Thank you Prof. Dr. Gerhard Boerner ! Stephen, Thomas, Houjun, Me, Robert Jing.

Slides:



Advertisements
Similar presentations
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Chapter 2: Application Layer
The Internet Useful Definitions and Concepts About the Internet.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Web, HTTP and Web Caching
Privacy – what do they know about you? This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
1 The World Wide Web. 2  Web Fundamentals  Pages are defined by the Hypertext Markup Language (HTML) and contain text, graphics, audio, video and software.
2/9/2004 Web and HTTP February 9, /9/2004 Assignments Due – Reading and Warmup Work on Message of the Day.
Lecture 21: Privacy and Online Advertising. References Challenges in Measuring Online Advertising Systems by Saikat Guha, Bin Cheng, and Paul Francis.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
How It Applies In A Virtual World
Internet Services -World Wide Web - -Conferencing and Newsgroups -File Transfer & Updating -Chat/Instant Messaging.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Computer Concepts 2014 Chapter 7 The Web and .
USING HADOOP & HBASE TO BUILD CONTENT RELEVANCE & PERSONALIZATION Tools to build your big data application Ameya Kanitkar.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 16 The World Wide Web. 2 The Web An infrastructure of information combined and the network software used to access it Web page A document that.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
CP476 Internet Computing Lecture 5 : HTTP, WWW and URL 1 Lecture 5. WWW, HTTP and URL Objective: to review the concepts of WWW to understand how HTTP works.
2: Application Layer1 CS 4244: Internet Software Development Dr. Eli Tilevich.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
Sockets process sends/receives messages to/from its socket
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Unit 9: Distributing Computing & Networking Kaplan University 1.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Skill Area 214 Introduce World wide web(www)
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
CSCI-235 Micro-Computers in Science The Internet and World Wide Web.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
JavaScript and Ajax (Internet Background) Week 1 Web site:
Week 11: Application Layer 1 Web and HTTP r Web page consists of objects r Object can be HTML file, JPEG image, Java applet, audio file,… r Web page consists.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Computer Concepts 2014 Chapter 7 The Web and .
COMP2322 Lab 4 Socket Programming Toby Lam March 2, 2016.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
COMPUTER NETWORKS Hwajung Lee. Image Source:
1 DATA-DRIVEN SOLUTIONS. 2 KEYWORD-LEVEL SEARCH RETARGETING TARGET USERS BASED ON THEIR RECENT SEARCH HISTORY AND SEARCH QUERIES. A user performs a search.
© Janice Regan, CMPT 128, Jan 2007 CMPT 371 Data Communications and Networking HTTP 0.
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
VCE IT Theory Slideshows
COMP2322 Lab 4 Socket Programming
Block 5: An application layer protocol: HTTP
Section A: Web Technology
Lecture 5 Blocking practices
The Internet Industry Week Two.
Unit 12 Using the Internet & Browsing the Web
Internet transport protocols services
Topic 5: Communication and the Internet
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Introduction to Networks
Unit# 5: Internet and Worldwide Web
Internet Protocols IP: Internet Protocol
The Internet and Electronic mail
Presentation transcript:

Thank you Prof. Dr. Gerhard Boerner ! Stephen, Thomas, Houjun, Me, Robert Jing

Large Scale Statistics in Internet Behaviors Hongguang Bi Greetingland, LLC Los Angeles, CA

Internet and WWW History, how it works Internet User Behaviors & Privacy Online Advertising Geo, contextual and behavior targetings, Real-time bidding, Yield management Chapter 1 About Collect User Information, what and how Chapter 2 Chapter 3 Chapter 4

Cosmology: Nature defines physical laws Internet: Human defines laws (or specifically: protocols) Chapter 1: Internet and WWW Cosmology: photons, electrons, neutrinos … (monad? Leibniz) Internet: bit Cosmology: particles => stars => galaxies => clusters etc. Internet: bits => bytes or integers => words => pages & s Cosmology: millions of galaxies detected => billions Internet: millions to billions of users Cosmology: goal=> structures, statistics of galaxies Internet: goal=> behaviors, statistics of users Cosmology: Real World Internet: Information World, or Virtual World

Open Systems Interconnection Model: 7 layers TCP, UDP IP HTTP Encrypt

Information Age: Web and WWW: March 1989, Tim Berners-Lee http 0.9: 1995; http 1.0: 1996; http 1.1: June 1999, RFC 2616 Mailbox Protocol: 1971 SMTP: 1982, RFC 821 Later developments: UUCP, sendmail,

User sends request URL Address Browser (Firefox, IE, Mobile etc.) Language, who refers you, etc. Cookies Web server responses Message body Message size, modified time etc. Server information Setup cookies http, how web works Cookie is the only way that server can insert data into user’s browser. How does it work? Client: send request without cookie; Server: response with a “Set-Cookie” header, containing some information Client: send request with a “Cookie” header containing the SAME information Cookie is bound to the specific server, and can be multiple

Chapter 2: User Behaviors & Privacy 1 Billion internet users: few hundred millions in Europe, 100M in US, China IP4 is full, which is 2^32 = 4.3 Billion addresses Google gets 80 billions views every day, e.g. one internet user visits about 1 Google page very day (e.g. search, , ad) Internet brings new economics, life styles, and social phenomena. E.g. online shopping, social network (facebook), newspaper and publication, US elections For the 1 st time in history, human beings might lose privacy; and their social activities can be tracked, studied, finally, manipulated by powerful players such as US government or Google etc.

Cases: Currently: “Tracking case”, Apply & Google Information is transmitted securely to the Apply iAd server via a cellular network connection or Wi-Fi Internet conneciton,” explained a letter Apple sent to US Rep Edward Marke, D-Mass., on July 12 in response to his request for information, “The latitude/longitude coordinates are converted immediately by the server to a five-digit ZIP code” “Suicide” case, mySpace On the technical side, Credit card industry has successfully built up tracking tools that track user behaviors for 20 year!

You definitely expose Geographic information (via IP) OS and Browser, such as PC, Linux, iPhone Language May lost, protected by laws You name, identity cards (credit card, SSI, driver license etc.) Via online shopping sites, government/university service sites, credit report sites, dating sites etc. practically, still be stolen => virus, spyware, break-in May lose, un-protected Demographic information e.g. age, gender, income, household Via ISP, or cellular service provider, social network sites, other Free services What kind of Private Information?

User Profile Uniquely identified by an anonymous ID The ID is tracked by using cookie and permanently saved in disk Every ID has a profile, consisting of geographic information, demographic information, interests, shopping histories, recent behavior types (or, audiences) => any valuable information for advertisers Existing Techniques Relational Database Moving averages Artificial neural Network Chapter 4: Collect User Information

Relational Database A database consists of many “normalized” tables A table consists of a primary key and multiple values One table can have many keys to search ResearchGroup: group_id, name, desciption, head Member: member_id, group_id, name, type (profession, postdoc, student), status (current, left) Left: left_id, member_id, when, where

Moving Average A new value is an average of the last N detections, with weights that decay on time. A simplified time-series analysis tool

Artificial Neural Network Machine learning Training: 3,5 => 15 4,6 => 24 9,8 => 72 …. ….. 6,7 => 41 Neurons work in parallel => very fast

The Good side of tracking Chapter 5: Online Advertising

The Good side of user tracking Current Challenges server process 10,000 requests per second for each request, update user profile with 100 attributes pick up one from 100 possible advertiser candidates 10^8 decisions per second 100 million impressions per day The system we are developing

Statistics => dynamic, finding rules, clustering analysis, time-series analysis Instant change of behaviors, e.g. shopping intention How are behaviors affected by environment : social effect, “friend- recommendation” effect THANKS! In the Future