Characterizing User Behavior on a Mobile SMS-Based Chat Service
|
|
|
- Bruno Chandler
- 10 years ago
- Views:
Transcription
1 Characterizing User Behavior on a Mobile SMS-Based Chat Service Rafael de A. Oliveira, Wladmir C. Brandão & Humberto T. Marques-Neto Instituto de Ciências Exatas e Informática Pontifícia Universidade Católica de Minas Gerais (PUC) Belo Horizonte MG Brazil
2 Agenda 1. Context 2. Overview 3. User behavior 4. Conclusions 5. Looking forward
3 Context Use of mobile instant messaging (IM) services has grown significantly last years 600M adults are currently using IM services on their mobile devices [Mander 2014] Understand the behavior of their users can help the improvement of user experience, performance, availability, cost, and quality of offered service.
4 Context Dataset Mobile SMS-based chat service Major cellphone carrier from Brazil Data collected from May 10th to May 16th, ,348,805 messages 21,210 users Each record contains: Session ID Sender Category Message Message Type Timestamp
5 Context Types of message Public Messages Visible to all Room Messages Visible to all but directed Private messages Sent to a single user (one-toone)
6 Context Room categorization General: messages of sports or religions Location: messages related to cities and regions Person: messages in personal chat rooms Relationship: messages about nightlife or flirting
7 Overview There is no rich interface like WhatsApp, Viber, etc SMS-Based To talk to someone: T + destination nickname + text message The service has an average of 335,000 messages per day (May 2014)
8 Overview Messages exchanging by day and by category The highest amount of messages exchanged in a day occurs on Wednesday, corresponding to 14,95% of all exchanged messages in the week. * refers to Private messages
9 Overview Message exchanging throughout the day As this service creates opportunities to entertainment and social relationships, we believe the evening massive usage is related to a kind of social need of users. The non-occurrence of a weekly fluctuation and the high use of service in the evenings could be explained by this need
10 Overview User sessions by message type > 87% of the user sessions we have exclusively Public and Room messages, suggesting a non-confidentiality pattern in the message exchanging. Almost half of user sessions are exclusively formed by Room messages, which suggests that users mostly communicate pairwise, but without worrying about the privacy of the communication
11 Overview Messages by type on user sessions 77% of the messages are exchanged in non-confidential user sessions. This open communication suggests user interest for new relationships. Many users build new relationships in non-confidential user sessions, and some of them intensify existing relationships in private user sessions
12 User Behavior User Message Exchanging Distribution The user message exchanging behavior follows a heavy-tailed distribution [Clauset et al. 2009], with a very small number of users sending the majority of the messages and the most of the users sending a very small number of messages on the chat service.
13 User Behavior 1) Define a feature set Amount of Messages User sessions Frequency Message creation by minute 2) Apply a Clustering Algorithm X-Means as the Clustering Algorithm [Pelleg et al. 2000] Provides not only the clusters, but also estimating the suitable number of clusters
14 User Behavior 3) Cluster identification Light A low frequency of use Infrequent Moderate use 6x/week Frequent 20x/week. Heavy Too many messages 40x/week
15 User Behavior Weekly perspective Cluster Users Messages Sessions Frequency % Avg CV Avg CV Avg CV Light Infrequent Frequent Heavy
16 User Behavior Daily perspective Cluster Messages Sessions Frequency Avg CV Avg CV Avg CV Light Infrequent Frequent Heavy
17 User Behavior Looking backward 55% of heavy users from a specific day were classified into a different user profile on the previous day Looking forward 85% of heavy users from a specific day return to the service on the day after Heavy Users has a behavior of intensively exploiting service resources.
18 User Behavior Behavioral changes
19 User Behavior Categories exploita3on
20 Conclusions Comprehensive characterization of the user behavior on a mobile SMS-based chat service provided by a major cellphone company in Brazil Different from previous work in literature, we provide a characterization of a private SMS-based chat service to detect malicious or atypical user behavior. Usage patterns of this service Light users, Infrequent users, Frequent users and Heavy users Heavy Users tend to keep their behavior over time Heavy Users look for Relationship chat rooms
21 Looking forward Are Heavy Users a potential malicious users? Can we detect malicious behavior, such as defamation, pedophilia, phishing, and spamming from the message content? Are there another features to find better clusters? Are private messages being used for phishing?
22 Thank you! Rafael de A. Oliveira, Wladmir C. Brandão & Humberto T. Marques-Neto
Characterizing User Behavior on a Mobile SMS-Based Chat Service
Characterizing User Behavior on a Mobile SMS-Based Chat Service Rafael de A. Oliveira 1, Wladmir C. Brandão 1, Humberto T. Marques-Neto 1 1 Instituto de Informática Pontifícia Universidade Católica de
Exploring Big Data in Social Networks
Exploring Big Data in Social Networks [email protected] ([email protected]) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about
The Bellevue Center for Obesity & Weight Management. Program Director: Manish Parikh, MD WEIGHT LOSS SURGERY INFORMATION SEMINAR
Wednesday, January 7, 2015 Wednesday, February 4, 2015 Wednesday, March 4, 2015 Wednesday, April 1, 2015 Wednesday, May 13, 2015 Wednesday, June 3, 2015 Wednesday, July 1, 2015 Wednesday, August 5, 2015
WEIGHT LOSS SURGERY INFORMATION SEMINAR
Wednesday, January 6, 2016 Wednesday, February 3, 2016 Wednesday, March 2, 2016 Wednesday, April 6, 2016 Wednesday, May 4, 2016 Wednesday, June 1, 2016 Wednesday, July 6, 2016 Wednesday, August 3, 2016
NextBug: A Tool for Recommending Similar Bugs in Open-Source Systems
NextBug: A Tool for Recommending Similar Bugs in Open-Source Systems Henrique S. C. Rocha 1, Guilherme A. de Oliveira 2, Humberto T. Marques-Neto 2, Marco Túlio O. Valente 1 1 Department of Computer Science
A Preliminary Analysis of the Scientific Production of Latin American Computer Science Research Groups
A Preliminary Analysis of the Scientific Production of Latin American Computer Science Research Groups Juan F. Delgado-Garcia, Alberto H.F. Laender and Wagner Meira Jr. Computer Science Department, Federal
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Record Deduplication By Evolutionary Means
Record Deduplication By Evolutionary Means Marco Modesto, Moisés G. de Carvalho, Walter dos Santos Departamento de Ciência da Computação Universidade Federal de Minas Gerais 31270-901 - Belo Horizonte
Characterizing Task Usage Shapes in Google s Compute Clusters
Characterizing Task Usage Shapes in Google s Compute Clusters Qi Zhang 1, Joseph L. Hellerstein 2, Raouf Boutaba 1 1 University of Waterloo, 2 Google Inc. Introduction Cloud computing is becoming a key
Planning for IM Compliance
About IM Compliance, page 1 Prerequisite Configuration Tasks, page 4 About IM Compliance Many industries require that instant messages adhere to the same regulatory compliance guidelines as for all other
How To Protect Your Data From Being Hacked On Security Cloud
F-SECURE SECURITY CLOUD Purpose, function and benefits October 2015 CONTENTS F-Secure Security Cloud in brief 2 Security Cloud benefits 3 How does Security Cloud work? 4 Security Cloud metrics 4 Security
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Using Chat and Group Chat Quick Reference Guide
Using Chat and Group Chat Quick Reference Guide Chat is the simplest form of communication in Blackboard IM and, in many cases; it is also the most effective. Also known as instant messaging, Chat allows
Singtel Business Fibre Broadband Security Suite. Customer User Guide
Singtel Business Fibre Broadband Security Suite Customer User Guide Table of Contents 1. Introduction... 3 2. Customer Portal... 4 2.1 Email Notification... 4 2.2 Activate your account.... 5 2.3 Manage
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Rich Communication Suite Enabler. plus integration with your existing VoIP services
Rich Communication Suite Enabler plus integration with your existing VoIP services Join the next generation telecom market and offer services that are blend the best features of Skype, Viber and WhatsApp.
