Characterizing User Behavior on a Mobile SMS-Based Chat Service



Similar documents
Characterizing User Behavior on a Mobile SMS-Based Chat Service

Exploring Big Data in Social Networks

The Bellevue Center for Obesity & Weight Management. Program Director: Manish Parikh, MD WEIGHT LOSS SURGERY INFORMATION SEMINAR

WEIGHT LOSS SURGERY INFORMATION SEMINAR

NextBug: A Tool for Recommending Similar Bugs in Open-Source Systems

A Preliminary Analysis of the Scientific Production of Latin American Computer Science Research Groups

Introducing IBM s Advanced Threat Protection Platform

Record Deduplication By Evolutionary Means

Characterizing Task Usage Shapes in Google s Compute Clusters

Planning for IM Compliance

How To Protect Your Data From Being Hacked On Security Cloud

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

Using Chat and Group Chat Quick Reference Guide

Singtel Business Fibre Broadband Security Suite. Customer User Guide

Protect yourself online

Rich Communication Suite Enabler. plus integration with your existing VoIP services

By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail

Internet Content Filter Exemption Request Form

Websense Data Security Solutions

Overview. Accessing the User Interface. Logging In. Resetting your Password

Minas Gerais. 586, sq.km. State Area. Belo Horizonte. Capital. Capital population 2,479,175. State population 20,593,366

2009 Antispyware Coalition Public Workshop

Biotech in Brasil Cluster Minas Gerais. V Seminário de Negócios

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

E-Safety Issues and Online Safety

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

The Bishop s Stortford High School Internet Use and Data Security Policy

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

ADAPTABILITY AND STABILITY OF ALFALFA CULTIVARS. Abstract

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

Better protection for customers, and recurring revenue for you!

Research Report Charging and Billing for the Digital Economy

OPERATOR ALGEBRAS AND QUANTUM PHYSICS A Satellite Conference to the XVIII International Congress on Mathematical Physics.

What legal aspects are needed to address specific ICT related issues?

Save Big Money on Home & Auto Insurance. One Quote. Max Savings. Guaranteed. the simple and free employee benefit

CS 6220: Data Mining Techniques Course Project Description

Networks & Security Course. Web of Trust and Network Forensics

Marketing Workshop

Development of a personal agenda and a distributed meeting scheduler based on JADE agents

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Mining Airline Data for CRM Strategies

Web DLP Quick Start. To get started with your Web DLP policy

D3 TECHNOLOGIES SPAM FILTER

Mining Text Data for Useful Information in Higher Education John Zilvinskis Indiana University

High Speed Internet - User Guide. Welcome to. your world.

Cascadia Labs URL Filtering and Web Security

How To Become A Successful Software Developer In Brazil

Belo Horizonte and Rio de Janeiro, October 15th 2015

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

E-Safety Issues and Online Safety

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Definition of Mobile Instant Messaging (MIM) Systems

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Fostering Incident Response and Digital Forensics Research

Canada Anti-Spam Legislation: Obligations and Opportunity. Presenters: Matthew Wansink Chris Bakker

Automated News Item Categorization

THE RESTRUCTURING OF THE QUALITY MANAGEMENT SYSTEM OF CDTN

Sample Employee Network and Internet Usage and Monitoring Policy

Barracuda Spam Firewall

Corporate Security Awareness. The Common Sense of Compliance

Netsweeper Whitepaper

Predicting Flight Delays

Facebook Smart Card FB _1800

Control System for Amateur Telescope Experience

Feature Subset Selection in Spam Detection

Vocabulary: These words will help you understand this lesson.

AVG AntiVirus. How does this benefit you?

Teens and Cyberbullying

Rua do Mercado 34, 17ºandar, , Rio de Janeiro, RJ, +55 (21)

Characterizing User Behavior in Online Social Networks

Transcription:

Characterizing User Behavior on a Mobile SMS-Based Chat Service Rafael de A. Oliveira, Wladmir C. Brandão & Humberto T. Marques-Neto Instituto de Ciências Exatas e Informática Pontifícia Universidade Católica de Minas Gerais (PUC) Belo Horizonte MG Brazil

Agenda 1. Context 2. Overview 3. User behavior 4. Conclusions 5. Looking forward

Context Use of mobile instant messaging (IM) services has grown significantly last years 600M adults are currently using IM services on their mobile devices [Mander 2014] Understand the behavior of their users can help the improvement of user experience, performance, availability, cost, and quality of offered service.

Context Dataset Mobile SMS-based chat service Major cellphone carrier from Brazil Data collected from May 10th to May 16th, 2014 2,348,805 messages 21,210 users Each record contains: Session ID Sender Category Message Message Type Timestamp

Context Types of message Public Messages Visible to all Room Messages Visible to all but directed Private messages Sent to a single user (one-toone)

Context Room categorization General: messages of sports or religions Location: messages related to cities and regions Person: messages in personal chat rooms Relationship: messages about nightlife or flirting

Overview There is no rich interface like WhatsApp, Viber, etc SMS-Based To talk to someone: T + destination nickname + text message The service has an average of 335,000 messages per day (May 2014)

Overview Messages exchanging by day and by category The highest amount of messages exchanged in a day occurs on Wednesday, corresponding to 14,95% of all exchanged messages in the week. * refers to Private messages

Overview Message exchanging throughout the day As this service creates opportunities to entertainment and social relationships, we believe the evening massive usage is related to a kind of social need of users. The non-occurrence of a weekly fluctuation and the high use of service in the evenings could be explained by this need

Overview User sessions by message type > 87% of the user sessions we have exclusively Public and Room messages, suggesting a non-confidentiality pattern in the message exchanging. Almost half of user sessions are exclusively formed by Room messages, which suggests that users mostly communicate pairwise, but without worrying about the privacy of the communication

Overview Messages by type on user sessions 77% of the messages are exchanged in non-confidential user sessions. This open communication suggests user interest for new relationships. Many users build new relationships in non-confidential user sessions, and some of them intensify existing relationships in private user sessions

User Behavior User Message Exchanging Distribution The user message exchanging behavior follows a heavy-tailed distribution [Clauset et al. 2009], with a very small number of users sending the majority of the messages and the most of the users sending a very small number of messages on the chat service.

User Behavior 1) Define a feature set Amount of Messages User sessions Frequency Message creation by minute 2) Apply a Clustering Algorithm X-Means as the Clustering Algorithm [Pelleg et al. 2000] Provides not only the clusters, but also estimating the suitable number of clusters

User Behavior 3) Cluster identification Light A low frequency of use Infrequent Moderate use 6x/week Frequent 20x/week. Heavy Too many messages 40x/week

User Behavior Weekly perspective Cluster Users Messages Sessions Frequency % Avg CV Avg CV Avg CV Light 65.00 33.16 1.59 1.55 0.48 0.77 9.43 Infrequent 25.00 156.08 0.94 6.26 0.34 0.59 2.89 Frequent 8.00 440.59 0.86 16.62 0.24 0.57 0.58 Heavy 2.00 934.63 0.99 36.47 0.29 0.67 0.55

User Behavior Daily perspective Cluster Messages Sessions Frequency Avg CV Avg CV Avg CV Light 17.56 0.34 1.33 0.24 0.82 0.28 Infrequent 49.28 0.40 2.38 0.44 0.58 0.06 Frequent 112.41 0.39 4.41 0.55 0.60 0.11 Heavy 181.18 0.34 5.55 0.27 0.62 0.08

User Behavior Looking backward 55% of heavy users from a specific day were classified into a different user profile on the previous day Looking forward 85% of heavy users from a specific day return to the service on the day after Heavy Users has a behavior of intensively exploiting service resources.

User Behavior Behavioral changes

User Behavior Categories exploita3on

Conclusions Comprehensive characterization of the user behavior on a mobile SMS-based chat service provided by a major cellphone company in Brazil Different from previous work in literature, we provide a characterization of a private SMS-based chat service to detect malicious or atypical user behavior. Usage patterns of this service Light users, Infrequent users, Frequent users and Heavy users Heavy Users tend to keep their behavior over time Heavy Users look for Relationship chat rooms

Looking forward Are Heavy Users a potential malicious users? Can we detect malicious behavior, such as defamation, pedophilia, phishing, and spamming from the message content? Are there another features to find better clusters? Are private messages being used for phishing?

Thank you! Rafael de A. Oliveira, Wladmir C. Brandão & Humberto T. Marques-Neto