Human trajectory data and internet traffic mining using improved multi-context trajectory embedding service usage classification model


  • Suryakumar B
  • Dr. Ramadevi E



Due to the rapid growth of mobile messaging Apps, the classification of Internet traffic into different types of service usages has become a vital process to handle the location-based social networks. In previous researches, Improved Multi-Context Trajectory Embedding Model (IMC-TEM) was proposed to analyze and mine the human trajectory data using multiple context information of trajectory data. However, this model does not consider Internet traffic classification that investigates how to use encrypted Internet traffic for classifying service usages. Therefore in this paper, IMC-TEM is incorporated with CUMMA model to classify the service usage using both Internet traffic data and contextual information of trajectory data generated by messaging Apps. In this model, four major processes are performed to predict the service usages and end-user behaviors efficiently. Initially, traffic segmentation process is performed based on the hierarchical clustering with threshold heuristics that segments the Internet traffic into sessions and dialogs. After that, features are extracted from the segmented traffic based on the packet length and time delay. Then, Random Forest (RF) classifier is applied to classify the service usage types. Moreover, clustering-Hidden Markov Model (HMM) is introduced to detect mixed dialogs from outliers and decompose those into sub-dialogs of single-type usage. Finally, the performance effectiveness of the proposed model is evaluated through the experimental results using different real-world datasets.


[1] Yuan NJ, Zhang F, Lian D, Zheng K, Yu S, & Xie X (2013), “We know how you live: exploring the spectrum of urban lifestylesâ€, Proceedings of the first ACM conference on Online social networks, pp. 3-14.

[2] Rice E (2010), “The positive role of social networks and social networking technology in the condom-using behaviors of homeless young peopleâ€, Public health reports, 125(4), 588-595.

[3] Sen S, Spatscheck O, & Wang D (2004), “Accurate, scalable in-network identification of p2p traffic using application signaturesâ€, ACM Proceedings of the 13th international conference on World Wide Web, pp. 512-521.

[4] Haffner P, Sen S, Spatscheck O, & Wang D (2005), “ACAS: automated construction of application signaturesâ€, ACM Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, pp. 197-202.

[5] Suryakumar B, & Ramadevi E (2017), “A multi context embedding model based on convolutional neural network for trajectory data miningâ€, International Journal of Computer Science and Mobile Applications, 5(9), 1-9.

[6] Xu Q, Erman J, Gerber A, Mao Z, Pang J, & Venkataraman S (2011), “Identifying diverse usage behaviors of smartphone appsâ€, ACM Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pp. 329-344.

[7] Ghose A, & Han SP (2011), “An empirical analysis of user content generation and usage behavior on the mobile Internetâ€, Management Science, 57(9), 1671-1691.

[8] Zhang J, Xiang Y, Wang Y, Zhou W, Xiang Y, & Guan Y (2013), “Network traffic classification using correlation informationâ€, IEEE Transactions on Parallel and Distributed Systems, 24(1), 104-117.

[9] Zhang J, Chen C, Xiang Y, Zhou W, & Vasilakos AV (2013), “An effective network traffic classification method with unknown flow detectionâ€, IEEE Transactions on Network and Service Management, 10(2), 133-147.

[10] Yang J, Qiao Y, Zhang X, He H, Liu F, & Cheng G (2015), “Characterizing user behavior in mobile internetâ€, IEEE transactions on emerging topics in computing, 3(1), 95-106.

[11] Yang D, Zhang D, & Qu B (2016), “Participatory cultural mapping based on collective behavior data in location-based social networksâ€, ACM Transactions on Intelligent Systems and Technology, 7(3), 30-53.

View Full Article: