skip to main content
10.1145/3098593.3098602acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Users' Fingerprinting Techniques from TCP Traffic

Published:07 August 2017Publication History

ABSTRACT

Encryption at the application layer is often promoted to protect privacy, i.e., to prevent someone in the network from observing users' communications. In this work we explore how to build a profile for a target user by observing only the names of the services contacted during browsing, names that are still not encrypted and easily accessible from passive probes. Would it be possible to uniquely identify a target user from a large population that accesses the same network?

Aiming at verifying if and how this is possible, we propose and compare three methodologies to compute similarities between users' profiles. We use real data collected in networks, evaluate and discuss performance and the impact of quality of data being used. To this end, we propose a machine learning methodology to extract the services intentionally requested by users, which turn out to be important for the profiling purpose. Results show that the classification problem can be solved with good accuracy (up to 94%), provided some ingenuity is used to build the model.

Skip Supplemental Material Section

Supplemental Material

usersfingerprintingtechniquesfromtcptraffic.webm

webm

70 MB

References

  1. I. Bermudez, M. Mellia, M. Munafò, R. Keralapura, and A. Nucci. 2012. DNS to the Rescue: Discerning Content and Services in a Tangled Web. In Proceedings of the IMC. ACM, 413--426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Conti, L. V. Mancini, R. Spolaor, and N. V. Verde. 2016. Analyzing android encrypted network traffic to identify user actions. IEEE Transactions on Information Forensics and Security 11, 1 (2016), 114--125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Giordano, S. Traverso, and M. Mellia. 2015. Exploring browsing habits of internauts: A measurement perspective. In Proceedings of the Asian Internet Engineering Conference. ACM, 54--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Herrmann, C. Banse, and H. Federrath. 2013. Behavior-based tracking: Exploiting characteristic patterns in DNS traffic. In Computers & Security, Vol. 39. Elsevier, 17--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Kumpošt and V. Matyáš. 2009. User profiling and re-identification: case of university-wide network analysis. In Proceedings of the TrustBus. Springer, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Olejnik, C. Castelluccia, and A. Janc. 2012. Why Johnny can't browse in peace: On the uniqueness of web browsing history patterns. In Proceedings of the HotPETs.Google ScholarGoogle Scholar
  7. B. Saltaformaggio, H. Choi, K. Johnson, Y. Kwon, Q. Zhang, X. Zhang, D. Xu, and J. Qian. 2016. Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In Proceedings of the WOOT16. ACM, 59--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Karen Sparck Jones. 1972. A statistical interpretation of term specificity and its application in retrieval. Journal of documentation 28, 1 (1972), 11--21.Google ScholarGoogle ScholarCross RefCross Ref
  9. J. Su, A. Shukla, S. Goel, and A. Narayanan. 2017. De-anonymizing Web Browsing Data with Social Networks. To appear in WWW. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Trevisan, A. Finamore, M. Mellia, M. Munafo, and D. Rossi. 2017. Traffic Analysis with Off-the-Shelf Hardware: Challenges and Lessons Learned. IEEE Communications Magazine 55, 3 (March 2017), 163--169. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Vassio, I. Drago, and M. Mellia. 2016. Detecting User Actions from HTTP Traces: Toward an Automatic Approach. In Proceedings of the TRAC. IEEE, 50--55.Google ScholarGoogle Scholar
  12. G. Xie, M. Iliofotou, T. Karagiannis, M. Faloutsos, and Y. Jin. 2013. Resurf: Reconstructing Web-Surfing Activity from Network Traffic. In Proceedings of the Networking. IEEE, 1--9.Google ScholarGoogle Scholar

Index Terms

  1. Users' Fingerprinting Techniques from TCP Traffic

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          Big-DAMA '17: Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks
          August 2017
          58 pages
          ISBN:9781450350549
          DOI:10.1145/3098593

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 August 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate7of11submissions,64%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader