Abstract
Significant research has been carried out in the field of User Behavior Analysis, focused on understanding, modeling and predicting past, present and future behaviors of users. However, the heterogeneity of the approaches makes their comprehension very complicated. Thus, domain and Machine Learning experts have to work together to achieve their objectives. The main motivation for this work is to obtain an understanding of this field by providing a categorization of state-of-the-art works grouping them based on specific features. This paper presents a comprehensive survey of the existing literature in the areas of Cybersecurity, Networks, Safety and Health, and Service Delivery Improvement. The survey is organized based on four different topic-based features which categorize existing works: keywords, application domain, Machine Learning algorithm, and data type. This paper aims to thoroughly analyze the existing references, to promote the dissemination of state-of-the-art approaches discussing their strong and weak points, and to identify open challenges and prospective future research directions. In addition, 127 discussed papers have been scored and ranked according to relevance-based features: paper reputation, maximum author reputation, novelty, innovation and data quality. Both types of features, topic-based and relevance-based have been combined to build a similarity metric enabling a rich visualization of all considered publications. The obtained graphic representation provides a guide of recent advancements in User Behavior Analysis by topic, highlighting the most relevant ones.
Similar content being viewed by others
References
Abdallah A, Maarof MA, Zainal A (2016) Fraud detection system: a survey. J Netw Comput Appl 68:90–113
Afridi MW, Ali T, Alghamdi T, Ali T, Yasar M (2018) Android application behavioral analysis through intent monitoring. In: 2018 6th International symposium on digital forensic and security (ISDFS). IEEE, pp 1–8
Agard B, Morency C, Trépanier M (2006) Mining public transport user behaviour from smart card data. IFAC Proc 39(3):399–404
Akiyama T, Okushima M (2009) Analysis of railway user travel behaviour patterns of different age groups. IATSS Res 33(1):6–17
Alemdar H, Tunca C, Ersoy C (2015) Daily life behaviour monitoring for health assessment using machine learning: bridging the gap between domains. Pers Ubiquit Comput 19(2):303–315
Alieksieiev V, Strelnitskiy A, Gavva D, Gorelov D, Synytsia Y (2018) Studying of keystroke dynamics statistical properties for biometrie user authentication. In: 2018 14th International conference on advanced trends in radioelecrtronics, telecommunications and computer engineering (TCSET). IEEE, pp 559–563
Alimolaei S (2015) An intelligent system for user behavior detection in internet banking. In: 2015 4th Iranian joint congress on fuzzy and intelligent systems (CFIS). IEEE, pp 1–5
Aljohani O, Aljohani N, Bours P, Alsolami F (2018) Continuous authentication on PCs using artificial immune system. In: 2018 1St international conference on computer applications & information security (ICCAIS). IEEE, pp 1–6
Allen Institute for Artificial Intelligence (2015) Semantic scholar. https://www.semanticscholar.org/, [Online: accessed 08-Sept-2020]
Anguita D, Ghio A, Oneto L, Parra X, Reyes-Ortiz JL (2012) Human activity recognition on smartphones using a multiclass hardware-friendly support vector machine. In: International workshop on ambient assisted living. Springer, pp 216–223
Arbabzadeh N, Jafari M (2017) A data-driven approach for driving safety risk prediction using driver behavior and roadway information data. IEEE Trans Intell Transport Sys 19(2):446–460
Arel I, Liu C, Urbanik T, Kohls A (2010) Reinforcement learning-based multi-agent system for network traffic signal control. IET Intell Transp Syst 4(2):128–135
Arroyo JM, Conejo AJ (2000) Optimal response of a thermal unit to an electricity spot market. IEEE Trans Power Sys 15(3):1098–1104
Aztiria A, Izaguirre A, Basagoiti R, Augusto JC, Cook DJ (2010) Automatic modeling of frequent user behaviours in intelligent environments. In: 2010 Sixth international conference on intelligent environments (IE). IEEE, pp 7–12
Bai T, Zhao W X, He Y, Nie J Y, Wen J R (2018) Characterizing and predicting early reviewers for effective product marketing on e-commerce websites. IEEE Trans Knowl Data Eng 30(12):2271–2284
Balaji P, Srinivasan D (2010) Multi-agent system in urban traffic signal control. IEEE Comput Intell Mag 5(4):43–51
Banokin PI, Tsapko GP (2014) Architecture of software system for corporate and technological control software users’ behavior analysis. In: 2014 International conference on mechanical engineering, automation and control systems (MEACS). IEEE, pp 1–5
Bayer J (2010) Customer segmentation in the telecommunications industry. J Database Market Cust Strat Manag 17(3-4):247–256
Bhargava N, Sharma G, Bhargava R, Mathuria M (2013) Decision tree analysis on j48 algorithm for data mining. Proc Int J Adv Res Comput Sci Softw Eng 3(6):114–1119
Birant D, Kut A (2007) ST-DBSCAN: An algorithm for clustering spatial–temporal data. Data Knowl Eng 60(1):208–221
Bohge M, Trappe W (2003) An authentication framework for hierarchical ad hoc sensor networks. In: Proceedings of the 2nd ACM workshop on Wireless security. ACM, pp 79–87
Bouhoute A, Oucheikh R, Boubouh K, Berrada I (2018) Advanced driving behavior analytics for an improved safety assessment and driver fingerprinting. IEEE Trans Intell Transp Syst 20(6):2171–2184
Bourobou STM, Yoo Y (2015) User activity recognition in smart homes using pattern clustering applied to temporal ANN algorithm. Sensors 15(5):11953–11971
Brosso I, La Neve A, Bressan G, Ruggiero WV (2010) A continuous authentication system based on user behavior analysis. In: ARES’10 international conference on availability, reliability, and security, 2010. IEEE, pp 380–385
BV E (1997) ScienceDirect. https://www.sciencedirect.com/, [Online: accessed 08-Sept-2020]
Cai Y, Jiang H, Chen D, Huang MC (2018) Online learning classifier based behavioral biometric authentication. In: 2018 15th International conference on wearable and implantable body sensor networks (BSN). IEEE, pp 62–65
Cao L, Joachims T, Wang C, Gaussier E, Li J, Ou Y, Luo D, Zafarani R, Liu H, Xu G et al (2014) Behavior informatics: a new perspective. IEEE Intell Syst 29(4):62–80
Cao L, Philip SY, Kumar V (2015a) Nonoccurring behavior analytics: a new area. IEEE Intell Syst 30(6):4–11
Cao N, Shi C, Lin S, Lu J, Lin YR, Lin CY (2015b) Targetvue: Visual analysis of anomalous user behaviors in online communication systems. IEEE Trans Visual Comput Graph 22(1):280–289
Cao Z, Chi C, Hao R, Xiao Y (2008) User behavior modeling and traffic analysis of IMS presence servers. In: Global telecommunications conference, 2008. IEEE GLOBECOM 2008. IEEE, pp 1–5
Carter I (2017) Human behavior in the social environment: A social systems approach. Routledge, Abingdon
Čegan L, Filip P (2017) Advanced web analytics tool for mouse tracking and real-time data processing. In: 2017 IEEE 14th international scientific conference on informatics. IEEE, pp 431–435
Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surveys (CSUR) 41(3):15
Chen CM, Guan DJ, Huang YZ, Ou YH (2016) Anomaly network intrusion detection using hidden Markov model. Int J Innov Comput Inform Control 12:569–580
Chen L, Zhang Z, Liu Q, Yang L, Meng Y, Wang P (2019) A method for online transaction fraud detection based on individual behavior. In: Proceedings of the ACM turing celebration conference-China. ACM, p 119
Chen Y, Zheng Z, Chen S, Sun L, Chen D (2017) Mining customer preference in physical stores from interaction behavior. IEEE Access 5:17436–17449
Chung YW, Khaki B, Li T, Chu C, Gadh R (2019) Ensemble machine learning-based algorithm for electric vehicle user behavior prediction. Appl Energy 254:113732
Conroy NJ, Rubin VL, Chen Y (2015) Automatic deception detection: methods for finding fake news. In: Proceedings of the 78th ASIS&T annual meeting: information science with impact: research in and for the community. American Society for Information Science, p 82
De Lathauwer L, De Moor B, Vandewalle J (2000) A multilinear singular value decomposition. SIAM J Matrix Anal Appl 21(4):1253–1278
De Maesschalck R, Jouan-Rimbaud D, Massart DL (2000) The mahalanobis distance. Chemomet Intell Lab Sys 50(1):1–18
Deshpande D, Deshpande S (2017) Online user behavior: a decade’s perspective. In: 2017 International conference on trends in electronics and informatics (ICEI). IEEE, pp 977–984
Dinev T (2006) Why spoofing is serious internet fraud. Commun ACM 49(10):76–82
Ding N, He Q, Wu C, Fetzer J (2015) Modeling traffic control agency decision behavior for multimodal manual signal control under event occurrences. IEEE Trans Intell Transp Syst 16(5):2467–2478
Dollár P, Rabaud V, Cottrell G, Belongie S (2005) Behavior recognition via sparse spatio-temporal features. In: 2nd Joint IEEE international workshop on visual surveillance and performance evaluation of tracking and surveillance, 2005. IEEE, pp 65–72
Fahad LG, Tahir SF, Rajarajan M (2014) Activity recognition in smart homes using clustering based classification. In: 2014 22nd international conference on pattern recognition (ICPR). IEEE, pp 1348–1353
Faria R, Sousa J, Martins A, Lagarto J (2013) Modeling the strategic behavior of the iberian electricity market producers using time series analysis. In: 2013 10th international conference on the European energy market (EEM). IEEE, pp 1–5
Feng S, Zhang H, Cao J, Yao Y (2019) Merging user social network into the random walk model for better group recommendation. Appl Intell 49(6):2046–2058
Fernández-Isabel A, Fuentes-Fernández R (2011) An agent-based platform for traffic simulation. In: 6th international conference SOCO 2011 soft computing models in industrial and environmental applications. Springer, pp 505–514
Fernández-Isabel A, Prieto JC, Ortega F, de Diego IM, Moguerza JM, Mena J, Galindo S, Napalkova L (2018) A unified knowledge compiler to provide support the scientific community. Knowl-Based Syst 161:157–171
Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun ACM 59(7):96–104
Firdausi I, Erwin A, Nugroho A S, et al. (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second international conference on advances in computing, control and telecommunication technologies (ACT). IEEE, pp 201–203
Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Foren Sec 8(1):136–148
de Fuentes JM, Gonzalez-Manzano L, Ribagorda A (2018) Secure and usable user-in-a-context continuous authentication in smartphones leveraging non-assisted sensors. Sensors 18(4):1219
Gao Y, Ma Y, Li D (2017) Anomaly detection of malicious users’ behaviors for web applications based on web logs. In: 2017 IEEE 17th international conference on communication technology (ICCT). IEEE, pp 1352–1355
Georgiou T, Demiris Y (2015) Predicting car states through learned models of vehicle dynamics and user behaviours 2015 IEEE intelligent vehicles symposium (IV). IEEE, pp 1240–1245
Gilbert N, Doran J (2018) Simulating societies: the computer simulation of social phenomena. Routledge, Abingdon
Gindele T, Brechtel S, Dillmann R (2015) Learning driver behavior models from traffic observations for decision making and planning. IEEE Intell Transp Syst Mag 7(1):69–79
Giri R, Choi H, Hoo KS, Rao BD (2014) User behavior modeling in a cellular network using latent dirichlet allocation. In: International conference on intelligent data engineering and automated learning. Springer, pp 36–44
Giuffrida C, Majdanik K, Conti M, Bos H (2014) I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 92–111
Gomi H, Yamaguchi S, Tsubouchi K, Sasaya N (2018) Continuous authentication system using online activities. In: 2018 17Th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE). IEEE, pp 522–532
Groenen PJ, Jajuga K (2001) Fuzzy clustering with squared Minkowski distances. Fuzzy Sets Syst 120(2):227–237
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot): a vision, architectural elements, and future directions. Future Gen Comput Sys 29(7):1645–1660
Gurarie E, Bracis C, Delgado M, Meckley TD, Kojola I, Wagner CM (2016) What is the animal doing? Tools for exploring behavioural structure in animal movements. J Anim Ecol 85(1):69–84
Hand DJ (2007) Principles of data mining. Drug Saf 30(7):621–622
Hart C (2018) Doing a literature review: releasing the research imagination. Sage, Newcastle upon Tyne
Hegazy RD, Nasr OA (2015) A user behavior based handover optimization algorithm for LTE networks. In: 2015 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1255–1260
Hernández S, Álvarez P, Fabra J, Ezpeleta J (2017) Analysis of users’ behavior in structured e-commerce websites. IEEE Access 5:11941–11958
Higgs B, Abbas M (2014) Segmentation and clustering of car-following behavior: recognition of driving patterns. IEEE Trans Intell Transp Syst 16(1):81–90
Hilas CS, Mastorocostas PA (2008) An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl-Based Syst 21(7):721–726
Hospedales T, Gong S, Xiang T (2009) A markov clustering topic model for mining behaviour in video. In: 2009 IEEE 12th international conference on computer vision. IEEE, pp 1165–1172
Ibrahim A, Ouda A (2017) A hybrid-based filtering approach for user authentication. In: 2017 IEEE 30th Canadian conference on electrical and computer engineering (CCECE). IEEE, pp 1–5
Institute of Electrical and Electronics Engineers (1963) IEEE. https://ieeexplore.ieee.org/Xplore/home.jsp, [Online: accessed 08-Sept-2020]
Iyer D, Mohanpurkar A, Janardhan S, Rathod D, Sardeshmukh A (2011) Credit card fraud detection using hidden markov model. In: 2011 world congress on information and communication technologies (WICT). IEEE, pp 1062–1066
Jahangir H, Tayarani H, Ahmadian A, Golkar M A, Miret J, Tayarani M, Gao HO (2019) Charging demand of plug-in electric vehicles: forecasting travel behavior based on a novel rough artificial neural network approach. J Clean Prod 229:1029–1044
Jia D, Chen Z (2012) Traffic signal control optimization based on fuzzy neural network. In: Proceedings of 2012 international conference on measurement, information and control, vol 2. IEEE, pp 1015–1018
Jiang H, Yi S, Wu L, Leung H, Wang Y, Zhou X, Chen Y, Yang L (2018) Data-driven cell zooming for large-scale mobile networks. IEEE Trans Netw Serv Manag 15(1):156–168
Jurek A, Nugent C, Bi Y, Wu S (2014) Clustering-based ensemble learning for activity recognition in smart homes. Sensors 14(7):12285–12304
Karumur RP, Nguyen TT, Konstan JA (2018) Personality, user preferences and behavior in recommender systems. Inf Syst Front 20(6):1241–1265
Kasa N, Dahbura A, Ravoori C, Adams S (2019) Improving credit card fraud detection by profiling and clustering accounts. In: 2019 Systems and information engineering design symposium (SIEDS). IEEE, pp 1–6
Keralapura R, Nucci A, Zhang ZL, Gao L (2010) Profiling users in a 3g network using hourglass co-clustering. In: Proceedings of the sixteenth annual international conference on mobile computing and networking. ACM, pp 341–352
Kirschenbaum I, Wool A (2006) How to build a low-cost, extended-range RFID skimmer. In: USENIX security symposium, vol 4. The Advanced Computing System Association
Kolosnjaji B, Zarras A, Webster G, Eckert C (2016) Deep learning for classification of malware system call sequences. In: Australasian joint conference on artificial intelligence. Springer, pp 137–149
Kong X, Li M, Tang T, Tian K, Moreira-Matias L, Xia F (2018) Shared subway shuttle bus route planning based on transport data analytics. IEEE Trans Autom Sci Eng 15(99):1–14
Kuefler A, Morton J, Wheeler T, Kochenderfer M (2017) Imitating driver behavior with generative adversarial networks. In: 2017 IEEE intelligent vehicles symposium (IV). IEEE, pp 204–211
Laishram A, Padmanabhan V (2019) Discovery of user-item subgroups via genetic algorithm for effective prediction of ratings in collaborative filtering. Appl Intell 49:1–17
Laleh N, Carminati B, Ferrari E (2018) Risk assessment in social networks based on user anomalous behaviors. IEEE Trans Depend Sec Comput 15(2):295–308
Lampropoulos I, Vanalme GM, Kling WL (2010) A methodology for modeling the behavior of electricity prosumers within the smart grid. In: 2010 IEEE PES innovative smart grid technologies conference europe (ISGT Europe). IEEE, pp 1–8
Lazer DM, Baum MA, Benkler Y, Berinsky AJ, Greenhill KM, Menczer F, Metzger MJ, Nyhan B, Pennycook G, Rothschild D et al (2018) The science of fake news. Science 359 (6380):1094–1096
Leng B, Liu J, Pan H, Zhou S, Tsinghua ZN (2015) Topic model based behaviour modeling and clustering analysis for wireless network users. In: 2015 21st Asia-Pacific conference on communications (APCC). IEEE, pp 410–415
Levene M (2011) An introduction to search engines and web navigation. John Wiley & Sons, Hoboken
LeVine RA (2018) Culture, behavior, and personality: An introduction to the comparative study of psychosocial adaptation. Routledge, Abingdon
Li Q, Wu Q, Zhu C, Zhang J, Zhao W (2019) Unsupervised user behavior representation for fraud review detection with cold-start problem. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 222–236
Li Y, Hu H, Zhou G (2018) Using data augmentation in continuous authentication on smartphones. IEEE Int Things J 6(1):628–640
Li Z, Wang C (2017) Modeling data transport capacity of mobile networks for mobile social services. IEEE Access 5:12143–12157
Liang W, Wu Z, Cao J, Gu J (2018) Understanding customer behavior in shopping mall from indoor tracking data. In: 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD). IEEE, pp 648– 653
Lin R, Pei Z, Ye Z, Wu B, Yang G (2019) A voted based random forests algorithm for smart grid distribution network faults prediction. Enterprise Inf Sys 14:1–19
Lingam G, Rout RR, Somayajulu D (2019) Adaptive deep q-learning model for detecting social bots and influential users in online social networks. Appl Intell 49:1–18
Litan A (2004) Phishing attack victims likely targets for identity theft. Gartner Research, Stamford,
Litan A, Nicolett M (2014) Market guide for user behavior analytics
Liu C, He J (2017) Access control to web pages based on user browsing behavior. In: 2017 IEEE 9th international conference on communication software and networks (ICCSN). IEEE, pp 1016–1020
Liu H, Taniguchi T, Tanaka Y, Takenaka K, Bando T (2017) Visualization of driving behavior based on hidden feature extraction by using deep learning. IEEE Trans Intell Transp Syst 18(9):2477–2489
Liu W, Yan H, Zhou W, Lei Z (2010) Network user dial-up behavior analysis. In: 2010 international conference on future information technology and management engineering (FITME), vol 1. IEEE, pp 39–43
LLC G (2005) Google scholar. https://scholar.google.es/, [Online: accessed 08-Sept-2020]
Lotfi A, Langensiepen C, Mahmoud SM, Akhlaghinia MJ (2012) Smart homes for the elderly dementia sufferers: identification and prediction of abnormal behaviour. J Ambient Intell Human Comput 3 (3):205–218
Lu Z, Sagduyu Y (2016) Risk assessment based access control with text and behavior analysis for document management. In: Military communications conference, MILCOM 2016-2016 IEEE. IEEE, pp 37–42
Luo X, Jiang C, Wang W, Xu Y, Wang JH, Zhao W (2019) User behavior prediction in social networks using weighted extreme learning machine with distribution optimization. Futur Gener Comput Syst 93:1023–1035
Lvd M, Hinton G (2008) Visualizing data using t-SNE. J Mach Learn Res 9:2579–2605
Mahbub U, Chellappa R (2016) PATH: person authentication using trace histories. In: Ubiquitous computing, electronics & mobile communication conference (UEMCON), IEEE Annual. IEEE, pp 1–8
Manca M, Parvin P, Paternò F, Santoro C (2017) Detecting anomalous elderly behaviour in ambient assisted living. In: Proceedings of the ACM SIGCHI symposium on engineering interactive computing systems. ACM, pp 63–68
Mao J, Bian J, Bai G, Wang R, Chen Y, Xiao Y, Liang Z (2018) Detecting malicious behaviors in JavaScript applications. IEEE Access 6:12284–12294
Mirsky Y, Shapira B, Rokach L, Elovici Y (2015) pcstream: A stream clustering algorithm for dynamically detecting and managing temporal contexts. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 119–133
Mirsky Y, Shabtai A, Shapira B, Elovici Y, Rokach L (2017) Anomaly detection for smartphone data streams. Perv Mob Comput 35:83–107
Misbahuddin M, Bindhumadhava B, Dheeptha B (2017) Design of a risk based authentication system using machine learning techniques. In: 2017 IEEE Smartworld, ubiquitous intelligence & computing, advanced & trusted computed, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation. IEEE, pp 1–6
Miyajima C, Nishiwaki Y, Ozawa K, Wakita T, Itou K, Takeda K, Itakura F (2007) Driver modeling based on driving behavior and its evaluation in driver identification. Proc IEEE 95 (2):427–437
Mo Y, Chen J, Xie X, Luo C, Yang LT (2014) Cloud-based mobile multimedia recommendation system with user behavior information. IEEE Syst J 8(1):184–193
Moghaddam S, Helmy A (2011) Multidimensional modeling and analysis of wireless users online activity and mobility: A neural-networks map approach. In: Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems. ACM, pp 401–408
Molloy I, Dickens L, Morisset C, Cheng PC, Lobo J, Russo A (2012) Risk-based security decisions under uncertainty. In: Proceedings of the second ACM conference on data and application security and privacy. ACM, pp 157–168
Moon TK (1996) The expectation-maximization algorithm. IEEE Sig Process Mag 13(6):47–60
Moya MM, Koch MW, Hostetler LD (1993) One-class classifier networks for target recognition applications. NASA STI/Recon Technical Report 93:797–801
Muallem A, Shetty S, Pan JW, Zhao J, Biswal B (2017) Hoeffding tree algorithms for anomaly detection in streaming datasets: a survey. J Inf Secur 8(4):339–361
Narvekar M, Banu SS (2015) Predicting user’s web navigation behavior using hybrid approach. Procedia Comput Sci 45:3–12
Nasrabadi NM (2007) Pattern recognition and machine learning. J Elec Imag 16(4):049901
Nguyen HT, Walker CL, Walker EA (2018) A first course in fuzzy logic. CRC Press, Boca Raton
Nishiyama Y, Okoshi T, Yonezawa T, Nakazawa J, Takashio K, Tokuda H (2016) Toward health exercise behavior change for teams using lifelog sharing models. IEEE J Biomed Health Inf 20 (3):775–786
Ojtáš P, Peška L (2014) e-Shop user preferences via user behavior. In: 2014 11th international conference on e-Business (ICE-B). IEEE, pp 68–75
Pacheco J, Hariri S (2018) Anomaly behavior analysis for IoT sensors. Trans Emerg Telecommun Technol 29(4):e3188
Pan Y, He F, Yu H, Li H (2019) Learning adaptive trust strength with user roles of truster and trustee for trust-aware recommender systems. Appl Intell 50:1–14
Pantic M, Pentland A, Nijholt A, Huang TS (2007) Human computing and machine understanding of human behavior: a survey. In: Artifical intelligence for human computing. Springer, pp 47–71
Park DH, Kim HK, Choi IY, Kim JK (2012) A literature review and classification of recommender systems research. Expert Syst Appl 39(11):10059–10072
Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Proc Mag 33(4):49–61
Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: Online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 701–710
Qin T, Guan X, Wang C, Liu Z (2015) MUCM: Multilevel user cluster mining based on behavior profiles for network monitoring. IEEE Syst J 9(4):1322–1333
Qiu F, Cho J (2006) Automatic identification of user interest for personalized search. In: Proceedings of the 15th international conference on World Wide Web. ACM, pp 727–736
Raeiszadeh M, Tahayori H, Visconti A (2019) Discovering varying patterns of normal and interleaved adls in smart homes. Appl Intell 49:1–14
Ravisankar P, Ravi V, Rao GR, Bose I (2011) Detection of financial statement fraud and feature selection using data mining techniques. Decision Support Sys 50(2):491–500
Raza S, Haider S (2011) Suspicious activity reporting using dynamic bayesian networks. Procedia Comput Sci 3:987–991
Riva O, Qin C, Strauss K, Lymberopoulos D (2012) Progressive authentication: deciding when to authenticate on mobile phones. In: USENIX security symposium, microsoft research, pp 301–316
Rožac B, Sernec R, Košir A, Kos A (2012) User behavior analysis based on identity management systems’ log data. Mach Learn 143:301
Ryu S, Kang YJ, Lee H (2018) A study on detection of anomaly behavior in automation industry. In: 2018 20th international conference on advanced communication technology (ICACT). IEEE, pp 377–380
Sahu AK, Dwivedi P (2019) User profile as a bridge in cross-domain recommender systems for sparsity reduction. Appl Intell 49:1–21
Saracino A, Sgandurra D, Dini G, Martinelli F (2018) Madam: Effective and efficient behavior-based android malware detection and prevention. IEEE Trans Depend Sec Comput 15(1):83–97
Sarker IH, Colman A, Kabir MA, Han J (2016) Behavior-oriented time segmentation for mining individualized rules of mobile phone users. In: 2016 IEEE international conference on data science and advanced analytics (DSAA). IEEE, pp 488–497
Science S (2004) Springer. https://link.springer.com/, [Online: accessed 08-Sept-2020]
Sekizawa S, Inagaki S, Suzuki T, Hayakawa S, Tsuchida N, Tsuda T, Fujinami H (2007) Modeling and recognition of driving behavior based on stochastic switched ARX model. IEEE Trans Intell Transport Sys 8(4):593–606
Shashanka M, Shen MY, Wang J (2016) User and entity behavior analytics for enterprise security. In: 2016 IEEE international conference on big data (big data). IEEE, pp 1867– 1874
Shen C, Li Y, Chen Y, Guan X, Maxion RA (2018) Performance analysis of multi-motion sensor behavior for active smartphone authentication. IEEE Trans Inf Forensics Sec 13(1):48–62
Shi B, Xu L, Hu J, Tang Y, Jiang H, Meng W, Liu H (2015) Evaluating driving styles by normalizing driving behavior based on personalized driver modeling. IEEE Trans Sys Man Cybern Sys 45(12):1502–1508
Shi H, Chen L, Xu Z, Lyu D (2019) Personalized location recommendation using mobile phone usage information. Appl Intell 49:1–14
Shrivastava G, Shrivastava S (2017) Analysis of customer behavior in online retail marketplace using Hadoop. Int J Innov Res Comput Sci Technol 5(5):376–380
Shumway RH, Stoffer DS (2017) ARIMA models. In: Time series analysis and its applications. Springer, pp 75–163
Sidman M (1960) Tactics of scientific research. Basic Books, Incorporated, Pub, New York
Sılahtaroğlu G, Dönertaşli H (2015) Analysis and prediction of E-customers’ behavior by mining clickstream data. In: 2015 IEEE International Conference on Big data (big data). IEEE, pp 1466–1472
Singh K, Singh P, Kumar K (2018) User behavior analytics-based classification of application layer HTTP-GET flood attacks. J Netw Comput Appl 112:97–114
Skinner BF (1953) Science and human behavior. Simon and Schuster, New York, p 92904
Slaninová K (2013) User behavioural patterns and reduced user profiles extracted from log files. In: 2013 13th international conference on intelligent systems design and applications (ISDA). IEEE, pp 289–294
Somasundaram A, Reddy S (2019) Parallel and incremental credit card fraud detection model to handle concept drift and data imbalance. Neural Comput Applic 31(1):3–14
Soviany S, Puşcoci S (2015) An optimized classification method for human behavioral patterns recognition. In: E-Health and bioengineering conference (EHB), 2015. IEEE, pp 1–4
Srinivasan D, Choy MC, Cheu RL (2006) Neural networks for real-time traffic signal control. IEEE Trans Intell Transport Sys 7(3):261–272
Stevanovic D, Vlajic N, An A (2013) Detection of malicious and non-malicious website visitors using unsupervised neural network learning. Appl Soft Comput 13(1):698–708
Storey KB et al (2006) Evidence for a reduced transcriptional state during hibernation in ground squirrels. Cryobiology 53(3):310–318
Suryadevara NK, Mukhopadhyay SC (2012) Wireless sensor network based home monitoring system for wellness determination of elderly. IEEE Sensors J 12(6):1965–1972
Tai CS, Hong JH, Fu LC (2019) A real-time demand-side management system considering user behavior using deep q-learning in home area network. In: 2019 IEEE international conference on systems, man and cybernetics (SMC). IEEE, pp 4050–4055
Tang B, Hu Q, Lin D (2017) Reducing false positives of user-to-entity first-access alerts for user behavior analytics. In: 2017 IEEE International conference on data mining workshops (ICDMW). IEEE, pp 804–811
Tapia EM, Intille SS, Larson K (2004) Activity recognition in the home using simple and ubiquitous sensors. In: International conference on pervasive computing. Springer, pp 158–175
Tax DM, Duin RP (1998) Outlier detection using classifier instability. In: Joint IAPR international workshops on statistical techniques in pattern recognition (SPR) and structural and syntactic pattern recognition (SSPR). Springer, pp 593–601
The Association for Computing Machinery (1947) acm. https://dl.acm.org/, [Online: accessed 08-Sept-2020]
Tseng VS, Chou CH, Yang KQ, Tseng JC (2017) A big data analytical framework for sports behavior mining and personalized health services. In: 2017 Conference on technologies and applications of artificial intelligence (TAAI). IEEE, pp 178–183
