Skip to main content

Identifying In-App User Actions from Mobile Web Logs

  • Conference paper
  • First Online:
Advances in Knowledge Discovery and Data Mining (PAKDD 2018)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10938))

Included in the following conference series:

Abstract

We address the problem of identifying in-app user actions from Web access logs when the content of those logs is both encrypted (through HTTPS) and also contains automated Web accesses. We find that the distribution of time gaps between HTTPS accesses can distinguish user actions from automated Web accesses generated by the apps, and we determine that it is reasonable to identify meaningful user actions within mobile Web logs by modelling this temporal feature. A real-world experiment is conducted with multiple mobile devices running some popular apps, and the results show that the proposed clustering-based method achieves good accuracy in identifying user actions, and outperforms the state-of-the-art baseline by \(17.84\%\).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.untangle.com.

References

  1. Arora, D., Neville, S.W., Li, K.F.: Mining wifi data for business intelligence. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 394–398, October 2013. https://doi.org/10.1109/3PGCIC.2013.67

  2. Buehrer, G., Stokes, J.W., Chellapilla, K.: A large-scale study of automated web search traffic. In: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, AIRWeb 2008, pp. 1–8 (2008)

    Google Scholar 

  3. Bulut, E., Szymanski, B.K.: Understanding user behavior via mobile data analysis. In: 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 1563–1568, June 2015. https://doi.org/10.1109/ICCW.2015.7247402

  4. Chen, L., Li, Z., Ju, S.: Based on forward reference object transaction identification algorithm on web mining. In: ALPIT 2007, pp. 469–473, August 2007

    Google Scholar 

  5. Cooley, R., Mobasher, B., Srivastava, J.: Grouping web page references into transactions for mining world wide web browsing patterns. In: Proceedings 1997 IEEE Knowledge and Data Engineering Exchange Workshop, pp. 2–9, November 1997. https://doi.org/10.1109/KDEX.1997.629824

  6. Cooley, R., Mobasher, B., Srivastava, J.: Data preparation for mining world wide web browsing patterns. KIS 1(1), 5–32 (1999)

    Google Scholar 

  7. Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise, pp. 226–231. AAAI Press (1996)

    Google Scholar 

  8. Fan, Y.C., Chen, Y.C., Tung, K.C., Wu, K.C., Chen, A.L.P.: A framework for enabling user preference profiling through wi-fi logs. IEEE Trans. Knowl. Data Eng. 28(3), 592–603 (2016). https://doi.org/10.1109/TKDE.2015.2489657

    Article  Google Scholar 

  9. Foss, A., Wang, W., Zaïane, O.R.: A non-parametric approach to web log analysis (2001)

    Google Scholar 

  10. Gu, Y., Quan, L., Ren, F.: Wifi-assisted human activity recognition. In: 2014 IEEE Asia Pacific Conference on Wireless and Mobile, pp. 60–65, August 2014. https://doi.org/10.1109/APWiMob.2014.6920266

  11. Guerbas, A., Addam, O., Zaarour, O., Nagi, M., Elhajj, A., Ridley, M., Alhajj, R.: Effective web log mining and online navigational pattern prediction. Knowl. Based Syst. 49(Supplement C), 50–62 (2013). https://doi.org/10.1016/j.knosys.2013.04.014. http://www.sciencedirect.com/science/article/pii/S0950705113001263

    Article  Google Scholar 

  12. Huang, J., Xu, F., Lin, Y., Li, Y.: On the understanding of interdependency of mobile app usage. In: 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 471–475, October 2017. https://doi.org/10.1109/MASS.2017.89

  13. Lee, J., Seeling, P.: An overview of mobile device network traffic and network interface usage patterns. In: IEEE EIT 2013, pp. 1–5, May 2013

    Google Scholar 

  14. Li, Y., Feng, B.: The construction of transactions for web usage mining. In: CINC 2009, vol. 1, pp. 121–124, June 2009

    Google Scholar 

  15. Mead, S., Veeramachaneni, N., Seeling, P.: An overview of mobile device network activities: characteristics of heterogeneous network interfaces. In: CCNC 2016, pp. 305–306 (2016)

    Google Scholar 

  16. Morichetta, A., Bocchi, E., Metwalley, H., Mellia, M.: Clue: clustering for mining web urls. In: 2016 28th International Teletraffic Congress (ITC 28), vol. 01, pp. 286–294, September 2016. https://doi.org/10.1109/ITC-28.2016.146

  17. Qian, F., Wang, Z., Gao, Y., Huang, J., Gerber, A., Mao, Z., Sen, S., Spatscheck, O.: Periodic transfers in mobile applications: network-wide origin, impact, and optimization. In: Proceedings of the 21st International Conference on World Wide Web, WWW 2012, pp. 51–60. ACM, New York (2012). https://doi.org/10.1145/2187836.2187844, http://doi.acm.org/10.1145/2187836.2187844

  18. Sadri, A., Ren, Y., Salim, F.D.: Information gain-based metric for recognizing transitions in human activities. Pervasive Mob. Comput. 38(Part 1), 92–109 (2017). https://doi.org/10.1016/j.pmcj.2017.01.003. http://www.sciencedirect.com/science/article/pii/S1574119217300081

    Article  Google Scholar 

  19. Shu-yue, M., Wen-cai, L., Shuo, W.: The study on the preprocessing in web log mining. In: KAM 2011, pp. 315–317 (2011)

    Google Scholar 

  20. Suadaa, L.H.: A survey on web usage mining techniques and applications. In: 2014 International Conference on Information Technology Systems and Innovation (ICITSI), pp. 39–43, November 2014. https://doi.org/10.1109/ICITSI.2014.7048235

  21. Woon, Y.K., Ng, W.K., Lim, E.P.: Online and incremental mining of separately-grouped web access logs. In: Proceedings of the Third International Conference on Web Information Systems Engineering, WISE 2002, pp. 53–62, December 2002. https://doi.org/10.1109/WISE.2002.1181643

Download references

Acknowledgments

This research is supported by LPDP (Indonesia Endowment Fund for Education) and a Linkage Project grant of the Australian Research Council (LP120200413).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bilih Priyogi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Priyogi, B., Sanderson, M., Salim, F., Chan, J., Tomko, M., Ren, Y. (2018). Identifying In-App User Actions from Mobile Web Logs. In: Phung, D., Tseng, V., Webb, G., Ho, B., Ganji, M., Rashidi, L. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2018. Lecture Notes in Computer Science(), vol 10938. Springer, Cham. https://doi.org/10.1007/978-3-319-93037-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93037-4_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93036-7

  • Online ISBN: 978-3-319-93037-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics