Abstract
We address the problem of identifying in-app user actions from Web access logs when the content of those logs is both encrypted (through HTTPS) and also contains automated Web accesses. We find that the distribution of time gaps between HTTPS accesses can distinguish user actions from automated Web accesses generated by the apps, and we determine that it is reasonable to identify meaningful user actions within mobile Web logs by modelling this temporal feature. A real-world experiment is conducted with multiple mobile devices running some popular apps, and the results show that the proposed clustering-based method achieves good accuracy in identifying user actions, and outperforms the state-of-the-art baseline by \(17.84\%\).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
References
Arora, D., Neville, S.W., Li, K.F.: Mining wifi data for business intelligence. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 394–398, October 2013. https://doi.org/10.1109/3PGCIC.2013.67
Buehrer, G., Stokes, J.W., Chellapilla, K.: A large-scale study of automated web search traffic. In: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, AIRWeb 2008, pp. 1–8 (2008)
Bulut, E., Szymanski, B.K.: Understanding user behavior via mobile data analysis. In: 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 1563–1568, June 2015. https://doi.org/10.1109/ICCW.2015.7247402
Chen, L., Li, Z., Ju, S.: Based on forward reference object transaction identification algorithm on web mining. In: ALPIT 2007, pp. 469–473, August 2007
Cooley, R., Mobasher, B., Srivastava, J.: Grouping web page references into transactions for mining world wide web browsing patterns. In: Proceedings 1997 IEEE Knowledge and Data Engineering Exchange Workshop, pp. 2–9, November 1997. https://doi.org/10.1109/KDEX.1997.629824
Cooley, R., Mobasher, B., Srivastava, J.: Data preparation for mining world wide web browsing patterns. KIS 1(1), 5–32 (1999)
Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise, pp. 226–231. AAAI Press (1996)
Fan, Y.C., Chen, Y.C., Tung, K.C., Wu, K.C., Chen, A.L.P.: A framework for enabling user preference profiling through wi-fi logs. IEEE Trans. Knowl. Data Eng. 28(3), 592–603 (2016). https://doi.org/10.1109/TKDE.2015.2489657
Foss, A., Wang, W., Zaïane, O.R.: A non-parametric approach to web log analysis (2001)
Gu, Y., Quan, L., Ren, F.: Wifi-assisted human activity recognition. In: 2014 IEEE Asia Pacific Conference on Wireless and Mobile, pp. 60–65, August 2014. https://doi.org/10.1109/APWiMob.2014.6920266
Guerbas, A., Addam, O., Zaarour, O., Nagi, M., Elhajj, A., Ridley, M., Alhajj, R.: Effective web log mining and online navigational pattern prediction. Knowl. Based Syst. 49(Supplement C), 50–62 (2013). https://doi.org/10.1016/j.knosys.2013.04.014. http://www.sciencedirect.com/science/article/pii/S0950705113001263
Huang, J., Xu, F., Lin, Y., Li, Y.: On the understanding of interdependency of mobile app usage. In: 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 471–475, October 2017. https://doi.org/10.1109/MASS.2017.89
Lee, J., Seeling, P.: An overview of mobile device network traffic and network interface usage patterns. In: IEEE EIT 2013, pp. 1–5, May 2013
Li, Y., Feng, B.: The construction of transactions for web usage mining. In: CINC 2009, vol. 1, pp. 121–124, June 2009
Mead, S., Veeramachaneni, N., Seeling, P.: An overview of mobile device network activities: characteristics of heterogeneous network interfaces. In: CCNC 2016, pp. 305–306 (2016)
Morichetta, A., Bocchi, E., Metwalley, H., Mellia, M.: Clue: clustering for mining web urls. In: 2016 28th International Teletraffic Congress (ITC 28), vol. 01, pp. 286–294, September 2016. https://doi.org/10.1109/ITC-28.2016.146
Qian, F., Wang, Z., Gao, Y., Huang, J., Gerber, A., Mao, Z., Sen, S., Spatscheck, O.: Periodic transfers in mobile applications: network-wide origin, impact, and optimization. In: Proceedings of the 21st International Conference on World Wide Web, WWW 2012, pp. 51–60. ACM, New York (2012). https://doi.org/10.1145/2187836.2187844, http://doi.acm.org/10.1145/2187836.2187844
Sadri, A., Ren, Y., Salim, F.D.: Information gain-based metric for recognizing transitions in human activities. Pervasive Mob. Comput. 38(Part 1), 92–109 (2017). https://doi.org/10.1016/j.pmcj.2017.01.003. http://www.sciencedirect.com/science/article/pii/S1574119217300081
Shu-yue, M., Wen-cai, L., Shuo, W.: The study on the preprocessing in web log mining. In: KAM 2011, pp. 315–317 (2011)
Suadaa, L.H.: A survey on web usage mining techniques and applications. In: 2014 International Conference on Information Technology Systems and Innovation (ICITSI), pp. 39–43, November 2014. https://doi.org/10.1109/ICITSI.2014.7048235
Woon, Y.K., Ng, W.K., Lim, E.P.: Online and incremental mining of separately-grouped web access logs. In: Proceedings of the Third International Conference on Web Information Systems Engineering, WISE 2002, pp. 53–62, December 2002. https://doi.org/10.1109/WISE.2002.1181643
Acknowledgments
This research is supported by LPDP (Indonesia Endowment Fund for Education) and a Linkage Project grant of the Australian Research Council (LP120200413).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Priyogi, B., Sanderson, M., Salim, F., Chan, J., Tomko, M., Ren, Y. (2018). Identifying In-App User Actions from Mobile Web Logs. In: Phung, D., Tseng, V., Webb, G., Ho, B., Ganji, M., Rashidi, L. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2018. Lecture Notes in Computer Science(), vol 10938. Springer, Cham. https://doi.org/10.1007/978-3-319-93037-4_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-93037-4_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93036-7
Online ISBN: 978-3-319-93037-4
eBook Packages: Computer ScienceComputer Science (R0)