L, Filip P (2017) Advanced web analytics tool for mouse tracking and real-time data processing. In: 2017 IEEE 14th international scientific conference on informatics. IEEE, pp 431–435

  33. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surveys (CSUR) 41(3):15

    Article  Google Scholar 

  34. Chen CM, Guan DJ, Huang YZ, Ou YH (2016) Anomaly network intrusion detection using hidden Markov model. Int J Innov Comput Inform Control 12:569–580

    Google Scholar 

  35. Chen L, Zhang Z, Liu Q, Yang L, Meng Y, Wang P (2019) A method for online transaction fraud detection based on individual behavior. In: Proceedings of the ACM turing celebration conference-China. ACM, p 119

  36. Chen Y, Zheng Z, Chen S, Sun L, Chen D (2017) Mining customer preference in physical stores from interaction behavior. IEEE Access 5:17436–17449

    Article  Google Scholar 

  37. Chung YW, Khaki B, Li T, Chu C, Gadh R (2019) Ensemble machine learning-based algorithm for electric vehicle user behavior prediction. Appl Energy 254:113732

    Article  Google Scholar 

  38. Conroy NJ, Rubin VL, Chen Y (2015) Automatic deception detection: methods for finding fake news. In: Proceedings of the 78th ASIS&T annual meeting: information science with impact: research in and for the community. American Society for Information Science, p 82

  39. De Lathauwer L, De Moor B, Vandewalle J (2000) A multilinear singular value decomposition. SIAM J Matrix Anal Appl 21(4):1253–1278

    Article  MathSciNet  MATH  Google Scholar 

  40. De Maesschalck R, Jouan-Rimbaud D, Massart DL (2000) The mahalanobis distance. Chemomet Intell Lab Sys 50(1):1–18

    Article  Google Scholar 

  41. Deshpande D, Deshpande S (2017) Online user behavior: a decade’s perspective. In: 2017 International conference on trends in electronics and informatics (ICEI). IEEE, pp 977–984

  42. Dinev T (2006) Why spoofing is serious internet fraud. Commun ACM 49(10):76–82

    Article  Google Scholar 

  43. Ding N, He Q, Wu C, Fetzer J (2015) Modeling traffic control agency decision behavior for multimodal manual signal control under event occurrences. IEEE Trans Intell Transp Syst 16(5):2467–2478

    Article  Google Scholar 

  44. Dollár P, Rabaud V, Cottrell G, Belongie S (2005) Behavior recognition via sparse spatio-temporal features. In: 2nd Joint IEEE international workshop on visual surveillance and performance evaluation of tracking and surveillance, 2005. IEEE, pp 65–72

  45. Fahad LG, Tahir SF, Rajarajan M (2014) Activity recognition in smart homes using clustering based classification. In: 2014 22nd international conference on pattern recognition (ICPR). IEEE, pp 1348–1353

  46. Faria R, Sousa J, Martins A, Lagarto J (2013) Modeling the strategic behavior of the iberian electricity market producers using time series analysis. In: 2013 10th international conference on the European energy market (EEM). IEEE, pp 1–5

  47. Feng S, Zhang H, Cao J, Yao Y (2019) Merging user social network into the random walk model for better group recommendation. Appl Intell 49(6):2046–2058

    Article  Google Scholar 

  48. Fernández-Isabel A, Fuentes-Fernández R (2011) An agent-based platform for traffic simulation. In: 6th international conference SOCO 2011 soft computing models in industrial and environmental applications. Springer, pp 505–514

  49. Fernández-Isabel A, Prieto JC, Ortega F, de Diego IM, Moguerza JM, Mena J, Galindo S, Napalkova L (2018) A unified knowledge compiler to provide support the scientific community. Knowl-Based Syst 161:157–171

    Article  Google Scholar 

  50. Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun ACM 59(7):96–104

    Article  Google Scholar 

  51. Firdausi I, Erwin A, Nugroho A S, et al. (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second international conference on advances in computing, control and telecommunication technologies (ACT). IEEE, pp 201–203

