Skip to main content

2022 | OriginalPaper | Buchkapitel

Fingerprint Defender: Defense Against Browser-Based User Tracking

verfasst von : Deepali Moad, Vikas Sihag, Gaurav Choudhary, Daniel Gerbi Duguma, Ilsun You

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

It is difficult to be anonymous online with user activities always under the scanner. Multiple identifiers and their combinatories are used for user identification. While browsing, trackers keep a record of artifacts such as OS version, screen resolution, and fonts enabled. Browser fingerprinting tries to identify a user’s browser uniquely, without using cookies or other stateful signatures. We propose a browser fingerprint defender tool to anonymize user browsers. It creates captures current user attributes and anonymizes them before sending a request to the server. It also gives current browser fingerprint attributes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Fannah, N.M., Mitchell, C.: Too little too late: can we control browser fingerprinting? J. Intellect. Capit. (2020) Al-Fannah, N.M., Mitchell, C.: Too little too late: can we control browser fingerprinting? J. Intellect. Capit. (2020)
2.
Zurück zum Zitat Bae, D., Ha, J.: Performance metric for differential deep learning analysis. J. Internet Serv. Inf. Secur. (JISIS) 11(2), 22–33 (2021) Bae, D., Ha, J.: Performance metric for differential deep learning analysis. J. Internet Serv. Inf. Secur. (JISIS) 11(2), 22–33 (2021)
3.
Zurück zum Zitat Blakemore, C., Redol, J., Correia, M.: Fingerprinting for web applications: from devices to related groups. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 144–151. IEEE (2016) Blakemore, C., Redol, J., Correia, M.: Fingerprinting for web applications: from devices to related groups. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 144–151. IEEE (2016)
5.
Zurück zum Zitat Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(1), 35–53 (2020) Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(1), 35–53 (2020)
6.
Zurück zum Zitat Chen, R., Guo, J., Wang, D.-C., Tsai, J.J., Al-Hamadi, H., You, I.: Trust-based service management for mobile cloud IoT systems. IEEE Trans. Netw. Serv. Manage. 16(1), 246–263 (2018)CrossRef Chen, R., Guo, J., Wang, D.-C., Tsai, J.J., Al-Hamadi, H., You, I.: Trust-based service management for mobile cloud IoT systems. IEEE Trans. Netw. Serv. Manage. 16(1), 246–263 (2018)CrossRef
7.
Zurück zum Zitat Cimpanu, C.: Brave to generate random browser fingerprints to preserve user privacy, March 2020 Cimpanu, C.: Brave to generate random browser fingerprints to preserve user privacy, March 2020
10.
Zurück zum Zitat Gómez-Boix, A., Laperdrix, P., Baudry, B.: Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale. In: Proceedings of the 2018 World Wide Web Conference, pp. 309–318 (2018) Gómez-Boix, A., Laperdrix, P., Baudry, B.: Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale. In: Proceedings of the 2018 World Wide Web Conference, pp. 309–318 (2018)
11.
Zurück zum Zitat Greitzer, F.L., Purl, J., Sticha, P.J., Yu, M.C., Lee, J.: Use of expert judgments to inform Bayesian models of insider threat risk. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(2), 3–47 (2021) Greitzer, F.L., Purl, J., Sticha, P.J., Yu, M.C., Lee, J.: Use of expert judgments to inform Bayesian models of insider threat risk. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(2), 3–47 (2021)
12.
Zurück zum Zitat Gulyás, G., Schulcz, R., Imre, S.: Comprehensive analysis of web privacy and anonymous web browsers: are next generation services based on collaborative filtering? In: Joint SPACE and TIME International Workshops. Citeseer (2008) Gulyás, G., Schulcz, R., Imre, S.: Comprehensive analysis of web privacy and anonymous web browsers: are next generation services based on collaborative filtering? In: Joint SPACE and TIME International Workshops. Citeseer (2008)
13.
Zurück zum Zitat Iqbal, U., Englehardt, S., Shafiq, Z.: Fingerprinting the fingerprinters: learning to detect browser fingerprinting behaviors. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1143–1161. IEEE (2021) Iqbal, U., Englehardt, S., Shafiq, Z.: Fingerprinting the fingerprinters: learning to detect browser fingerprinting behaviors. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1143–1161. IEEE (2021)
14.
Zurück zum Zitat Johnson, C., Khadka, B., Basnet, R.B., Doleck, T.: Towards detecting and classifying malicious URLs using deep learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 31–48 (2020) Johnson, C., Khadka, B., Basnet, R.B., Doleck, T.: Towards detecting and classifying malicious URLs using deep learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 31–48 (2020)
15.
Zurück zum Zitat Kaur, N., Azam, S., Kannoorpatti, K., Yeo, K.C., Shanmugam, B.: Browser fingerprinting as user tracking technology. In: 2017 11th International Conference on Intelligent Systems and Control (ISCO), pp. 103–111. IEEE (2017) Kaur, N., Azam, S., Kannoorpatti, K., Yeo, K.C., Shanmugam, B.: Browser fingerprinting as user tracking technology. In: 2017 11th International Conference on Intelligent Systems and Control (ISCO), pp. 103–111. IEEE (2017)
16.
Zurück zum Zitat Laperdrix, P., Bielova, N., Baudry, B., Avoine, G.: Browser fingerprinting: a survey. ACM Trans. Web (TWEB) 14(2), 1–33 (2020)CrossRef Laperdrix, P., Bielova, N., Baudry, B., Avoine, G.: Browser fingerprinting: a survey. ACM Trans. Web (TWEB) 14(2), 1–33 (2020)CrossRef
17.
Zurück zum Zitat Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of android malware. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 1–28 (2020) Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of android malware. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 1–28 (2020)
18.
Zurück zum Zitat Sharma, V., You, I., Kul, G.: Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pp. 81–84 (2017) Sharma, V., You, I., Kul, G.: Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pp. 81–84 (2017)
19.
Zurück zum Zitat Sharma, V., You, I., Yim, K., Chen, R., Cho, J.-H.: BRIoT: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7, 118556–118580 (2019)CrossRef Sharma, V., You, I., Yim, K., Chen, R., Cho, J.-H.: BRIoT: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7, 118556–118580 (2019)CrossRef
20.
Zurück zum Zitat Shichkina, Y.A., Kataeva, G.V., Irishina, Y.A., Stanevich, E.S.: The use of mobile phones to monitor the status of patients with Parkinson’s disease. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), 55–73 (2020) Shichkina, Y.A., Kataeva, G.V., Irishina, Y.A., Stanevich, E.S.: The use of mobile phones to monitor the status of patients with Parkinson’s disease. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), 55–73 (2020)
21.
Zurück zum Zitat Sihag, V., Vardhan, M., Singh, P., Choudhary, G., Son, S.: De-LADY: deep learning based android malware detection using dynamic features. J. Internet Serv. Inf. Secur. (JISIS) 11(2), 34–45 (2021) Sihag, V., Vardhan, M., Singh, P., Choudhary, G., Son, S.: De-LADY: deep learning based android malware detection using dynamic features. J. Internet Serv. Inf. Secur. (JISIS) 11(2), 34–45 (2021)
22.
Zurück zum Zitat Talegaon, S., Krishnan, R.: Administrative models for role based access control in android. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 31–46 (2020) Talegaon, S., Krishnan, R.: Administrative models for role based access control in android. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 31–46 (2020)
23.
Zurück zum Zitat Trickel, E., Starov, O., Kapravelos, A., Nikiforakis, N., Doupé, A.: Everyone is different: client-side diversification for defending against extension fingerprinting. In: 28th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 19), pp. 1679–1696 (2019) Trickel, E., Starov, O., Kapravelos, A., Nikiforakis, N., Doupé, A.: Everyone is different: client-side diversification for defending against extension fingerprinting. In: 28th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 19), pp. 1679–1696 (2019)
24.
Zurück zum Zitat Unger, T., Mulazzani, M., Frühwirt, D., Huber, M., Schrittwieser, S., Weippl, E.: SHPF: enhancing HTTP (S) session security with browser fingerprinting. In: 2013 International Conference on Availability, Reliability and Security, pp. 255–261. IEEE (2013) Unger, T., Mulazzani, M., Frühwirt, D., Huber, M., Schrittwieser, S., Weippl, E.: SHPF: enhancing HTTP (S) session security with browser fingerprinting. In: 2013 International Conference on Availability, Reliability and Security, pp. 255–261. IEEE (2013)
25.
Zurück zum Zitat Upathilake, R., Li, Y., Matrawy, A.: A classification of web browser fingerprinting techniques. In: 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5. IEEE (2015) Upathilake, R., Li, Y., Matrawy, A.: A classification of web browser fingerprinting techniques. In: 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5. IEEE (2015)
26.
Zurück zum Zitat Walls, A., Agrafiotis, I.: A Bayesian approach to insider threat detection. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(2), 48–84 (2021) Walls, A., Agrafiotis, I.: A Bayesian approach to insider threat detection. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(2), 48–84 (2021)
Metadaten
Titel
Fingerprint Defender: Defense Against Browser-Based User Tracking
verfasst von
Deepali Moad
Vikas Sihag
Gaurav Choudhary
Daniel Gerbi Duguma
Ilsun You
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_17

Premium Partner