Skip to main content
Erschienen in: Annals of Telecommunications 1-2/2014

01.02.2014

On the uniqueness of Web browsing history patterns

verfasst von: Lukasz Olejnik, Claude Castelluccia, Artur Janc

Erschienen in: Annals of Telecommunications | Ausgabe 1-2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We present the results of the first large-scale study of the uniqueness of Web browsing histories, gathered from a total of 368,284 Internet users who visited a history detection demonstration website. Our results show that for a majority of users (69 %), the browsing history is unique and that users for whom we could detect at least four visited websites were uniquely identified by their histories in 97 % of cases. We observe a significant rate of stability in browser history fingerprints: for repeat visitors, 38 % of fingerprints are identical over time, and differing ones were correlated with original history contents, indicating static browsing preferences (for history subvectors of size 50). We report a striking result that it is enough to test for a small number of pages in order to both enumerate users’ interests and perform an efficient and unique behavioral fingerprint; we show that testing 50 Web pages is enough to fingerprint 42 % of users in our database, increasing to 70 % with 500 Web pages.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
A preliminary version of this paper was presented at HotPETS 2012. However, HotPETS does not have proceedings and this work was not published yet. Among the main differences are the inclusion of Fig. 10 and related discussion in Section 5.1.2.
 
Literatur
3.
Zurück zum Zitat Bortz A, Boneh D (2007) Exposing private information by timing web applications. In: Proceedings of the 16th international conference on World Wide Web. WWW ’07, pp 621–628. ACM, New York Bortz A, Boneh D (2007) Exposing private information by timing web applications. In: Proceedings of the 16th international conference on World Wide Web. WWW ’07, pp 621–628. ACM, New York
5.
Zurück zum Zitat Eckersley P (2010) How unique is your web browser? In: 10th international symposium on privacy enhancing technologies, pp 1–18 Eckersley P (2010) How unique is your web browser? In: 10th international symposium on privacy enhancing technologies, pp 1–18
6.
Zurück zum Zitat Felten EW, Schneider MA (2000) Timing attacks on web privacy. In: CCS ’00: proceedings of the 7th ACM conference on computer and communications security, pp 25–32. ACM, New York Felten EW, Schneider MA (2000) Timing attacks on web privacy. In: CCS ’00: proceedings of the 7th ACM conference on computer and communications security, pp 25–32. ACM, New York
7.
Zurück zum Zitat Jackson C, Bortz A, Boneh D, Mitchell JC (2006) Protecting browser state from web privacy attacks. In: Proceedings of the 15th international conference on World Wide Web. WWW ’06, pp 737–744. ACM, New York Jackson C, Bortz A, Boneh D, Mitchell JC (2006) Protecting browser state from web privacy attacks. In: Proceedings of the 15th international conference on World Wide Web. WWW ’06, pp 737–744. ACM, New York
9.
Zurück zum Zitat Janc A, Olejnik L (2010) Web browser history detection as a real-world privacy threat. In: ESORICS, pp 215–231 Janc A, Olejnik L (2010) Web browser history detection as a real-world privacy threat. In: ESORICS, pp 215–231
10.
Zurück zum Zitat Jang D, Jhala R, Lerner S, Shacham H (2010) An empirical study of privacy-violating information flows in JavaScript Web applications. In: Keromytis A, Shmatikov V (eds) Proceedings of CCS 2010. ACM, New York, pp 270–83 Jang D, Jhala R, Lerner S, Shacham H (2010) An empirical study of privacy-violating information flows in JavaScript Web applications. In: Keromytis A, Shmatikov V (eds) Proceedings of CCS 2010. ACM, New York, pp 270–83
11.
Zurück zum Zitat Krishnamurthy B, Wills C (2009) Privacy diffusion on the web: a longitudinal perspective. In: Proceedings of the 18th international conference on World Wide Web. WWW ’09, pp 541–550. ACM, New York Krishnamurthy B, Wills C (2009) Privacy diffusion on the web: a longitudinal perspective. In: Proceedings of the 18th international conference on World Wide Web. WWW ’09, pp 541–550. ACM, New York
12.
Zurück zum Zitat Krishnan S, Monrose F (2010) DNS prefetching and its privacy implications: when good things go bad. In: Proceedings of the 3rd USENIX conference on large-scale exploits and emergent threats: botnets, spyware, worms, and more. LEET’10, pp 10–10. USENIX Association, Berkeley Krishnan S, Monrose F (2010) DNS prefetching and its privacy implications: when good things go bad. In: Proceedings of the 3rd USENIX conference on large-scale exploits and emergent threats: botnets, spyware, worms, and more. LEET’10, pp 10–10. USENIX Association, Berkeley
13.
14.
Zurück zum Zitat Moskovitch R, Feher C, Messerman A, Kirschnick N, Mustafic T, Camtepe A, Löhlein B, Heister U, Möller S, Rokach L, Elovici Y (2009) Identity theft, computers and behavioral biometrics. In: Proceedings of the 2009 IEEE international conference on intelligence and security informatics. ISI’09, pp 155–160. IEEE, Piscataway Moskovitch R, Feher C, Messerman A, Kirschnick N, Mustafic T, Camtepe A, Löhlein B, Heister U, Möller S, Rokach L, Elovici Y (2009) Identity theft, computers and behavioral biometrics. In: Proceedings of the 2009 IEEE international conference on intelligence and security informatics. ISI’09, pp 155–160. IEEE, Piscataway
15.
Zurück zum Zitat Mowery K, Bogenreif D, Yilek S, Shacham H (2011) Fingerprinting information in JavaScript implementations. In: Proceedings of W2SP 2011. IEEE Computer Society Mowery K, Bogenreif D, Yilek S, Shacham H (2011) Fingerprinting information in JavaScript implementations. In: Proceedings of W2SP 2011. IEEE Computer Society
16.
Zurück zum Zitat Olejnik L, Castelluccia C (2013) Towards web-based biometric systems using personal browsing interests. In: 8th international conference on availability, reliability and security. Regensburg, Germany Olejnik L, Castelluccia C (2013) Towards web-based biometric systems using personal browsing interests. In: 8th international conference on availability, reliability and security. Regensburg, Germany
20.
Zurück zum Zitat Weinberg Z, Chen EY, Jayaraman PR, Jackson C (2011) I still know what you visited last summer: leaking browsing history via user interaction and side channel attacks. In: Proceedings of the 2011 IEEE symposium on security and privacy. SP ’11, pp 147–161. IEEE Computer Society, Washington Weinberg Z, Chen EY, Jayaraman PR, Jackson C (2011) I still know what you visited last summer: leaking browsing history via user interaction and side channel attacks. In: Proceedings of the 2011 IEEE symposium on security and privacy. SP ’11, pp 147–161. IEEE Computer Society, Washington
21.
Zurück zum Zitat Wills CE, Mikhailov M, Shang H (2003) Inferring relative popularity of internet applications by actively querying DNS caches. In: Proceedings of the 3rd ACM SIGCOMM conference on internet measurement. IMC ’03, pp 78–90. ACM, New York Wills CE, Mikhailov M, Shang H (2003) Inferring relative popularity of internet applications by actively querying DNS caches. In: Proceedings of the 3rd ACM SIGCOMM conference on internet measurement. IMC ’03, pp 78–90. ACM, New York
22.
Zurück zum Zitat Wondracek G, Holz T, Kirda E, Kruegel C (2010) A practical attack to de-anonymize social network users. In: IEEE security and privacy. Oakland Wondracek G, Holz T, Kirda E, Kruegel C (2010) A practical attack to de-anonymize social network users. In: IEEE security and privacy. Oakland
23.
Zurück zum Zitat Yampolskiy RV, Govindaraju V (2008) Behavioural biometrics: a survey and classification. Int J Biometrics 1:81–113CrossRef Yampolskiy RV, Govindaraju V (2008) Behavioural biometrics: a survey and classification. Int J Biometrics 1:81–113CrossRef
24.
Zurück zum Zitat Yen T-F, Huang X, Monrose F, Reiter MK (2009) Browser fingerprinting from coarse traffic summaries: techniques and implications. In: Proceedings of the 6th international conference on detection of intrusions and malware, and vulnerability assessment. DIMVA ’09, pp 157–175. Springer, Berlin Yen T-F, Huang X, Monrose F, Reiter MK (2009) Browser fingerprinting from coarse traffic summaries: techniques and implications. In: Proceedings of the 6th international conference on detection of intrusions and malware, and vulnerability assessment. DIMVA ’09, pp 157–175. Springer, Berlin
25.
Zurück zum Zitat Yen T-F, Xie Y, Yu F, Yu RP, Abadi M (2012) Host fingerprinting and tracking on the web: privacy and security implications. In: 19th annual network and distributed system security symposium (NDSS) 2012, Internet Society Yen T-F, Xie Y, Yu F, Yu RP, Abadi M (2012) Host fingerprinting and tracking on the web: privacy and security implications. In: 19th annual network and distributed system security symposium (NDSS) 2012, Internet Society
Metadaten
Titel
On the uniqueness of Web browsing history patterns
verfasst von
Lukasz Olejnik
Claude Castelluccia
Artur Janc
Publikationsdatum
01.02.2014
Verlag
Springer Paris
Erschienen in
Annals of Telecommunications / Ausgabe 1-2/2014
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-013-0392-5

Weitere Artikel der Ausgabe 1-2/2014

Annals of Telecommunications 1-2/2014 Zur Ausgabe

Premium Partner