  52. Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Foren Sec 8(1):136–148

    Article  Google Scholar 

  53. de Fuentes JM, Gonzalez-Manzano L, Ribagorda A (2018) Secure and usable user-in-a-context continuous authentication in smartphones leveraging non-assisted sensors. Sensors 18(4):1219

    Article  Google Scholar 

  54. Gao Y, Ma Y, Li D (2017) Anomaly detection of malicious users’ behaviors for web applications based on web logs. In: 2017 IEEE 17th international conference on communication technology (ICCT). IEEE, pp 1352–1355

  55. Georgiou T, Demiris Y (2015) Predicting car states through learned models of vehicle dynamics and user behaviours 2015 IEEE intelligent vehicles symposium (IV). IEEE, pp 1240–1245

  56. Gilbert N, Doran J (2018) Simulating societies: the computer simulation of social phenomena. Routledge, Abingdon

    Book  Google Scholar 

  57. Gindele T, Brechtel S, Dillmann R (2015) Learning driver behavior models from traffic observations for decision making and planning. IEEE Intell Transp Syst Mag 7(1):69–79

    Article  Google Scholar 

  58. Giri R, Choi H, Hoo KS, Rao BD (2014) User behavior modeling in a cellular network using latent dirichlet allocation. In: International conference on intelligent data engineering and automated learning. Springer, pp 36–44

  59. Giuffrida C, Majdanik K, Conti M, Bos H (2014) I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 92–111

  60. Gomi H, Yamaguchi S, Tsubouchi K, Sasaya N (2018) Continuous authentication system using online activities. In: 2018 17Th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE). IEEE, pp 522–532

  61. Groenen PJ, Jajuga K (2001) Fuzzy clustering with squared Minkowski distances. Fuzzy Sets Syst 120(2):227–237

    Article  MathSciNet  MATH  Google Scholar 

  62. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot): a vision, architectural elements, and future directions. Future Gen Comput Sys 29(7):1645–1660

    Article  Google Scholar 

  63. Gurarie E, Bracis C, Delgado M, Meckley TD, Kojola I, Wagner CM (2016) What is the animal doing? Tools for exploring behavioural structure in animal movements. J Anim Ecol 85(1):69–84

    Article  Google Scholar 

  64. Hand DJ (2007) Principles of data mining. Drug Saf 30(7):621–622

    Article  Google Scholar 

  65. Hart C (2018) Doing a literature review: releasing the research imagination. Sage, Newcastle upon Tyne

    Google Scholar 

  66. Hegazy RD, Nasr OA (2015) A user behavior based handover optimization algorithm for LTE networks. In: 2015 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1255–1260

  67. Hernández S, Álvarez P, Fabra J, Ezpeleta J (2017) Analysis of users’ behavior in structured e-commerce websites. IEEE Access 5:11941–11958

    Article  Google Scholar 

  68. Higgs B, Abbas M (2014) Segmentation and clustering of car-following behavior: recognition of driving patterns. IEEE Trans Intell Transp Syst 16(1):81–90

    Article  Google Scholar 

  69. Hilas CS, Mastorocostas PA (2008) An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl-Based Syst 21(7):721–726

    Article  Google Scholar 

  70. Hospedales T, Gong S, Xiang T (2009) A markov clustering topic model for mining behaviour in video. In: 2009 IEEE 12th international conference on computer vision. IEEE, pp 1165–1172

  71. Ibrahim A, Ouda A (2017) A hybrid-based filtering approach for user authentication. In: 2017 IEEE 30th Canadian conference on electrical and computer engineering (CCECE). IEEE, pp 1–5

  72. Institute of Electrical and Electronics Engineers (1963) IEEE. https://ieeexplore.ieee.org/Xplore/home.jsp, [Online: accessed 08-Sept-2020]

  73. Iyer D, Mohanpurkar A, Janardhan S, Rathod D, Sardeshmukh A (2011) Credit card fraud detection using hidden markov model. In: 2011 world congress on information and communication technologies (WICT). IEEE, pp 1062–1066

  74. Jahangir H, Tayarani H, Ahmadian A, Golkar M A, Miret J, Tayarani M, Gao HO (2019) Charging demand of plug-in electric vehicles: forecasting travel behavior based on a novel rough artificial neural network approach. J Clean Prod 229:1029–1044

    Article  Google Scholar 

  75. Jia D, Chen Z (2012) Traffic signal control optimization based on fuzzy neural network. In: Proceedings of 2012 international conference on measurement, information and control, vol 2. IEEE, pp 1015–1018

  76. Jiang H, Yi S, Wu L, Leung H, Wang Y, Zhou X, Chen Y, Yang L (2018) Data-driven cell zooming for large-scale mobile networks. IEEE Trans Netw Serv Manag 15(1):156–168

    Article  Google Scholar 

  77. Jurek A, Nugent C, Bi Y, Wu S (2014) Clustering-based ensemble learning for activity recognition in smart homes. Sensors 14(7):12285–12304

    Article  Google Scholar 

  78. Karumur RP, Nguyen TT, Konstan JA (2018) Personality, user preferences and behavior in recommender systems. Inf Syst Front 20(6):1241–1265

    Article  Google Scholar 

  79. Kasa N, Dahbura A, Ravoori C, Adams S (2019) Improving credit card fraud detection by profiling and clustering accounts. In: 2019 Systems and information engineering design symposium (SIEDS). IEEE, pp 1–6

  80. Keralapura R, Nucci A, Zhang ZL, Gao L (2010) Profiling users in a 3g network using hourglass co-clustering. In: Proceedings of the sixteenth annual international conference on mobile computing and networking. ACM, pp 341–352

  81. Kirschenbaum I, Wool A (2006) How to build a low-cost, extended-range RFID skimmer. In: USENIX security symposium, vol 4. The Advanced Computing System Association

  82. Kolosnjaji B, Zarras A, Webster G, Eckert C (2016) Deep learning for classification of malware system call sequences. In: Australasian joint conference on artificial intelligence. Springer, pp 137–149

  83. Kong X, Li M, Tang T, Tian K, Moreira-Matias L, Xia F (2018) Shared subway shuttle bus route planning based on transport data analytics. IEEE Trans Autom Sci Eng 15(99):1–14

    Google Scholar 

  84. Kuefler A, Morton J, Wheeler T, Kochenderfer M (2017) Imitating driver behavior with generative adversarial networks. In: 2017 IEEE intelligent vehicles symposium (IV). IEEE, pp 204–211

  85. Laishram A, Padmanabhan V (2019) Discovery of user-item subgroups via genetic algorithm for effective prediction of ratings in collaborative filtering. Appl Intell 49:1–17

    Article  Google Scholar 

  86. Laleh N, Carminati B, Ferrari E (2018) Risk assessment in social networks based on user anomalous behaviors. IEEE Trans Depend Sec Comput 15(2):295–308

    Article  Google Scholar 

  87. Lampropoulos I, Vanalme GM, Kling WL (2010) A methodology for modeling the behavior of electricity prosumers within the smart grid. In: 2010 IEEE PES innovative smart grid technologies conference europe (ISGT Europe). IEEE, pp 1–8

  88. Lazer DM, Baum MA, Benkler Y, Berinsky AJ, Greenhill KM, Menczer F, Metzger MJ, Nyhan B, Pennycook G, Rothschild D et al (2018) The science of fake news. Science 359 (6380):1094–1096

    Article  Google Scholar 

  89. Leng B, Liu J, Pan H, Zhou S, Tsinghua ZN (2015) Topic model based behaviour modeling and clustering analysis for wireless network users. In: 2015 21st Asia-Pacific conference on communications (APCC). IEEE, pp 410–415

  90. Levene M (2011) An introduction to search engines and web navigation. John Wiley & Sons, Hoboken

    Google Scholar 

  91. LeVine RA (2018) Culture, behavior, and personality: An introduction to the comparative study of psychosocial adaptation. Routledge, Abingdon

    Book  Google Scholar 

  92. Li Q, Wu Q, Zhu C, Zhang J, Zhao W (2019) Unsupervised user behavior representation for fraud review detection with cold-start problem. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 222–236

  93. Li Y, Hu H, Zhou G (2018) Using data augmentation in continuous authentication on smartphones. IEEE Int Things J 6(1):628–640

    Article  Google Scholar 

  94. Li Z, Wang C (2017) Modeling data transport capacity of mobile networks for mobile social services. IEEE Access 5:12143–12157

    Article  Google Scholar 

  95. Liang W, Wu Z, Cao J, Gu J (2018) Understanding customer behavior in shopping mall from indoor tracking data. In: 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD). IEEE, pp 648– 653

  96. Lin R, Pei Z, Ye Z, Wu B, Yang G (2019) A voted based random forests algorithm for smart grid distribution network faults prediction. Enterprise Inf Sys 14:1–19

    Google Scholar 

  97. Lingam G, Rout RR, Somayajulu D (2019) Adaptive deep q-learning model for detecting social bots and influential users in online social networks. Appl Intell 49:1–18

    Article  Google Scholar 

  98. Litan A (2004) Phishing attack victims likely targets for identity theft. Gartner Research, Stamford,

    Google Scholar 

  99. Litan A, Nicolett M (2014) Market guide for user behavior analytics

  100. Liu C, He J (2017) Access control to web pages based on user browsing behavior. In: 2017 IEEE 9th international conference on communication software and networks (ICCSN). IEEE, pp 1016–1020

  101. Liu H, Taniguchi T, Tanaka Y, Takenaka K, Bando T (2017) Visualization of driving behavior based on hidden feature extraction by using deep learning. IEEE Trans Intell Transp Syst 18(9):2477–2489

    Article  Google Scholar 

  102. Liu W, Yan H, Zhou W, Lei Z (2010) Network user dial-up behavior analysis. In: 2010 international conference on future information technology and management engineering (FITME), vol 1. IEEE, pp 39–43

  103. LLC G (2005) Google scholar. https://scholar.google.es/, [Online: accessed 08-Sept-2020]

  104. Lotfi A, Langensiepen C, Mahmoud SM, Akhlaghinia MJ (2012) Smart homes for the elderly dementia sufferers: identification and prediction of abnormal behaviour. J Ambient Intell Human Comput 3 (3):205–218

    Article  Google Scholar 

  105. Lu Z, Sagduyu Y (2016) Risk assessment based access control with text and behavior analysis for document management. In: Military communications conference, MILCOM 2016-2016 IEEE. IEEE, pp 37–42

  106. Luo X, Jiang C, Wang W, Xu Y, Wang JH, Zhao W (2019) User behavior prediction in social networks using weighted extreme learning machine with distribution optimization. Futur Gener Comput Syst 93:1023–1035

    Article  Google Scholar 

  107. Lvd M, Hinton G (2008) Visualizing data using t-SNE. J Mach Learn Res 9:2579–2605

    MATH  Google Scholar 

  108. Mahbub U, Chellappa R (2016) PATH: person authentication using trace histories. In: Ubiquitous computing, electronics & mobile communication conference (UEMCON), IEEE Annual. IEEE, pp 1–8

  109. Manca M, Parvin P, Paternò F, Santoro C (2017) Detecting anomalous elderly behaviour in ambient assisted living. In: Proceedings of the ACM SIGCHI symposium on engineering interactive computing systems. ACM, pp 63–68

  110. Mao J, Bian J, Bai G, Wang R, Chen Y, Xiao Y, Liang Z (2018) Detecting malicious behaviors in JavaScript applications. IEEE Access 6:12284–12294

    Article  Google Scholar 

  111. Mirsky Y, Shapira B, Rokach L, Elovici Y (2015) pcstream: A stream clustering algorithm for dynamically detecting and managing temporal contexts. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 119–133

