Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Free access
Just Accepted

Mobile User Traffic Generation via Multi-Scale Hierarchical GAN

Online AM: 10 May 2024 Publication History
  • Get Citation Alerts
  • Abstract

    Mobile user traffic facilitates diverse applications, including network planning and optimization, whereas large-scale mobile user traffic is hardly available due to privacy concerns. One alternative solution is to generate mobile user traffic data for downstream applications. However, existing generation models cannot simulate the multi-scale temporal dynamics in mobile user traffic on individual and aggregate levels. In this work, we propose a multi-scale hierarchical generative adversarial network (MSH-GAN) containing multiple generators and a multi-class discriminator. Specifically, the mobile traffic usage behavior exhibits a mixture of multiple behavior patterns, which are called micro-scale behavior patterns and are modeled by different pattern generators in our model. Moreover, the traffic usage behavior of different users exhibits strong clustering characteristics, with the co-existence of users with similar and different traffic usage behaviors. Thus, we model each cluster of users as a class in the discriminator’s output, referred to as macro-scale user clusters. Then, the gap between micro-scale behavior patterns and macro-scale user clusters is bridged by introducing the switch mode generators, which describe the traffic usage behavior in switching between different patterns. All users share the pattern generators. In contrast, the switch mode generators are only shared by a specific cluster of users, which models the multi-scale hierarchical structure of the traffic usage behavior of massive users. Finally, we urge MSH-GAN to learn the multi-scale temporal dynamics via a combined loss function, including adversarial loss, clustering loss, aggregated loss, and regularity terms. Extensive experiment results demonstrate that MSH-GAN outperforms state-of-art baselines by at least 118.17% in critical data fidelity and usability metrics. Moreover, observations show that MSH-GAN can simulate traffic patterns and pattern switch behaviors.

    References

    [1]
    Statista. Number of smartphone mobile network subscriptions worldwide from 2016 to 2022. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/. 2023.
    [2]
    Diala Naboulsi, Marco Fiore, Stephane Ribot, and Razvan Stanica. Large-scale mobile traffic analysis: a survey. IEEE Communications Surveys & Tutorials, 18(1):124–161, 2015.
    [3]
    Mauro Conti, Qian Qian Li, Alberto Maragno, and Riccardo Spolaor. The dark side (-channel) of mobile devices: A survey on network traffic analysis. IEEE communications surveys & tutorials, 20(4):2658–2713, 2018.
    [4]
    Tapio Soikkeli and Antti Riikonen. Session level network usage patterns of mobile handsets. In 2015 13th International Conference on Telecommunications (ConTEL), pages 1–8. IEEE, 2015.
    [5]
    Xuetao Wei, Nicholas C Valler, Harsha V Madhyastha, Iulian Neamtiu, and Michalis Faloutsos. Characterizing the behavior of handheld devices and its implications. Computer Networks, 114:1–12, 2017.
    [6]
    Guangyi Liu, Juan Deng, and Qingbi Zheng. 6G autonomous mobile network enabled by digital twin network. ZTE technology journal, 29(3):2–7, 2023.
    [7]
    Xiangyang Duan, Honghui Kang, Xingzai Lyu, and Rui Hua. Digital twin technology for wireless access network oriented to 6G. ZTE technology journal, 29(3):32–37, 2023.
    [8]
    Jiahui Gong, Qiaohong Yu, Tong Li, Haoqiang Liu, Jun Zhang, Hangyu Fan, Depeng Jin, and Yong Li. Scalable digital twin system for mobile networks with generative ai. In Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services, pages 610–611, 2023.
    [9]
    Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, and Zhongtian Jia. Trafficav: An effective and explainable detection of mobile malware behavior using network traffic. In 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), pages 1–6. IEEE, 2016.
    [10]
    Anshul Arora and Sateesh K Peddoju. Minimizing network traffic features for android mobile malware detection. In Proceedings of the 18th International Conference on Distributed Computing and Networking, pages 1–10, 2017.
    [11]
    Jonathan Crussell, Ryan Stevens, and Hao Chen. Madfraud: Investigating ad fraud in android applications. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services, pages 123–134, 2014.
    [12]
    Marco V Barbera, Alessandro Epasto, Alessandro Mei, Vasile C Perta, and Julinda Stefa. Signals from the crowd: uncovering social relationships through smartphone probes. In Proceedings of the 2013 conference on Internet measurement conference, pages 265–276, 2013.
    [13]
    Raphael Spreitzer, Simone Griesmayr, Thomas Korak, and Stefan Mangard. Exploiting data-usage statistics for website fingerprinting attacks on android. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pages 49–60, 2016.
    [14]
    Guiyang Luo, Quan Yuan, Jinglin Li, Shangguang Wang, and Fangchun Yang. Artificial intelligence powered mobile networks: From cognition to decision. IEEE Network, 36(3):136–144, 2022.
    [15]
    Shuangfeng Han, I Chih-Lin, Gang Li, Sen Wang, and Qi Sun. Big data enabled mobile network design for 5g and beyond. IEEE Communications Magazine, 55(9):150–157, 2017.
    [16]
    Wenzhen Huang, Tong Li, Yuting Cao, Zhe Lyu, Yanping Liang, Li Yu, Depeng Jin, Junge Zhang, and Yong Li. Safe-NORA: Safe reinforcement learning-based mobile network resource allocation for diverse user demands. In Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, pages 885–894, 2023.
    [17]
    Tong Li and Yong Li. Artificial intelligence for reducing the carbon emissions of 5G networks in china. Nature Sustainability, 6(12):1522–1523, 2023.
    [18]
    Zhu Xiao, Jianzhi Yu, Tong Li, Zhiyang Xiang, Dong Wang, and Wenjie Chen. Resource allocation via hierarchical clustering in dense small cell networks: A correlated equilibrium approach. In 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pages 1–5. IEEE, 2016.
    [19]
    Tong Li, Yali Fan, Yong Li, Sasu Tarkoma, and Pan Hui. Understanding the long-term evolution of mobile app usage. IEEE Transactions on Mobile Computing, 22(2):1213–1230, 2023.
    [20]
    Tong Li, Yong Li, Mingyang Zhang, Sasu Tarkoma, and Pan Hui. You are how you use apps: user profiling based on spatiotemporal app usage behavior. ACM Transactions on Intelligent Systems and Technology, 14(4):1–21, 2023.
    [21]
    Gergely Acs, Gergely Biczók, and Claude Castelluccia. Privacy-preserving release of spatio-temporal density. In Handbook of Mobile Data Privacy, pages 307–335. Springer, 2018.
    [22]
    Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. Rappor: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pages 1054–1067, 2014.
    [23]
    Tong Li, Tong Xia, Huandong Wang, Zhen Tu, Sasu Tarkoma, Zhu Han, and Pan Hui. Smartphone app usage analysis: datasets, methods, and applications. IEEE Communications Surveys & Tutorials, 24(2):937–966, 2022.
    [24]
    Ke Huang, Chunhui Zhang, Xiaoxiao Ma, and Guanling Chen. Predicting mobile application usage using contextual information. In proceedings of the 2012 ACM conference on ubiquitous computing, pages 1059–1065, 2012.
    [25]
    Jian-Hui Duan, Wenzhong Li, Xiao Zhang, and Sanglu Lu. Forecasting fine-grained city-scale cellular traffic with sparse crowdsourced measurements. Computer Networks, 214:109156, 2022.
    [26]
    Adriel Cheng. Pac-gan: Packet generation of network traffic using generative adversarial networks. In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pages 0728–0734. IEEE, 2019.
    [27]
    Baik Dowoo, Yujin Jung, and Changhee Choi. Pcapgan: Packet capture file generator by style-based generative adversarial networks. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), pages 1149–1154. IEEE, 2019.
    [28]
    Yucheng Yin, Zinan Lin, Minhao Jin, Giulia Fanti, and Vyas Sekar. Practical gan-based synthetic ip header trace generation using netshare. In Proceedings of the ACM SIGCOMM 2022 Conference, pages 458–472, 2022.
    [29]
    Markus Ring, Daniel Schlör, Dieter Landes, and Andreas Hotho. Flow-based network traffic generation using generative adversarial networks. Computers & Security, 82:156–172, 2019.
