Construction of Network User Behavior Spectrum in Big Data Environment

  • Mengyao Xu
  • Fangfei Yan
  • Biao Wang
  • Shuping YiEmail author
  • Qian Yi
  • Shiquan Xiong
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 924)


Studying the behavior patterns of network users is important for understanding the individual needs and identifying the identity of users. In this paper, the behavior patterns of network users are built by constructing the behavior spectrum of network users. Network users’ behavior spectrum is constructed by dividing the behaviors of users into perceptual state and physiological state. The perceptual state is divided into other features according to the actual situation. The data of the enterprise is used to establish a method of user behavior spectrum based on perceptual state. The physiological state is represented by the features of mouse behavior. The data of self-built website is used to explore a method of user behavior spectrum based on the physiological state. Finally, an example is used to establish a user’s behavior spectrum based on two methods.


Network user behavior spectrum Perceptual state Physiological state Big data 



This work was supported by Fundamental Research Funds for the Central Universities NO. 106112016CDJXY110003, 2016.1-2017.12 and the National Natural Science Foundation of China under Grant No. 71671020.


  1. 1.
    Frhan, A.J.: Visualization and analysis of user behaviour patterns for multimedia content view in social networks. In: 5th ISEEE International Symposium on Electrical and Electronics Engineering, pp. 1–7. IEEE Press, Galati, Romania (2017)Google Scholar
  2. 2.
    Qiang, W., Ji-min, L., Wan-hai, Y., et al.: User identification in the preprocessing of web log mining. Comput. Sci. 29(4), 64–66 (2002)Google Scholar
  3. 3.
    Zhu, T., Wang, B., Wu, B., et al.: Role defining using behavior-based clustering in telecommunication network. Expert Syst. Appl. 38(4), 3902–3908 (2011)CrossRefGoogle Scholar
  4. 4.
    Katerina, T., Nicolaos, P.: Mouse behavioral patterns and keystroke dynamics in end-user development: what can they tell us about users’ behavioral attributes? Comput. Hum. Behav. 83, 288–305 (2018)CrossRefGoogle Scholar
  5. 5.
    Nishida, T., Kano, T., Goodall, J., et al.: Ethogram and ethnography of Mahale chimpanzees. Anthropol. Sci. 107(2), 141–168 (1999)CrossRefGoogle Scholar
  6. 6.
    Hall, C., Heleski, C.: The Role of the ethogram in equitation science. Appl. Anim. Behav. Sci. (2017)Google Scholar
  7. 7.
    Ivanov, D.G., Krupina, N.A.: Changes in the ethogram in rats due to contagion behavior. Neurosci. Behav. Physiol. 47(8), 987–993 (2017)CrossRefGoogle Scholar
  8. 8.
    Qin, T., et al.: Behavior spectrum: an effective method for user’s web access behavior monitoring and measurement. In: IEEE Global Communications Conference, pp. 961–966 (2013)Google Scholar
  9. 9.
    Schacter, D.L.: Psychology. Worth Publishers, New York (2011)Google Scholar
  10. 10.
    Prosser, C.L.: Comparative Animal Physiology, Environmental and Metabolic Animal Physiology, 4th edn, pp. 1–12. Wiley-Liss, Hoboken (1991). ISBN 0-471-85767-XGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Mengyao Xu
    • 1
  • Fangfei Yan
    • 1
  • Biao Wang
    • 1
  • Shuping Yi
    • 1
    Email author
  • Qian Yi
    • 1
  • Shiquan Xiong
    • 1
  1. 1.College of Mechanical EngineeringChongqing UniversityChongqingChina

Personalised recommendations