  112. Mirsky Y, Shabtai A, Shapira B, Elovici Y, Rokach L (2017) Anomaly detection for smartphone data streams. Perv Mob Comput 35:83–107

    Article  Google Scholar 

  113. Misbahuddin M, Bindhumadhava B, Dheeptha B (2017) Design of a risk based authentication system using machine learning techniques. In: 2017 IEEE Smartworld, ubiquitous intelligence & computing, advanced & trusted computed, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation. IEEE, pp 1–6

  114. Miyajima C, Nishiwaki Y, Ozawa K, Wakita T, Itou K, Takeda K, Itakura F (2007) Driver modeling based on driving behavior and its evaluation in driver identification. Proc IEEE 95 (2):427–437

    Article  MATH  Google Scholar 

  115. Mo Y, Chen J, Xie X, Luo C, Yang LT (2014) Cloud-based mobile multimedia recommendation system with user behavior information. IEEE Syst J 8(1):184–193

    Article  Google Scholar 

  116. Moghaddam S, Helmy A (2011) Multidimensional modeling and analysis of wireless users online activity and mobility: A neural-networks map approach. In: Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems. ACM, pp 401–408

  117. Molloy I, Dickens L, Morisset C, Cheng PC, Lobo J, Russo A (2012) Risk-based security decisions under uncertainty. In: Proceedings of the second ACM conference on data and application security and privacy. ACM, pp 157–168

  118. Moon TK (1996) The expectation-maximization algorithm. IEEE Sig Process Mag 13(6):47–60

    Article  Google Scholar 

  119. Moya MM, Koch MW, Hostetler LD (1993) One-class classifier networks for target recognition applications. NASA STI/Recon Technical Report 93:797–801

    Google Scholar 

  120. Muallem A, Shetty S, Pan JW, Zhao J, Biswal B (2017) Hoeffding tree algorithms for anomaly detection in streaming datasets: a survey. J Inf Secur 8(4):339–361

    Google Scholar 

  121. Narvekar M, Banu SS (2015) Predicting user’s web navigation behavior using hybrid approach. Procedia Comput Sci 45:3–12

    Article  Google Scholar 

  122. Nasrabadi NM (2007) Pattern recognition and machine learning. J Elec Imag 16(4):049901

    Article  MathSciNet  Google Scholar 

  123. Nguyen HT, Walker CL, Walker EA (2018) A first course in fuzzy logic. CRC Press, Boca Raton

    Book  MATH  Google Scholar 

  124. Nishiyama Y, Okoshi T, Yonezawa T, Nakazawa J, Takashio K, Tokuda H (2016) Toward health exercise behavior change for teams using lifelog sharing models. IEEE J Biomed Health Inf 20 (3):775–786

    Article  Google Scholar 

  125. Ojtáš P, Peška L (2014) e-Shop user preferences via user behavior. In: 2014 11th international conference on e-Business (ICE-B). IEEE, pp 68–75

  126. Pacheco J, Hariri S (2018) Anomaly behavior analysis for IoT sensors. Trans Emerg Telecommun Technol 29(4):e3188

    Google Scholar 

  127. Pan Y, He F, Yu H, Li H (2019) Learning adaptive trust strength with user roles of truster and trustee for trust-aware recommender systems. Appl Intell 50:1–14

    Google Scholar 

  128. Pantic M, Pentland A, Nijholt A, Huang TS (2007) Human computing and machine understanding of human behavior: a survey. In: Artifical intelligence for human computing. Springer, pp 47–71

  129. Park DH, Kim HK, Choi IY, Kim JK (2012) A literature review and classification of recommender systems research. Expert Syst Appl 39(11):10059–10072

    Article  Google Scholar 

  130. Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Proc Mag 33(4):49–61

    Article  Google Scholar 

  131. Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: Online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 701–710

  132. Qin T, Guan X, Wang C, Liu Z (2015) MUCM: Multilevel user cluster mining based on behavior profiles for network monitoring. IEEE Syst J 9(4):1322–1333

    Article  Google Scholar 

  133. Qiu F, Cho J (2006) Automatic identification of user interest for personalized search. In: Proceedings of the 15th international conference on World Wide Web. ACM, pp 727–736

  134. Raeiszadeh M, Tahayori H, Visconti A (2019) Discovering varying patterns of normal and interleaved adls in smart homes. Appl Intell 49:1–14

    Article  Google Scholar 

  135. Ravisankar P, Ravi V, Rao GR, Bose I (2011) Detection of financial statement fraud and feature selection using data mining techniques. Decision Support Sys 50(2):491–500

    Article  Google Scholar 

  136. Raza S, Haider S (2011) Suspicious activity reporting using dynamic bayesian networks. Procedia Comput Sci 3:987–991

    Article  Google Scholar 

  137. Riva O, Qin C, Strauss K, Lymberopoulos D (2012) Progressive authentication: deciding when to authenticate on mobile phones. In: USENIX security symposium, microsoft research, pp 301–316

  138. Rožac B, Sernec R, Košir A, Kos A (2012) User behavior analysis based on identity management systems’ log data. Mach Learn 143:301

    Google Scholar 

  139. Ryu S, Kang YJ, Lee H (2018) A study on detection of anomaly behavior in automation industry. In: 2018 20th international conference on advanced communication technology (ICACT). IEEE, pp 377–380

  140. Sahu AK, Dwivedi P (2019) User profile as a bridge in cross-domain recommender systems for sparsity reduction. Appl Intell 49:1–21

    Article  Google Scholar 

  141. Saracino A, Sgandurra D, Dini G, Martinelli F (2018) Madam: Effective and efficient behavior-based android malware detection and prevention. IEEE Trans Depend Sec Comput 15(1):83–97

    Article  Google Scholar 

  142. Sarker IH, Colman A, Kabir MA, Han J (2016) Behavior-oriented time segmentation for mining individualized rules of mobile phone users. In: 2016 IEEE international conference on data science and advanced analytics (DSAA). IEEE, pp 488–497

  143. Science S (2004) Springer. https://link.springer.com/, [Online: accessed 08-Sept-2020]

  144. Sekizawa S, Inagaki S, Suzuki T, Hayakawa S, Tsuchida N, Tsuda T, Fujinami H (2007) Modeling and recognition of driving behavior based on stochastic switched ARX model. IEEE Trans Intell Transport Sys 8(4):593–606

    Article  Google Scholar 

  145. Shashanka M, Shen MY, Wang J (2016) User and entity behavior analytics for enterprise security. In: 2016 IEEE international conference on big data (big data). IEEE, pp 1867– 1874

  146. Shen C, Li Y, Chen Y, Guan X, Maxion RA (2018) Performance analysis of multi-motion sensor behavior for active smartphone authentication. IEEE Trans Inf Forensics Sec 13(1):48–62

    Article  Google Scholar 

  147. Shi B, Xu L, Hu J, Tang Y, Jiang H, Meng W, Liu H (2015) Evaluating driving styles by normalizing driving behavior based on personalized driver modeling. IEEE Trans Sys Man Cybern Sys 45(12):1502–1508

    Article  Google Scholar 

  148. Shi H, Chen L, Xu Z, Lyu D (2019) Personalized location recommendation using mobile phone usage information. Appl Intell 49:1–14

    Article  Google Scholar 

  149. Shrivastava G, Shrivastava S (2017) Analysis of customer behavior in online retail marketplace using Hadoop. Int J Innov Res Comput Sci Technol 5(5):376–380

    Article  Google Scholar 

  150. Shumway RH, Stoffer DS (2017) ARIMA models. In: Time series analysis and its applications. Springer, pp 75–163

  151. Sidman M (1960) Tactics of scientific research. Basic Books, Incorporated, Pub, New York

    Google Scholar 

  152. Sılahtaroğlu G, Dönertaşli H (2015) Analysis and prediction of E-customers’ behavior by mining clickstream data. In: 2015 IEEE International Conference on Big data (big data). IEEE, pp 1466–1472

  153. Singh K, Singh P, Kumar K (2018) User behavior analytics-based classification of application layer HTTP-GET flood attacks. J Netw Comput Appl 112:97–114

    Article  Google Scholar 

  154. Skinner BF (1953) Science and human behavior. Simon and Schuster, New York, p 92904

    Google Scholar 

  155. Slaninová K (2013) User behavioural patterns and reduced user profiles extracted from log files. In: 2013 13th international conference on intelligent systems design and applications (ISDA). IEEE, pp 289–294

  156. Somasundaram A, Reddy S (2019) Parallel and incremental credit card fraud detection model to handle concept drift and data imbalance. Neural Comput Applic 31(1):3–14

    Article  Google Scholar 

  157. Soviany S, Puşcoci S (2015) An optimized classification method for human behavioral patterns recognition. In: E-Health and bioengineering conference (EHB), 2015. IEEE, pp 1–4

  158. Srinivasan D, Choy MC, Cheu RL (2006) Neural networks for real-time traffic signal control. IEEE Trans Intell Transport Sys 7(3):261–272

    Article  Google Scholar 

  159. Stevanovic D, Vlajic N, An A (2013) Detection of malicious and non-malicious website visitors using unsupervised neural network learning. Appl Soft Comput 13(1):698–708

    Article  Google Scholar 

  160. Storey KB et al (2006) Evidence for a reduced transcriptional state during hibernation in ground squirrels. Cryobiology 53(3):310–318

    Article  Google Scholar 

  161. Suryadevara NK, Mukhopadhyay SC (2012) Wireless sensor network based home monitoring system for wellness determination of elderly. IEEE Sensors J 12(6):1965–1972

    Article  Google Scholar 

  162. Tai CS, Hong JH, Fu LC (2019) A real-time demand-side management system considering user behavior using deep q-learning in home area network. In: 2019 IEEE international conference on systems, man and cybernetics (SMC). IEEE, pp 4050–4055

  163. Tang B, Hu Q, Lin D (2017) Reducing false positives of user-to-entity first-access alerts for user behavior analytics. In: 2017 IEEE International conference on data mining workshops (ICDMW). IEEE, pp 804–811

  164. Tapia EM, Intille SS, Larson K (2004) Activity recognition in the home using simple and ubiquitous sensors. In: International conference on pervasive computing. Springer, pp 158–175

  165. Tax DM, Duin RP (1998) Outlier detection using classifier instability. In: Joint IAPR international workshops on statistical techniques in pattern recognition (SPR) and structural and syntactic pattern recognition (SSPR). Springer, pp 593–601

  166. The Association for Computing Machinery (1947) acm. https://dl.acm.org/, [Online: accessed 08-Sept-2020]

  167. Tseng VS, Chou CH, Yang KQ, Tseng JC (2017) A big data analytical framework for sports behavior mining and personalized health services. In: 2017 Conference on technologies and applications of artificial intelligence (TAAI). IEEE, pp 178–183

  168. Udantha M, Ranathunga S, Dias G (2016) Modelling website user behaviors by combining the EM and DBSCAN algorithms. In: Moratuwa engineering research conference (MERCon), 2016. IEEE, pp 168–173

  169. Wang Y, Chen Q, Kang C, Xia Q (2016) Clustering of electricity consumption behavior dynamics toward big data applications. IEEE Trans Smart Grid 7(5):2437–2447

    Article  Google Scholar 

  170. Wang Z, Tu L, Guo Z, Yang LT, Huang B (2014) Analysis of user behaviors by mining large network data sets. Futur Gener Comput Syst 37:429–437

    Article  Google Scholar 

  171. Wayman JL (2008) Biometrics in identity management systems. IEEE Sec Priv 6(2):30–37

    Article  Google Scholar 

  172. Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34(4):1302–1325

    Article  Google Scholar 

  173. Xie Y, Phoha VV (2001) Web user clustering from access log using belief function. In: Proceedings of the 1st international conference on knowledge capture. ACM, pp 202–208