By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail
By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail Introduction New Media Landscape New Media Culture Contributes to New Meanings, Messages, Norms, Values, Interactions
Internet Content Filter Exemption Request Form
Internet Content Filter Exemption Request Form Version 2.0 This form maybe updated at anytime (without notice) to ensure changes to the HSE Internet Content Filter Standard and/or business practices are
Websense Data Security Solutions
Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting
Overview. Accessing the User Interface. Logging In. Resetting your Password
Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive
Minas Gerais. 586,522.122 sq.km. State Area. Belo Horizonte. Capital. Capital population 2,479,175. State population 20,593,366
State State Area Capital 586,522.122 sq.km Belo Horizonte Capital population 2,479,175 State population 20,593,366 Economically active population 10,635,000 in 2010 Populational growth rate 0.91% per year
2009 Antispyware Coalition Public Workshop
2009 Antispyware Coalition Public Workshop Jeffrey Fox Technology Editor, Consumer Reports Media contact: Lauren Hackett, 914-378-2561 Background For several years, Consumer Reports has been testing and
Biotech in Brasil Cluster Minas Gerais. V Seminário de Negócios
Biotech in Brasil Cluster Minas Gerais V Seminário de Negócios Biotechnology Brasil Biotechnology Brasil The Brazil stands out, along with Russia, India, China and South Africa, as a major emerging country
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
ADAPTABILITY AND STABILITY OF ALFALFA CULTIVARS. [email protected]. Abstract
ID # 13-16 ADAPTABILITY AND STABILITY OF ALFALFA CULTIVARS A. C. Ruggieri 1 A.L.G.Monteiro, R. Gualberto 3 1 Estação Experimental de Zootecnia, Instituto de Zootecnia, Sertãozinho, São Paulo, Brasil Dept.
BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)
BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE
Better protection for customers, and recurring revenue for you!
AVG AntiVirus Better protection for customers, and recurring revenue for you! Offer your customers the latest protection without draining your resources. A single, central management platform alerts when
Research Report Charging and Billing for the Digital Economy
Research Report Charging and Billing for the Digital Economy Copyright Openet Telecom, 2013 Index Introduction 3 1. The Future for Traditional Billing and Charging 4 2. Innovating and Accelerating Time
OPERATOR ALGEBRAS AND QUANTUM PHYSICS A Satellite Conference to the XVIII International Congress on Mathematical Physics.
We hereby certify that Alan Garbarz, from CONICET / IFLP, Universidad de Buenos Aires, Argentina, participated in the Satellite Conference Operator Algebras and Quantum Physics, held at the We hereby certify
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Save Big Money on Home & Auto Insurance. One Quote. Max Savings. Guaranteed. www.surephire.com. the simple and free employee benefit
the simple and free employee benefit Save Big Money on Home & Auto Insurance. Phireball finds savings www.surephire.com One Quote. Max Savings. Guaranteed. 1 The Problem with Home & Auto Insurance Quotes
CS 6220: Data Mining Techniques Course Project Description
CS 6220: Data Mining Techniques Course Project Description College of Computer and Information Science Northeastern University Spring 2013 General Goal In this project, you will have an opportunity to
Networks & Security Course. Web of Trust and Network Forensics
Networks & Security Course Web of Trust and Network Forensics Virtual Machine Virtual Machine Internet connection You need to connect the VM to the Internet for some of the Web of Trust exercises. Make
Email Marketing Workshop
Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda Getting To The Inbox Protecting Your Brand Email Laws & Regulations 1 Laurence Rothman Nationwide Senior Consultant, Brand Reputation
Development of a personal agenda and a distributed meeting scheduler based on JADE agents
Development of a personal agenda and a distributed meeting scheduler based on JADE agents Miguel Ángel Sánchez Álvaro Rayón Alonso Grupo de Sistemas Inteligentes Departamento de Ingeniería Telemática Universidad
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置
Mining Airline Data for CRM Strategies
Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization, Beijing, China, September 15-17, 2007 345 Mining Airline Data for CRM Strategies LENA MAALOUF, NASHAT MANSOUR
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. TRITON - Web Security is automatically configured to
D3 TECHNOLOGIES SPAM FILTER
D3 TECHNOLOGIES SPAM FILTER The D3 Technologies spam filtering provides virus, attachment, and spam filtering services for email. We check all emails for viruses and malicious content, since we feel these
