Mobile Networks and Management. Third International ICST Conference, MONAMI 2011, Aveiro, Portugal, September 21-23, 2011, Revised Selected Papers

Research Article

Classification of Hidden Users’ Profiles in Wireless Communications

Download
434 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-30422-4_1,
        author={Eduardo Rocha and Paulo Salvador and Ant\^{o}nio Nogueira},
        title={Classification of Hidden Users’ Profiles in Wireless Communications},
        proceedings={Mobile Networks and Management. Third International ICST Conference, MONAMI 2011, Aveiro, Portugal, September 21-23, 2011, Revised Selected Papers},
        proceedings_a={MONAMI},
        year={2012},
        month={9},
        keywords={User Profiling Web-Application Identification Wireless Networks Wavelet Decomposition Scalograms},
        doi={10.1007/978-3-642-30422-4_1}
    }
    
  • Eduardo Rocha
    Paulo Salvador
    António Nogueira
    Year: 2012
    Classification of Hidden Users’ Profiles in Wireless Communications
    MONAMI
    Springer
    DOI: 10.1007/978-3-642-30422-4_1
Eduardo Rocha1,*, Paulo Salvador1,*, António Nogueira1,*
  • 1: University of Aveiro
*Contact email: eduardorocha@ua.pt, salvador@ua.pt, nogueira@ua.pt

Abstract

The Internet can be seen as a mix of several services and applications running on top of common protocols. The emergence of several web-applications changed the users’ interaction paradigm by placing them in a more active role allowing them to share photos, videos and much more. The analysis of the profile of each user, both in wired and wireless networks, becomes very interesting for tasks such as network resources optimization, service personalization and security. In this paper, we propose a promiscuous wireless passive monitoring classification approach that can accurately create users’ profiles in terms of the used web-applications and does not require authentication with the wireless Access Point. By extracting appropriate layer 2 traffic metrics, performing a Wavelet Decomposition and analyzing the obtained scalograms, it is possible to analyze the traffic’s time and frequency components. An appropriate communication profile can then be defined in order to describe this frequency spectrum which is characteristic to each web-based application. Consequently, it is possible to identify the applications that are being used by the different connected clients and build user-profiles. Wireless traffic generated by several connected clients running some of the most significant web-based applications was captured and analyzed and the obtained results show that it is possible to obtain an accurate application traffic mapping and an accurate user profiling.