Identification of the Use of Unauthorized Apps in the O2O Service by Combining Online Events and Offline Conditions
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Changoh | - |
dc.contributor.author | Kim, Huy Kang | - |
dc.date.accessioned | 2021-08-30T09:47:17Z | - |
dc.date.available | 2021-08-30T09:47:17Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2020-11 | - |
dc.identifier.issn | 2079-9292 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/52029 | - |
dc.description.abstract | A model for detecting unauthorized Apps use events by combined analysis of situation information in an offline service and user behavior in an online environment is proposed. The detection and response to abnormal behavior in the O2O service environment can be focused on providers, whose decisions change dynamically based on the offline market status and conditions. However, the method for identifying the user's tools and detecting the usage pattern of the service user were developed in the existing online service environment. Thus, in order to identify abnormal behavior in the O2O service environment, we conducted an experiment to identify the abnormal behavior of providers of smart mobility services, a representative O2O service. In the experiment, the range of normal behavior of a taxi drivers was identified, which was prepared on the basis of the test result directly executed by an expert. The optimal features were selected in order to effectively detect abnormal behavior from the event data relating to the service call acceptance behavior. In addition, by processing the collected data based on the selected features by using various machine-learning classification algorithms, we derived a detection and prediction model that is 98.28% accurate with a prediction result of more than 74% based on the F1 score. Based on these results, we expect to be able to respond to abnormal behavior that may occur in various types of O2O services. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.subject | BOT DETECTION | - |
dc.title | Identification of the Use of Unauthorized Apps in the O2O Service by Combining Online Events and Offline Conditions | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Huy Kang | - |
dc.identifier.doi | 10.3390/electronics9111977 | - |
dc.identifier.scopusid | 2-s2.0-85096946583 | - |
dc.identifier.wosid | 000592823300001 | - |
dc.identifier.bibliographicCitation | ELECTRONICS, v.9, no.11 | - |
dc.relation.isPartOf | ELECTRONICS | - |
dc.citation.title | ELECTRONICS | - |
dc.citation.volume | 9 | - |
dc.citation.number | 11 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Physics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
dc.subject.keywordPlus | BOT DETECTION | - |
dc.subject.keywordAuthor | abnormal behavior detection | - |
dc.subject.keywordAuthor | O2O service | - |
dc.subject.keywordAuthor | unauthorized method | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.