Advanced Web Traffic Modelling and Forecasting with a Hybrid Predictive Approach
DOI:
https://doi.org/10.13052/jwe1540-9589.2434Keywords:
Web Traffic Analysis, ARIMA, LSTM, prophet model, time series forecasting, predictive analytics, user engagement, seasonal variations, machine learningAbstract
Web traffic analysis is crucial for optimising user experience and engagement. This research explores a hybrid approach combining traditional statistical methods, like the autoregressive integrated moving average (ARIMA) model, with advanced techniques such as long short-term memory (LSTM) neural networks and the Prophet model. ARIMA effectively captures linear trends, seasonal effects, and cyclic behaviours, while LSTM handles complex non-linear patterns, and Prophet addresses seasonal variations and missing data. The hybrid model demonstrated 93% accuracy in predicting web traffic, highlighting the benefits of integrating these methodologies. This approach enables businesses to better manage resources, boost user engagement, and improve revenue. Future research will focus on refining hybrid models by incorporating new data features and ensemble methods to further enhance prediction accuracy, ultimately advancing the understanding of web traffic trends and user behaviour.
Downloads
References
Alhalabi, W., Gaurav, A., Arya, V., Zamzami, I. F., and Aboalela, R. A. (2023). Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1–17. https://doi.org/10.4018/IJSWIS.327280.
Alsmirat, M. A., Jararweh, Y., Obaidat, I., and Gupta, B. B. (2017). Internet of surveillance: A cloud supported large-scale wireless surveillance system. The Journal of Supercomputing, 73(3), 973–992. https://doi.org/10.1007/s11227-016-1857-x.
Belavadi, S. V., Rajagopal, S., R, R., and Mohan, R. (2020). Air Quality Forecasting using LSTM RNN and Wireless Sensor Networks. Procedia Computer Science, 170, 241–248. https://doi.org/10.1016/j.procs.2020.03.036.
Chen, B.-J., Chang, M.-W., and lin, C.-J. (2004). Load forecasting using support vector Machines: A study on EUNITE competition 2001. IEEE Transactions on Power Systems, 19(4), 1821–1830. IEEE Transactions on Power Systems. https://doi.org/10.1109/TPWRS.2004.835679.
Chen, J., and Cheng, W. (2016). Analysis of web traffic based on HTTP protocol. 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 1–5. https://doi.org/10.1109/SOFTCOM.2016.7772120.
Chen, M.-T., Chang, Y. Y., and Wu, T. J. (2024). Digital Copyright Management Mechanism Based on Dynamic Encryption for Multiplatform Browsers. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1–22. https://doi.org/10.4018/IJSWIS.334591.
El Hag, H. M. A., and Sharif, S. M. (2007). An adjusted ARIMA model for internet traffic. AFRICON 2007, 1–6. https://doi.org/10.1109/AFRCON.2007.4401554.
Gupta, A., Singh, S. K., Gupta, B. B., Chopra, M., and Gill, S. S. (2023). Evaluating the Sustainable COVID-19 Vaccination Framework of India Using Recurrent Neural Networks. Wireless Personal Communications, 133(1), 73–91. https://doi.org/10.1007/s11277-023-10751-3.
Gupta, S., Agrawal, S., Singh, S. K., and Kumar, S. (2023). A Novel Transfer Learning-Based Model for Ultrasound Breast Cancer Image Classification. In S. Smys, J. M. R. S. Tavares, and F. Shi (Eds.), Computational Vision and Bio-Inspired Computing (Vol. 1439, pp. 511–523). Springer Nature Singapore. https://doi.org/10.1007/978-981-19-9819-5_37.
Hasnain, M., Pasha, M. F., Lim, C. H., and Ghan, I. (2019). Recurrent Neural Network for Web Services Performance Forecasting, Ranking and Regression Testing. 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 96–105. https://doi.org/10.1109/APSIPAASC47483.2019.9023052.
Ihm, S., and Pai, V. S. (2011). Towards understanding modern web traffic. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, 295–312. https://doi.org/10.1145/2068816.2068845.
Kakade, M. S., Anupama, K. R., Nayak, S., &Garang, S. (2024). Custom Network Protocol Stack for Communication Between Nodes in a Cloudlet System. International Journal of Cloud Applications and Computing (IJCAC), 14(1), 1–24. https://doi.org/10.4018/IJCAC.339891.
Katwal, S., Shrestha, R., and Sharma, G. (2024). Analysis of Website Traffic Time Series Forecasting using ARIMA, Prophet, and LSTM RNN. International Journal of Research Publications, 146. https://doi.org/10.47119/IJRP1001461420246271.
Kaur, P., Singh, S. K., Singh, I., and Kumar, S. (n.d.). Exploring Convolutional Neural Network in Computer Vision- based Image Classification.
Khade, G., Kumar, S., and Bhattacharya, S. (2012). Classification of web pages on attractiveness: A supervised learning approach. 2012 4th International Conference on Intelligent Human Computer Interaction (IHCI), 1–5. https://doi.org/10.1109/IHCI.2012.6481867.
Khanam, S., Tanweer, S., and Khalid, S. S. (2022). Future of Internet of Things: Enhancing Cloud-Based IoT Using Artificial Intelligence. International Journal of Cloud Applications and Computing (IJCAC), 12(1), 1–23. https://doi.org/10.4018/IJCAC.297094.
Kumar, S., Karnani, G., Gaur, M. S., and Mishra, A. (2021). Cloud Security using Hybrid Cryptography Algorithms. 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 599–604. https://doi.org/10.1109/ICIEM51511.2021.9445377.
Kumar, S., Singh, S. K., and Aggarwal, N. (2023). Speculative Parallelism on Multicore Chip Architecture Strengthen Green Computing Concept: A Survey. In Advanced Computer Science Applications. Apple Academic Press.
Lu, J., Shen, J., Vijayakumar, P., and Gupta, B. B. (2022). Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things. IEEE Transactions on Industrial Informatics, 18(8), 5422–5431. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2021.3112601.
Mengi, G., Singh, S. K., Kumar, S., Mahto, D., and Sharma, A. (2023). Automated Machine Learning (AutoML): The Future of Computational Intelligence. In N. Nedjah, G. Martínez Pérez, and B. B. Gupta (Eds.), International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) (pp. 309–317). Springer International Publishing. https://doi.org/10.1007/978-3-031-22018-0_28.
Peñalvo, F. J. G., Sharma, A., Chhabra, A., Singh, S. K., Kumar, S., Arya, V., and Gaurav, A. (2022). Mobile Cloud Computing and Sustainable Development: Opportunities, Challenges, and Future Directions. International Journal of Cloud Applications and Computing (IJCAC), 12(1), 1–20. https://doi.org/10.4018/IJCAC.312583.
Saini, T., Kumar, S., Vats, T., and Singh, M. (n.d.). Edge Computing in Cloud Computing Environment: Opportunities and Challenges.
Samal, K. K. R., Babu, K. S., Das, S. K., and Acharaya, A. (2019). Time Series based Air Pollution Forecasting using SARIMA and Prophet Model. Proceedings of the 2019 International Conference on Information Technology and Computer Communications, 80–85. https://doi.org/10.1145/3355402.3355417.
Sharma, A., Singh, S. K., Chhabra, A., Kumar, S., Arya, V., and Moslehpour, M. (2023). A Novel Deep Federated Learning-Based Model to Enhance Privacy in Critical Infrastructure Systems. International Journal of Software Science and Computational Intelligence (IJSSCI), 15(1), 1–23. https://doi.org/10.4018/IJSSCI.334711.
Shewalkar, A., Nyavanandi, D., and Ludwig, S. A. (2019). Performance Evaluation of Deep Neural Networks Applied to Speech Recognition: RNN, LSTM and GRU. Journal of Artificial Intelligence and Soft Computing Research, 9(4), 235–245.
Singh, A., and Gupta, B. B. (2022). Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1–43. https://doi.org/10.4018/IJSWIS.297143.
Singh, I., Singh, S. Kr., Kumar, S., and Aggarwal, K. (2022). Dropout-VGG Based Convolutional Neural Network for Traffic Sign Categorization. In M. Saraswat, H. Sharma, K. Balachandran, J. H. Kim, and J. C. Bansal (Eds.), Congress on Intelligent Systems (pp. 247–261). Springer Nature. https://doi.org/10.1007/978-981-16-9416-5_18.
Singh, S., Sharma, S., Singla, D., and Gill, S. S. (2022). Evolving Requirements and Application of SDN and IoT in the Context of Industry 4.0, Blockchain and Artificial Intelligence (pp. 427–496).
Syu, Y., Kuo, J.-Y., and Fanjiang, Y.-Y. (2017). Time series forecasting for dynamic quality of web services: An empirical study. Journal of Systems and Software, 134, 279–303. https://doi.org/10.1016/j.jss.2017.09.011.
Tewari, A., and Gupta, B. b. (2017). A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. International Journal of Advanced Intelligence Paradigms, 9(2–3), 111–121. https://doi.org/10.1504/IJAIP.2017.082962.
Yaacob, A. H., Tan, I. K. T., Chien, S. F., and Tan, H. K. (2010). ARIMA Based Network Anomaly Detection. 2010 Second International Conference on Communication Software and Networks, 205–209. https://doi.org/10.1109/ICCSN.2010.55.
Yamak, P. T., Yujian, L., and Gadosey, P. K. (2020). A Comparison between ARIMA, LSTM, and GRU for Time Series Forecasting. Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence, 49–55. https://doi.org/10.1145/3377713.3377722.
Yuan, H., Zhang, D., Xu, W., Wang, M., and Dong, W. (2013). Forecasting the CPI Using a Hybrid Sarima and Neural Network Model with Web News Articles. 2013 Sixth International Conference on Business Intelligence and Financial Engineering, 84–88. https://doi.org/10.1109/BIFE.2013.19.
Zhang, T., Zhang, Z., Zhao, K., Gupta, B. B., and Arya, V. (2023). A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1–25. https://doi.org/10.4018/IJSWIS.333481.
Zhao, M., Shi, C., and Yuan, Y. (2024). Blockchain-Based Lightweight Authentication Mechanisms for Industrial Internet of Things and Information Systems. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1–30. https://doi.org/10.4018/IJSWIS.334704.
Zhu, D., Shan, X., Wu, C., Yung, K., and Ip, A. W. H. (2024). Multi Frame Obscene Video Detection WithViT: An Effective for Detecting Inappropriate Content. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1–18. https://doi.org/10.4018/IJSWIS.359768.