  174. Xing K, Zhang B, Zhou B, Liu Y (2011) Behavior based user interests extraction algorithm. In: Internet of things (ithings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing. IEEE, pp 448–452

  175. Xu G, Zhang Y, Yi X (2008) Modelling user behaviour for web recommendation using lda model. In: Web intelligence and intelligent agent technology, 2008. WI-IAT’08. IEEE/WIC/ACM international conference on, IEEE, vol 3, pp 529–532

  176. Xu J, Liu H (2010) Web user clustering analysis based on KMeans algorithm. In: 2010 International conference on information, networking and automation (ICINA). IEEE, pp V2–6

  177. Yang J, Qiao Y, Zhang X, He H, Liu F, Cheng G (2014) Characterizing user behavior in mobile internet. IEEE Trans Emerg Topics in Computing 3(1):95–106

    Article  Google Scholar 

  178. Yang W, Zhang L, He Z, Zhuang L (2012) Optimized two-stage fuzzy control for urban traffic signals at isolated intersection and Paramics simulation. In: 2012 15th international IEEE conference on intelligent transportation systems. IEEE, pp 391–396

  179. Yang YC (2010) Web user behavioral profiling for user identification. Decis Support Syst 49 (3):261–271

    Article  Google Scholar 

  180. Yinan D, Hao Y, Zhenming L (2009) Broadband dial-up user behavior identification and analysis. In: 2nd IEEE international conference on broadband network & multimedia technology, 2009. IC-BNMT’09. IEEE, pp 316–322

  181. Zaman M, Siddiqui T, Amin MR, Hossain MS (2015) Malware detection in Android by network traffic analysis. In: 2015 International on networking systems and security (NSyss), pp 1–5. IEEE

  182. Zechel P, Streiter R, Bogenberger K, Goehner U (2019) Probabilistic interaction-aware occupancy prediction for vehicles in arbitrary road scenes. In: 2019 Third IEEE international conference on robotic computing (IRC). IEEE, pp 423–424

  183. Zhai S, Wang Z, Yan X, He G (2019) Appliance flexibility analysis considering user behavior in home energy management system using smart plugs. IEEE Trans Ind Electron 66(2):1391–1401

    Article  Google Scholar 

  184. Zhang W, Fan Q (2010) Identification of abnormal driving state based on driver’s model 2010 International on control automation and systems (ICCAS). IEEE, pp 14–18

  185. Zhang X, Han Y, Xu W, Wang Q (2019) Hoba: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture. Inf Sci

  186. Zhang Y, Yang R, Zhang K, Jiang H, Zhang JJ (2017) Consumption behavior analytics-aided energy forecasting and dispatch. IEEE Intell Syst 32(4):59–63

    Article  Google Scholar 

  187. Zhao P, Yan C, Jiang C (2016) Authenticating web user’s identity through browsing sequences modeling. In: 2016 IEEE 16th international conference on data mining workshops (ICDMW). IEEE, pp 335–342

  188. Zhou G, Mou N, Fan Y, Pi Q, Bian W, Zhou C, Zhu X, Gai K (2019) Deep interest evolution network for click-through rate prediction. In: Proceedings of the AAAI conference on artificial intelligence, vol 33, pp 5941–5948

Download references

Acknowledgments

Research supported by grants from the Spanish Ministry of Economy and Competitiveness, under the Retos-Colaboración program: SABERMED (Ref: RTC-2017-6253-1); and the Education, Youth and Sports Council of the Comunidad de Madrid and the European Social Fund of the European Union (Ref: PEJ-2017-AI/TIC-6403).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Fernández-Isabel.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

G. Martín, A., Fernández-Isabel, A., Martín de Diego, I. et al. A survey for user behavior analysis based on machine learning techniques: current models and applications. Appl Intell 51, 6029–6055 (2021). https://doi.org/10.1007/s10489-020-02160-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-020-02160-x

Keywords

Navigation