Characterization and Prediction of Mobile-App Traffic Using Markov Modeling

被引:44
作者
Aceto, Giuseppe [1 ]
Bovenzi, Giampaolo [1 ]
Ciuonzo, Domenico [1 ]
Montieri, Antonio [1 ]
Persico, Valerio [1 ]
Pescape, Antonio [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol DIETI, I-80138 Naples, Italy
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 01期
关键词
Hidden Markov models; Predictive models; Analytical models; Markov processes; Context modeling; Mobile applications; Data models; Android apps; encrypted traffic; Markov models; mobile apps; traffic characterization; traffic modeling; traffic prediction; ANOMALY DETECTION; CLASSIFICATION;
D O I
10.1109/TNSM.2021.3051381
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modeling network traffic is an endeavor actively carried on since early digital communications, supporting a number of practical applications, that range from network planning and provisioning to security. Accordingly, many theoretical and empirical approaches have been proposed in this long-standing research, most notably, Machine Learning (ML) ones. Indeed, recent interest from network equipment vendors is sparking around the evaluation of solid information-theoretical modeling approaches complementary to ML ones, especially applied to new network traffic profiles stemming from the massive diffusion of mobile apps. To cater to these needs, we analyze mobile-app traffic available in the public dataset MIRAGE-2019 adopting two related modeling approaches based on the well-known methodological toolset of Markov models (namely, Markov Chains and Hidden Markov Models). We propose a novel heuristic to reconstruct application-layer messages in the common case of encrypted traffic. We discuss and experimentally evaluate the suitability of the provided modeling approaches for different tasks: characterization of network traffic (at different granularities, such as application, application category, and application version), and prediction of network traffic at both packet and message level. We also compare the results with several ML approaches, showing performance comparable to a state-of-the-art ML predictor (Random Forest Regressor). Also, with this work we provide a viable and theoretically sound traffic-analysis toolset to help improving ML evaluation (and possibly its design), and a sensible and interpretable baseline.
引用
收藏
页码:907 / 925
页数:19
相关论文
共 42 条
[1]  
Aceto G., 2019, 2019 4 INT C COMP CO, P1, DOI DOI 10.1109/CCCS.2019.8888137
[2]   Multi-classification approaches for classifying mobile app traffic [J].
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Montieri, Antonio ;
Pescape, Antonio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 :131-145
[3]   Internet Censorship detection: A survey [J].
Aceto, Giuseppe ;
Pescape, Antonio .
COMPUTER NETWORKS, 2015, 83 :381-421
[4]  
Alcock S., 2011, 18th International Conference on Telecommunications (ICT 2011), P499, DOI 10.1109/CTS.2011.5898976
[5]   Hypothesis testing for two discrete populations based on the Hellinger distance [J].
Basu, A. ;
Mandal, A. ;
Pardo, L. .
STATISTICS & PROBABILITY LETTERS, 2010, 80 (3-4) :206-214
[6]  
Beirlant J., 1997, INT J MATH STAT SCI, V6, P17
[7]   Reducing Internet Latency: A Survey of Techniques and Their Merits [J].
Briscoe, Bob ;
Brunstrom, Anna ;
Petlund, Andreas ;
Hayes, David ;
Ros, David ;
Tsang, Ing-Jyh ;
Gjessing, Stein ;
Fairhurst, Gorry ;
Griwodz, Carsten ;
Welzl, Michael .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :2149-2196
[8]   Compact Markov-modulated models for multiclass trace fitting [J].
Casale, Giuliano ;
Sansottera, Andrea ;
Cremonesi, Paolo .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2016, 255 (03) :822-833
[9]   Joint source and sending rate modeling in adaptive video streaming [J].
Colonnese, Stefania ;
Frossard, Pascal ;
Rinauro, Stefano ;
Rossi, Lorenzo ;
Scarano, Gaetano .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (05) :403-416
[10]  
Dai SF, 2013, IEEE INFOCOM SER, P809