Skip to main content

Toward Identifying and Understanding User-Agent Strings in HTTP Traffic

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8710))

Abstract

Since HTTP is responsible for more than 25% of the total traffic volume in the Internet, we are curious about what happens in the http traffic and what it contains. We collected an anonymized HTTP head only data from a DSL line of a campus’s border for continuous 11 days. In this paper, we focus on the user-agent (UA) strings. We first improve a well know open source UASparser, identifying 34.4% (9.8%) more user-agent types (operator system) of overall transactions. In addition, our analysis of user-agent strings shows that Windows XP contributes to more than half of personal computer (PC) HTTP traffic. Mobile devices account for more than 16% of total transactions, and automatic programs share at least 20%. These information leads to following conclusions: PC devices in China are threatened to a huge risk as security support for Windows XP has been stopped recently; mobile devices occupy a big proportion in total transactions of a DSL lines, larger than other researchers [10] noticed 4 or 5 years ago; Android and IOS devices dominate the mobile transactions; automatic programs take up at least one fifth of all HTTP traffic and that means the researcher should no longer ignore the influence of them.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Callahan, T., Allman, M., Paxson, V.: A longitudinal view of HTTP traffic. In: Krishnamurthy, A., Plattner, B. (eds.) PAM 2010. LNCS, vol. 6032, pp. 222–231. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  2. Schneider, F., Ager, B., Maier, G., Feldmann, A., Uhlig, S.: Pitfalls in HTTP traffic measurements and analysis. In: Taft, N., Ricciato, F. (eds.) PAM 2012. LNCS, vol. 7192, pp. 242–251. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  3. Dhungana, S.: Mobile Web Usage: A Network Perspective (2013)

    Google Scholar 

  4. Ager, B., Schneider, F., Kim, J., et al.: Revisiting cacheability in times of user generated content. In: IEEE INFOCOM IEEE Conference on Computer Communications Workshops, vol. 2010, pp. 1–6 (2010)

    Google Scholar 

  5. Schneider, F., Agarwal, S., Alpcan, T., Feldmann, A.: The new web: Characterizing AJAX traffic. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol. 4979, pp. 31–40. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Schneider, F., Feldmann, A., Krishnamurthy, B., et al.: Understanding online social network usage from a network perspective. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, pp. 35–48. ACM (2009)

    Google Scholar 

  7. Augustin, B., Mellouk, A.: On Traffic Patterns of HTTP Applications. In: 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1–6. IEEE (2011)

    Google Scholar 

  8. Ihm, S., Pai, V.S.: Towards understanding modern web traffic. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 295–312. ACM (2011)

    Google Scholar 

  9. Fielding, R., Gettys, J., Mogul, J., et al.: Hypertext transfer protocol–HTTP/1.1, 1999. RFC2616 (2006)

    Google Scholar 

  10. Maier, G., Schneider, F., Feldmann, A.: A first look at mobile hand-held device traffic. In: Krishnamurthy, A., Plattner, B. (eds.) PAM 2010. LNCS, vol. 6032, pp. 161–170. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Falaki, H., Lymberopoulos, D., Mahajan, R., et al.: A first look at traffic on smartphones. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 281–287. ACM (2010)

    Google Scholar 

  12. Glitho, R.H., Hamadi, R., Huie, R.: Architectural framework for using java servlets in a SIP environment. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, pp. 707–716. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Holley, R., Rosenfeld, D.: MAUL: Machine Agent User Learning

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Xu, Y., Xiong, G., Zhao, Y., Guo, L. (2014). Toward Identifying and Understanding User-Agent Strings in HTTP Traffic. In: Han, W., Huang, Z., Hu, C., Zhang, H., Guo, L. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8710. Springer, Cham. https://doi.org/10.1007/978-3-319-11119-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11119-3_17

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11118-6

  • Online ISBN: 978-3-319-11119-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics