Website fingerprinting as a cybercrime investigation model: Role and challenges

Taher Ahmed Ghaleb
{"title":"Website fingerprinting as a cybercrime investigation model: Role and challenges","authors":"Taher Ahmed Ghaleb","doi":"10.1109/ANTI-CYBERCRIME.2015.7351934","DOIUrl":null,"url":null,"abstract":"The mass-production of online websites is one of the most confrontations of detecting cybercriminal activities. Monitoring the construction or visitation of such websites is somewhat unsophisticated process if it relies on filtering the URL addresses alone, like Proxy. However, user online interactions can be concealed if passed through security protocols or anonymity networks, like Tor. Nowadays, Tor has been widely used to conceal website addresses, web page contents, user actions, and user anonymity. On the other hand, website traffic analysis and fingerprinting techniques endeavor to break such privacy by revealing user actions and anonymity. Basically, this is considered as a negative behavior. However, in this paper, we study how fingerprinting techniques can positively be adapted by Internet Service Providers to be used against Cybercrime activities. In other words, fingerprinting techniques can play a vital role for investigating and mitigating cybercrimes. We present several fingerprinting techniques and countermeasures from a cybercrime point of view. Then, we (1) illustrate how fingerprinting techniques can be applied as cybercrime investigation models, and (2) discuss the expected challenges of such application.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 First International Conference on Anti-Cybercrime (ICACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351934","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

The mass-production of online websites is one of the most confrontations of detecting cybercriminal activities. Monitoring the construction or visitation of such websites is somewhat unsophisticated process if it relies on filtering the URL addresses alone, like Proxy. However, user online interactions can be concealed if passed through security protocols or anonymity networks, like Tor. Nowadays, Tor has been widely used to conceal website addresses, web page contents, user actions, and user anonymity. On the other hand, website traffic analysis and fingerprinting techniques endeavor to break such privacy by revealing user actions and anonymity. Basically, this is considered as a negative behavior. However, in this paper, we study how fingerprinting techniques can positively be adapted by Internet Service Providers to be used against Cybercrime activities. In other words, fingerprinting techniques can play a vital role for investigating and mitigating cybercrimes. We present several fingerprinting techniques and countermeasures from a cybercrime point of view. Then, we (1) illustrate how fingerprinting techniques can be applied as cybercrime investigation models, and (2) discuss the expected challenges of such application.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网站指纹作为网络犯罪侦查模式:作用与挑战
网络网站的大量生产是侦查网络犯罪活动的最大难题之一。监控这些网站的建设或访问是一个简单的过程,如果它只依赖于过滤URL地址,就像代理一样。然而,如果通过安全协议或匿名网络(如Tor),用户在线交互可以被隐藏。如今,Tor已被广泛用于隐藏网站地址、网页内容、用户操作和用户匿名。另一方面,网站流量分析和指纹技术试图通过揭示用户行为和匿名性来打破这种隐私。基本上,这被认为是一种消极行为。然而,在本文中,我们研究了指纹识别技术如何被互联网服务提供商积极地应用于对抗网络犯罪活动。换句话说,指纹识别技术可以在调查和减轻网络犯罪方面发挥至关重要的作用。我们从网络犯罪的角度提出了几种指纹识别技术和对策。然后,我们(1)说明指纹技术如何应用于网络犯罪调查模型,(2)讨论这种应用的预期挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A new Chinese wall security policy model based on the subject's wall and object's wall Application of new alteration attack on biometric authentication systems Securing cognitive radio enabled smart grid systems against cyber attacks Website fingerprinting as a cybercrime investigation model: Role and challenges Toward an multidisciplinary curriculum in cyberscience
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1