Skip to main content

A Behavior Predictive Control Mechanism Based on User Behavior Characteristics

  • Conference paper
  • First Online:
Communications, Signal Processing, and Systems (CSPS 2020)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 654))

Abstract

The detection of the user behavior characteristics is based on the network analysis technology. Through the analysis of the characteristics of user behavior, the network behavior of users is counted, and the characteristic database based on user behavior is established. The user behavior is compared with the characteristic database to predict whether the user behavior belongs to normal network behavior or abnormal network behavior. This detection method is relatively independent of the operating system and has strong universality. It can reflect the changes of the network environment and find the new abnormal behaviors of users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Denning DE (1987) An intrusion-detection model. IEEE Trans Softw Eng 13(2):222–232

    Article  Google Scholar 

  2. Huang C (2010) Research on detection and analysis methods of network abnormal behavior. Xi’an University of Electronic Science and Technology

    Google Scholar 

  3. Li M (2009) Research and implementation of unknown malicious code detection system based on network behavior analysis. University of Electronic Science and Technology

    Google Scholar 

  4. Zhang Y (2018) Research on malicious code detection technology based on clustering analysis of network behavior characteristics. Harbin University of Technology

    Google Scholar 

  5. Li SHY, Xi YG (2001) Generalized predictive control with fuzzy constraints. Chin J Sci Instrum 22(2):158–161

    Google Scholar 

Download references

Acknowledgements

Supported by National Natural Science Foundation of China (61901447, 11905239).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Caiqiu Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, M., Wang, Y., Zhou, C. (2021). A Behavior Predictive Control Mechanism Based on User Behavior Characteristics. In: Liang, Q., Wang, W., Liu, X., Na, Z., Li, X., Zhang, B. (eds) Communications, Signal Processing, and Systems. CSPS 2020. Lecture Notes in Electrical Engineering, vol 654. Springer, Singapore. https://doi.org/10.1007/978-981-15-8411-4_253

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8411-4_253

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8410-7

  • Online ISBN: 978-981-15-8411-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics