Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications

作者: Ting-Fang Yen , Xin Huang , Fabian Monrose , Michael K. Reiter

DOI: 10.1007/978-3-642-02918-9_10

关键词:

摘要: We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to from host. Our techniques utilize connection records containing source destination addresses ports, packet byte counts, start end times each connection. additionally provide two applications identification. First, we show how extend network intrusion detection system detect broader range malware. Second, consequences identification deanonymization sites in flow have been anonymized.

参考文章(38)
F. Monrose, S. E. Coull, M. P. Collins, C. V. Wright, M. K. Reiter, On web browsing privacy in anonymized NetFlows usenix security symposium. pp. 23- ,(2007)
Douglas E Comer, John C Lin, None, Probing TCP implementations usenix summer technical conference. pp. 17- 17 ,(1994)
Andrew W. Moore, Konstantina Papagiannaki, Toward the Accurate Identification of Network Applications Lecture Notes in Computer Science. pp. 41- 54 ,(2005) , 10.1007/978-3-540-31966-5_4
Fabrice Bellard, QEMU, a fast and portable dynamic translator usenix annual technical conference. pp. 41- 41 ,(2005)
Michael P. Collins, Michael K. Reiter, Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors Computer Security – ESORICS 2006. pp. 1- 17 ,(2006) , 10.1007/11863908_1
Brian Rexroad, Anestis Karasaridis, David Hoeflin, Wide-scale botnet detection and characterization conference on workshop on hot topics in understanding botnets. pp. 7- 7 ,(2007)
William Aiello, Charles Kalmanek, Patrick McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus Van der Merwe, Analysis of Communities of Interest in Data Networks Lecture Notes in Computer Science. ,vol. 3431, pp. 83- 96 ,(2005) , 10.1007/978-3-540-31966-5_7
Mark A. Hall, Ian H. Witten, Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques ,(1999)
Robert Beverly, A Robust Classifier for Passive TCP/IP Fingerprinting passive and active network measurement. pp. 158- 167 ,(2004) , 10.1007/978-3-540-24668-8_16
D. Koukis, S. Antonatos, K. G. Anagnostakis, On the privacy risks of publishing anonymized IP network traces international conference on communications. pp. 22- 32 ,(2006) , 10.1007/11909033_3