Browser fingerprinting from coarse traffic summaries: Techniques and implications
Publication
, Conference
Yen, TF; Huang, X; Monrose, F; Reiter, MK
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
November 9, 2009
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses and ports, packet and byte counts, and the start and end times of each connection. We additionally provide two applications of browser identification. First, we show how to extend a network intrusion detection system to detect a broader range of malware. Second, we demonstrate the consequences of web browser identification to the deanonymization of web sites in flow records that have been anonymized. © 2009 Springer Berlin Heidelberg.
Duke Scholars
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DOI
EISSN
1611-3349
ISSN
0302-9743
Publication Date
November 9, 2009
Volume
5587 LNCS
Start / End Page
157 / 175
Related Subject Headings
- Artificial Intelligence & Image Processing
- 46 Information and computing sciences
Citation
APA
Chicago
ICMJE
MLA
NLM
Yen, T. F., Huang, X., Monrose, F., & Reiter, M. K. (2009). Browser fingerprinting from coarse traffic summaries: Techniques and implications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5587 LNCS, pp. 157–175). https://doi.org/10.1007/978-3-642-02918-9_10
Yen, T. F., X. Huang, F. Monrose, and M. K. Reiter. “Browser fingerprinting from coarse traffic summaries: Techniques and implications.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5587 LNCS:157–75, 2009. https://doi.org/10.1007/978-3-642-02918-9_10.
Yen TF, Huang X, Monrose F, Reiter MK. Browser fingerprinting from coarse traffic summaries: Techniques and implications. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 157–75.
Yen, T. F., et al. “Browser fingerprinting from coarse traffic summaries: Techniques and implications.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5587 LNCS, 2009, pp. 157–75. Scopus, doi:10.1007/978-3-642-02918-9_10.
Yen TF, Huang X, Monrose F, Reiter MK. Browser fingerprinting from coarse traffic summaries: Techniques and implications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 157–175.
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DOI
EISSN
1611-3349
ISSN
0302-9743
Publication Date
November 9, 2009
Volume
5587 LNCS
Start / End Page
157 / 175
Related Subject Headings
- Artificial Intelligence & Image Processing
- 46 Information and computing sciences