    [30]
    Zinan Lin, Alankar Jain, Chen Wang, Giulia Fanti, and Vyas Sekar. Using gans for sharing networked time series data: Challenges, initial promise, and open questions. In Proceedings of the ACM Internet Measurement Conference, pages 464–483, 2020.
    [31]
    Shuodi Hui, Huandong Wang, Tong Li, Xinghao Yang, Xing Wang, Junlan Feng, Lin Zhu, Chao Deng, Pan Hui, Depeng Jin, et al. Large-scale urban cellular traffic generation via knowledge-enhanced gans with multi-periodic patterns. In Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pages 4195–4206, 2023.
    [32]
    Shiyuan Zhang, Tong Li, Shuodi Hui, Guangyu Li, Yanping Liang, Li Yu, Depeng Jin, and Yong Li. Deep transfer learning for city-scale cellular traffic generation through urban knowledge graph. In Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pages 4842–4851, 2023.
    [33]
    Tong Li, Yong Li, Tong Xia, and Pan Hui. Finding spatiotemporal patterns of mobile application usage. IEEE Transactions on Network Science and Engineering, 2021.
    [34]
    Alex Graves, Navdeep Jaitly, and Abdel-rahman Mohamed. Hybrid speech recognition with deep bidirectional lstm. In 2013 IEEE workshop on automatic speech recognition and understanding, pages 273–278. IEEE, 2013.
    [35]
    Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. Attention is all you need. Advances in neural information processing systems, 30, 2017.
    [36]
    Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural computation, 9(8):1735–1780, 1997.
    [37]
    Eric Jang, Shixiang Gu, and Ben Poole. Categorical reparameterization with gumbel-softmax. arXiv preprint arXiv:1611.01144, 2016.
    [38]
    Chris J Maddison, Andriy Mnih, and Yee Whye Teh. The concrete distribution: A continuous relaxation of discrete random variables. arXiv preprint arXiv:1611.00712, 2016.
    [39]
    Emil Julius Gumbel. Statistical theory of extreme values and some practical applications: a series of lectures, volume 33. US Government Printing Office, 1954.
    [40]
    Shaojie Bai, J Zico Kolter, and Vladlen Koltun. An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271, 2018.
    [41]
    Cristóbal Esteban, Stephanie L Hyland, and Gunnar Rätsch. Real-valued (medical) time series generation with recurrent conditional gans. arXiv preprint arXiv:1706.02633, 2017.
    [42]
    Olof Mogren. C-rnn-gan: Continuous recurrent neural networks with adversarial training. arXiv preprint arXiv:1611.09904, 2016.
    [43]
    Jinsung Yoon, Daniel Jarrett, and Mihaela Van der Schaar. Time-series generative adversarial networks. Advances in neural information processing systems, 32, 2019.
    [44]
    ML Menéndez, JA Pardo, L Pardo, and MC Pardo. The jensen-shannon divergence. Journal of the Franklin Institute, 334(2):307–318, 1997.
    [45]
    Junhui Zhang, Jiqiang Tang, Xu Zhang, Wen Ouyang, and Dongbin Wang. A survey of network traffic generation. In Third International Conference on Cyberspace Technology (CCT 2015), pages 1–6. IET, 2015.
    [46]
    Thomas Bonald. The erlang model with non-poisson call arrivals. ACM SIGMETRICS Performance Evaluation Review, 34(1):276–286, 2006.
    [47]
    Kashi Venkatesh Vishwanath and Amin Vahdat. Swing: Realistic and responsive network traffic generation. IEEE/ACM Transactions on Networking, 17(3):712–725, 2009.
    [48]
    Michele C Weigle, Prashanth Adurthi, Félix Hernández-Campos, Kevin Jeffay, and F Donelson Smith. Tmix: a tool for generating realistic tcp application workloads in ns-2. ACM SIGCOMM Computer Communication Review, 36(3):65–76, 2006.
    [49]
    Kai Xu, Rajkarn Singh, Hakan Bilen, Marco Fiore, Mahesh K Marina, and Yue Wang. Cartagenie: Context-driven synthesis of city-scale mobile network traffic snapshots. In 2022 IEEE International Conference on Pervasive Computing and Communications (PerCom), pages 119–129. IEEE, 2022.
    [50]
    Kai Xu, Rajkarn Singh, Marco Fiore, Mahesh K Marina, Hakan Bilen, Muhammad Usama, Howard Benn, and Cezary Ziemlicki. Spectragan: Spectrum based generation of city scale spatiotemporal mobile network traffic data. In Proceedings of the 17th International Conference on Emerging Networking EXperiments and Technologies, pages 243–258, 2021.
    [51]
    Kay Gregor Hartmann, Robin Tibor Schirrmeister, and Tonio Ball. Eeg-gan: Generative adversarial networks for electroencephalograhic (eeg) brain signals. arXiv preprint arXiv:1806.01875, 2018.
    [52]
    Tomer Golany, Kira Radinsky, and Daniel Freedman. Simgans: Simulator-based generative adversarial networks for ecg synthesis to improve deep ecg classification. In International Conference on Machine Learning, pages 3597–3606. PMLR, 2020.
    [53]
    Zhengping Che, Yu Cheng, Shuangfei Zhai, Zhaonan Sun, and Yan Liu. Boosting deep learning risk prediction with generative adversarial networks for electronic health records. In 2017 IEEE International Conference on Data Mining (ICDM), pages 787–792. IEEE, 2017.
    [54]
    Eitan Richardson and Yair Weiss. On gans and gmms. Advances in neural information processing systems, 31, 2018.
    [55]
    Nat Dilokthanakul, Pedro AM Mediano, Marta Garnelo, Matthew CH Lee, Hugh Salimbeni, Kai Arulkumaran, and Murray Shanahan. Deep unsupervised clustering with gaussian mixture variational autoencoders. arXiv preprint arXiv:1611.02648, 2016.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Knowledge Discovery from Data
    ACM Transactions on Knowledge Discovery from Data Just Accepted
    ISSN:1556-4681
    EISSN:1556-472X
    Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Online AM: 10 May 2024
    Accepted: 08 May 2024
    Revised: 15 February 2024
    Received: 05 January 2023

    Check for updates

    Author Tags

    1. Mobile user traffic
    2. generation
    3. GAN
    4. clustering

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 128
      Total Downloads
    • Downloads (Last 12 months)128
    • Downloads (Last 6 weeks)78

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media