Udantha M, Ranathunga S, Dias G (2016) Modelling website user behaviors by combining the EM and DBSCAN algorithms. In: Moratuwa engineering research conference (MERCon), 2016. IEEE, pp 168–173
Wang Y, Chen Q, Kang C, Xia Q (2016) Clustering of electricity consumption behavior dynamics toward big data applications. IEEE Trans Smart Grid 7(5):2437–2447
Wang Z, Tu L, Guo Z, Yang LT, Huang B (2014) Analysis of user behaviors by mining large network data sets. Futur Gener Comput Syst 37:429–437
Wayman JL (2008) Biometrics in identity management systems. IEEE Sec Priv 6(2):30–37
Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34(4):1302–1325
Xie Y, Phoha VV (2001) Web user clustering from access log using belief function. In: Proceedings of the 1st international conference on knowledge capture. ACM, pp 202–208
Xing K, Zhang B, Zhou B, Liu Y (2011) Behavior based user interests extraction algorithm. In: Internet of things (ithings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing. IEEE, pp 448–452
Xu G, Zhang Y, Yi X (2008) Modelling user behaviour for web recommendation using lda model. In: Web intelligence and intelligent agent technology, 2008. WI-IAT’08. IEEE/WIC/ACM international conference on, IEEE, vol 3, pp 529–532
Xu J, Liu H (2010) Web user clustering analysis based on KMeans algorithm. In: 2010 International conference on information, networking and automation (ICINA). IEEE, pp V2–6
Yang J, Qiao Y, Zhang X, He H, Liu F, Cheng G (2014) Characterizing user behavior in mobile internet. IEEE Trans Emerg Topics in Computing 3(1):95–106
Yang W, Zhang L, He Z, Zhuang L (2012) Optimized two-stage fuzzy control for urban traffic signals at isolated intersection and Paramics simulation. In: 2012 15th international IEEE conference on intelligent transportation systems. IEEE, pp 391–396
Yang YC (2010) Web user behavioral profiling for user identification. Decis Support Syst 49 (3):261–271
Yinan D, Hao Y, Zhenming L (2009) Broadband dial-up user behavior identification and analysis. In: 2nd IEEE international conference on broadband network & multimedia technology, 2009. IC-BNMT’09. IEEE, pp 316–322
Zaman M, Siddiqui T, Amin MR, Hossain MS (2015) Malware detection in Android by network traffic analysis. In: 2015 International on networking systems and security (NSyss), pp 1–5. IEEE
Zechel P, Streiter R, Bogenberger K, Goehner U (2019) Probabilistic interaction-aware occupancy prediction for vehicles in arbitrary road scenes. In: 2019 Third IEEE international conference on robotic computing (IRC). IEEE, pp 423–424
Zhai S, Wang Z, Yan X, He G (2019) Appliance flexibility analysis considering user behavior in home energy management system using smart plugs. IEEE Trans Ind Electron 66(2):1391–1401
Zhang W, Fan Q (2010) Identification of abnormal driving state based on driver’s model 2010 International on control automation and systems (ICCAS). IEEE, pp 14–18
Zhang X, Han Y, Xu W, Wang Q (2019) Hoba: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture. Inf Sci
Zhang Y, Yang R, Zhang K, Jiang H, Zhang JJ (2017) Consumption behavior analytics-aided energy forecasting and dispatch. IEEE Intell Syst 32(4):59–63
Zhao P, Yan C, Jiang C (2016) Authenticating web user’s identity through browsing sequences modeling. In: 2016 IEEE 16th international conference on data mining workshops (ICDMW). IEEE, pp 335–342
Zhou G, Mou N, Fan Y, Pi Q, Bian W, Zhou C, Zhu X, Gai K (2019) Deep interest evolution network for click-through rate prediction. In: Proceedings of the AAAI conference on artificial intelligence, vol 33, pp 5941–5948
Acknowledgments
Research supported by grants from the Spanish Ministry of Economy and Competitiveness, under the Retos-Colaboración program: SABERMED (Ref: RTC-2017-6253-1); and the Education, Youth and Sports Council of the Comunidad de Madrid and the European Social Fund of the European Union (Ref: PEJ-2017-AI/TIC-6403).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
G. Martín, A., Fernández-Isabel, A., Martín de Diego, I. et al. A survey for user behavior analysis based on machine learning techniques: current models and applications. Appl Intell 51, 6029–6055 (2021). https://doi.org/10.1007/s10489-020-02160-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-020-02160-x