作者: Ting-Fang Yen , Xin Huang , Fabian Monrose , Michael K. Reiter
DOI: 10.1007/978-3-642-02918-9_10
关键词:
摘要: We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to from host. Our techniques utilize connection records containing source destination addresses ports, packet byte counts, start end times each connection. additionally provide two applications identification. First, we show how extend network intrusion detection system detect broader range malware. Second, consequences identification deanonymization sites in flow have been anonymized.