Mining Text Data for Useful Information in Higher Education John Zilvinskis Indiana University
Mining Text Data for Useful Information in Higher Education John Zilvinskis Indiana University Institutional Researchers Credo We have not succeeded in answering all our problems indeed we sometimes feel
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Cascadia Labs URL Filtering and Web Security
Presented by COMPARATIVE REVIEW Cascadia Labs URL Filtering and Web Security Results from Q4 2008 Executive Summary Companies rely on URL filtering and Web security products to protect their employees,
How To Become A Successful Software Developer In Brazil
MARCO ARTHUR MONTEIRO ANDRÉ Date of Birth: August, 14, 1954 Phone: +55 (21) 9368-1954 Fax: +55 (21) 2491 2224 Email: [email protected] PROFILE Rich and vast managerial experience, as manager of IT
Belo Horizonte and Rio de Janeiro, October 15th 2015
Belo Horizonte and Rio de Janeiro, October 15th 2015 Minas Gerais: a large and important state 226,000 square miles (Larger than France or Spain) 20 million people (Comparable to Australia) 2 nd largest
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
Definition of Mobile Instant Messaging (MIM) Systems
J son & Partners Consulting Company presents the results of the research Mobile instant messaging systems as a direct threat to SMS. Definition of Mobile Instant Messaging (MIM) Systems MIM (Mobile Instant
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
Canada Anti-Spam Legislation: Obligations and Opportunity. Presenters: Matthew Wansink Chris Bakker
Canada Anti-Spam Legislation: Obligations and Opportunity Presenters: Matthew Wansink Chris Bakker Agenda Introduction CASL Overview CASL Nuts and Bolts CASL What is compliance? Building your business
Automated News Item Categorization
Automated News Item Categorization Hrvoje Bacan, Igor S. Pandzic* Department of Telecommunications, Faculty of Electrical Engineering and Computing, University of Zagreb, Croatia {Hrvoje.Bacan,Igor.Pandzic}@fer.hr
THE RESTRUCTURING OF THE QUALITY MANAGEMENT SYSTEM OF CDTN
2011 International Nuclear Atlantic Conference - INAC 2011 Belo Horizonte,MG, Brazil, October 24-28, 2011 ASSOCIAÇÃO BRASILEIRA DE ENERGIA NUCLEAR - ABEN ISBN: 978-85-99141-04-5 THE RESTRUCTURING OF THE
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Barracuda Spam Firewall
Barracuda Spam Firewall E-mail is one of our key communication tools within the district, and offensive and inappropriate e-mail messages have become an increasing problem. Because of this, we installed
Corporate Security Awareness. The Common Sense of Compliance
Corporate Security Awareness The Common Sense of Compliance 1 Information Theft Physical Vendor/Client Fraudulent Activities Stolen Assets (i.e. backup tapes) Compromised Assets (vengeful employees) Other
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010
Predicting Flight Delays
Predicting Flight Delays Dieterich Lawson [email protected] William Castillo [email protected] Introduction Every year approximately 20% of airline flights are delayed or cancelled, costing
Facebook Smart Card FB 121211_1800
Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any
Control System for Amateur Telescope Experience
Control System for Amateur Telescope Experience Departamento de Informática, Universidad Técnica Federico Santa María, Avenida España 1680, Valparaiso, Chile Agenda Introduction Scientific/Technological
Feature Subset Selection in E-mail Spam Detection
Feature Subset Selection in E-mail Spam Detection Amir Rajabi Behjat, Universiti Technology MARA, Malaysia IT Security for the Next Generation Asia Pacific & MEA Cup, Hong Kong 14-16 March, 2012 Feature
Vocabulary: These words will help you understand this lesson.
Internet Activities Vocabulary: These words will help you understand this lesson. Word/Term computer Internet chat room Definition Materials Needed: pen or pencil access to computer / Internet electronic
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Teens and Cyberbullying
Teens and Cyberbullying EXECUTIVE SUMMARY OF A REPORT ON RESEARCH Conducted for NATIONAL CRIME PREVENTION COUNCIL (NCPC) Released February 28, 2007 By the National Crime Prevention Council Survey conducted
www.cmrocha.com.br Rua do Mercado 34, 17ºandar, 20010-120, Rio de Janeiro, RJ, +55 (21) 2263-1328
Rua do Mercado 34, 17ºandar, 20010-120, Rio de Janeiro, RJ, +55 (21) 2263-1328 Presentation We are very pleased to present you Cesar Mota & Rocha Advogados law firm. The firm was established in 2005, with
Characterizing User Behavior in Online Social Networks
Characterizing User Behavior in Online Social Networks Fabrício Benevenuto Tiago Rodrigues Meeyoung Cha Virgílio Almeida Computer Science Department, Federal University of Minas Gerais, Brazil Max Planck
