Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
Identifieur interne : 001193 ( Main/Exploration ); précédent : 001192; suivant : 001194Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
Auteurs : Ting-Fang Yen [États-Unis] ; Xin Huang [États-Unis] ; Fabian Monrose [États-Unis] ; K. Reiter [États-Unis]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2009.
Abstract
Abstract: We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses and ports, packet and byte counts, and the start and end times of each connection. We additionally provide two applications of browser identification. First, we show how to extend a network intrusion detection system to detect a broader range of malware. Second, we demonstrate the consequences of web browser identification to the deanonymization of web sites in flow records that have been anonymized.
Url:
DOI: 10.1007/978-3-642-02918-9_10
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 000524
- to stream Istex, to step Curation: 000524
- to stream Istex, to step Checkpoint: 000378
- to stream Main, to step Merge: 001205
- to stream Main, to step Curation: 001193
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications</title>
<author><name sortKey="Yen, Ting Fang" sort="Yen, Ting Fang" uniqKey="Yen T" first="Ting-Fang" last="Yen">Ting-Fang Yen</name>
</author>
<author><name sortKey="Huang, Xin" sort="Huang, Xin" uniqKey="Huang X" first="Xin" last="Huang">Xin Huang</name>
</author>
<author><name sortKey="Monrose, Fabian" sort="Monrose, Fabian" uniqKey="Monrose F" first="Fabian" last="Monrose">Fabian Monrose</name>
</author>
<author><name sortKey="Reiter, K" sort="Reiter, K" uniqKey="Reiter K" first="K." last="Reiter">K. Reiter</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:F4C5F215BAD7C95274A2256C0383B870EB1C2348</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-02918-9_10</idno>
<idno type="url">https://api.istex.fr/document/F4C5F215BAD7C95274A2256C0383B870EB1C2348/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000524</idno>
<idno type="wicri:Area/Istex/Curation">000524</idno>
<idno type="wicri:Area/Istex/Checkpoint">000378</idno>
<idno type="wicri:doubleKey">0302-9743:2009:Yen T:browser:fingerprinting:from</idno>
<idno type="wicri:Area/Main/Merge">001205</idno>
<idno type="wicri:Area/Main/Curation">001193</idno>
<idno type="wicri:Area/Main/Exploration">001193</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications</title>
<author><name sortKey="Yen, Ting Fang" sort="Yen, Ting Fang" uniqKey="Yen T" first="Ting-Fang" last="Yen">Ting-Fang Yen</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Pennsylvanie</region>
</placeName>
<wicri:cityArea>Carnegie Mellon University, Pittsburgh</wicri:cityArea>
</affiliation>
</author>
<author><name sortKey="Huang, Xin" sort="Huang, Xin" uniqKey="Huang X" first="Xin" last="Huang">Xin Huang</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Caroline du Nord</region>
</placeName>
<wicri:cityArea>University of North Carolina, Chapel Hill</wicri:cityArea>
</affiliation>
</author>
<author><name sortKey="Monrose, Fabian" sort="Monrose, Fabian" uniqKey="Monrose F" first="Fabian" last="Monrose">Fabian Monrose</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Caroline du Nord</region>
</placeName>
<wicri:cityArea>University of North Carolina, Chapel Hill</wicri:cityArea>
</affiliation>
</author>
<author><name sortKey="Reiter, K" sort="Reiter, K" uniqKey="Reiter K" first="K." last="Reiter">K. Reiter</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">Caroline du Nord</region>
</placeName>
<wicri:cityArea>University of North Carolina, Chapel Hill</wicri:cityArea>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2009</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">F4C5F215BAD7C95274A2256C0383B870EB1C2348</idno>
<idno type="DOI">10.1007/978-3-642-02918-9_10</idno>
<idno type="ChapterID">Chap10</idno>
<idno type="ChapterID">10</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses and ports, packet and byte counts, and the start and end times of each connection. We additionally provide two applications of browser identification. First, we show how to extend a network intrusion detection system to detect a broader range of malware. Second, we demonstrate the consequences of web browser identification to the deanonymization of web sites in flow records that have been anonymized.</div>
</front>
</TEI>
<affiliations><list><country><li>États-Unis</li>
</country>
<region><li>Caroline du Nord</li>
<li>Pennsylvanie</li>
</region>
</list>
<tree><country name="États-Unis"><region name="Pennsylvanie"><name sortKey="Yen, Ting Fang" sort="Yen, Ting Fang" uniqKey="Yen T" first="Ting-Fang" last="Yen">Ting-Fang Yen</name>
</region>
<name sortKey="Huang, Xin" sort="Huang, Xin" uniqKey="Huang X" first="Xin" last="Huang">Xin Huang</name>
<name sortKey="Monrose, Fabian" sort="Monrose, Fabian" uniqKey="Monrose F" first="Fabian" last="Monrose">Fabian Monrose</name>
<name sortKey="Reiter, K" sort="Reiter, K" uniqKey="Reiter K" first="K." last="Reiter">K. Reiter</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/OperaV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001193 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001193 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Musique |area= OperaV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:F4C5F215BAD7C95274A2256C0383B870EB1C2348 |texte= Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications }}
This area was generated with Dilib version V0.6.21. |