Serveur d'exploration sur l'opéra

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications

Identifieur interne : 001193 ( Main/Exploration ); précédent : 001192; suivant : 001194

Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications

Auteurs : Ting-Fang Yen [États-Unis] ; Xin Huang [États-Unis] ; Fabian Monrose [États-Unis] ; K. Reiter [États-Unis]

Source :

RBID : ISTEX:F4C5F215BAD7C95274A2256C0383B870EB1C2348

Abstract

Abstract: We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses and ports, packet and byte counts, and the start and end times of each connection. We additionally provide two applications of browser identification. First, we show how to extend a network intrusion detection system to detect a broader range of malware. Second, we demonstrate the consequences of web browser identification to the deanonymization of web sites in flow records that have been anonymized.

Url:
DOI: 10.1007/978-3-642-02918-9_10


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications</title>
<author>
<name sortKey="Yen, Ting Fang" sort="Yen, Ting Fang" uniqKey="Yen T" first="Ting-Fang" last="Yen">Ting-Fang Yen</name>
</author>
<author>
<name sortKey="Huang, Xin" sort="Huang, Xin" uniqKey="Huang X" first="Xin" last="Huang">Xin Huang</name>
</author>
<author>
<name sortKey="Monrose, Fabian" sort="Monrose, Fabian" uniqKey="Monrose F" first="Fabian" last="Monrose">Fabian Monrose</name>
</author>
<author>
<name sortKey="Reiter, K" sort="Reiter, K" uniqKey="Reiter K" first="K." last="Reiter">K. Reiter</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:F4C5F215BAD7C95274A2256C0383B870EB1C2348</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-02918-9_10</idno>
<idno type="url">https://api.istex.fr/document/F4C5F215BAD7C95274A2256C0383B870EB1C2348/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000524</idno>
<idno type="wicri:Area/Istex/Curation">000524</idno>
<idno type="wicri:Area/Istex/Checkpoint">000378</idno>
<idno type="wicri:doubleKey">0302-9743:2009:Yen T:browser:fingerprinting:from</idno>
<idno type="wicri:Area/Main/Merge">001205</idno>
<idno type="wicri:Area/Main/Curation">001193</idno>
<idno type="wicri:Area/Main/Exploration">001193</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications</title>
<author>
<name sortKey="Yen, Ting Fang" sort="Yen, Ting Fang" uniqKey="Yen T" first="Ting-Fang" last="Yen">Ting-Fang Yen</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Pennsylvanie</region>
</placeName>
<wicri:cityArea>Carnegie Mellon University, Pittsburgh</wicri:cityArea>
</affiliation>
</author>
<author>
<name sortKey="Huang, Xin" sort="Huang, Xin" uniqKey="Huang X" first="Xin" last="Huang">Xin Huang</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Caroline du Nord</region>
</placeName>
<wicri:cityArea>University of North Carolina, Chapel Hill</wicri:cityArea>
</affiliation>
</author>
<author>
<name sortKey="Monrose, Fabian" sort="Monrose, Fabian" uniqKey="Monrose F" first="Fabian" last="Monrose">Fabian Monrose</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Caroline du Nord</region>
</placeName>
<wicri:cityArea>University of North Carolina, Chapel Hill</wicri:cityArea>
</affiliation>
</author>
<author>
<name sortKey="Reiter, K" sort="Reiter, K" uniqKey="Reiter K" first="K." last="Reiter">K. Reiter</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<placeName>
<region type="state">Caroline du Nord</region>
</placeName>
<wicri:cityArea>University of North Carolina, Chapel Hill</wicri:cityArea>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2009</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">F4C5F215BAD7C95274A2256C0383B870EB1C2348</idno>
<idno type="DOI">10.1007/978-3-642-02918-9_10</idno>
<idno type="ChapterID">Chap10</idno>
<idno type="ChapterID">10</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses and ports, packet and byte counts, and the start and end times of each connection. We additionally provide two applications of browser identification. First, we show how to extend a network intrusion detection system to detect a broader range of malware. Second, we demonstrate the consequences of web browser identification to the deanonymization of web sites in flow records that have been anonymized.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>États-Unis</li>
</country>
<region>
<li>Caroline du Nord</li>
<li>Pennsylvanie</li>
</region>
</list>
<tree>
<country name="États-Unis">
<region name="Pennsylvanie">
<name sortKey="Yen, Ting Fang" sort="Yen, Ting Fang" uniqKey="Yen T" first="Ting-Fang" last="Yen">Ting-Fang Yen</name>
</region>
<name sortKey="Huang, Xin" sort="Huang, Xin" uniqKey="Huang X" first="Xin" last="Huang">Xin Huang</name>
<name sortKey="Monrose, Fabian" sort="Monrose, Fabian" uniqKey="Monrose F" first="Fabian" last="Monrose">Fabian Monrose</name>
<name sortKey="Reiter, K" sort="Reiter, K" uniqKey="Reiter K" first="K." last="Reiter">K. Reiter</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/OperaV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001193 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001193 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Musique
   |area=    OperaV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:F4C5F215BAD7C95274A2256C0383B870EB1C2348
   |texte=   Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
}}

Wicri

This area was generated with Dilib version V0.6.21.
Data generation: Thu Apr 14 14:59:05 2016. Site generation: Thu Jan 4 23:09:23 2024