Skip to main content
Journal cover image

Browser fingerprinting from coarse traffic summaries: Techniques and implications

Publication ,  Conference
Yen, TF; Huang, X; Monrose, F; Reiter, MK
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
November 9, 2009

We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses and ports, packet and byte counts, and the start and end times of each connection. We additionally provide two applications of browser identification. First, we show how to extend a network intrusion detection system to detect a broader range of malware. Second, we demonstrate the consequences of web browser identification to the deanonymization of web sites in flow records that have been anonymized. © 2009 Springer Berlin Heidelberg.

Duke Scholars

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

ISBN

9783642029172

Publication Date

November 9, 2009

Volume

5587 LNCS

Start / End Page

157 / 175

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Yen, T. F., Huang, X., Monrose, F., & Reiter, M. K. (2009). Browser fingerprinting from coarse traffic summaries: Techniques and implications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5587 LNCS, pp. 157–175). https://doi.org/10.1007/978-3-642-02918-9_10
Yen, T. F., X. Huang, F. Monrose, and M. K. Reiter. “Browser fingerprinting from coarse traffic summaries: Techniques and implications.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5587 LNCS:157–75, 2009. https://doi.org/10.1007/978-3-642-02918-9_10.
Yen TF, Huang X, Monrose F, Reiter MK. Browser fingerprinting from coarse traffic summaries: Techniques and implications. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 157–75.
Yen, T. F., et al. “Browser fingerprinting from coarse traffic summaries: Techniques and implications.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5587 LNCS, 2009, pp. 157–75. Scopus, doi:10.1007/978-3-642-02918-9_10.
Yen TF, Huang X, Monrose F, Reiter MK. Browser fingerprinting from coarse traffic summaries: Techniques and implications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 157–175.
Journal cover image

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

ISBN

9783642029172

Publication Date

November 9, 2009

Volume

5587 LNCS

Start / End Page

157 / 175

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences