Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic

IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Journal of Artificial Intelligence and Soft Computing Research Pub Date : 2020-06-15 DOI:10.2478/jaiscr-2020-0016
Marcin Gabryel, K. Grzanek, Y. Hayashi
{"title":"Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic","authors":"Marcin Gabryel, K. Grzanek, Y. Hayashi","doi":"10.2478/jaiscr-2020-0016","DOIUrl":null,"url":null,"abstract":"Abstract Web-based browser fingerprint (or device fingerprint) is a tool used to identify and track user activity in web traffic. It is also used to identify computers that are abusing online advertising and also to prevent credit card fraud. A device fingerprint is created by extracting multiple parameter values from a browser API (e.g. operating system type or browser version). The acquired parameter values are then used to create a hash using the hash function. The disadvantage of using this method is too high susceptibility to small, normally occurring changes (e.g. when changing the browser version number or screen resolution). Minor changes in the input values generate a completely different fingerprint hash, making it impossible to find similar ones in the database. On the other hand, omitting these unstable values when creating a hash, significantly limits the ability of the fingerprint to distinguish between devices. This weak point is commonly exploited by fraudsters who knowingly evade this form of protection by deliberately changing the value of device parameters. The paper presents methods that significantly limit this type of activity. New algorithms for coding and comparing fingerprints are presented, in which the values of parameters with low stability and low entropy are especially taken into account. The fingerprint generation methods are based on popular Minhash, the LSH, and autoencoder methods. The effectiveness of coding and comparing each of the presented methods was also examined in comparison with the currently used hash generation method. Authentic data of the devices and browsers of users visiting 186 different websites were collected for the research.","PeriodicalId":48494,"journal":{"name":"Journal of Artificial Intelligence and Soft Computing Research","volume":"10 1","pages":"243 - 253"},"PeriodicalIF":3.3000,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Artificial Intelligence and Soft Computing Research","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.2478/jaiscr-2020-0016","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 13

Abstract

Abstract Web-based browser fingerprint (or device fingerprint) is a tool used to identify and track user activity in web traffic. It is also used to identify computers that are abusing online advertising and also to prevent credit card fraud. A device fingerprint is created by extracting multiple parameter values from a browser API (e.g. operating system type or browser version). The acquired parameter values are then used to create a hash using the hash function. The disadvantage of using this method is too high susceptibility to small, normally occurring changes (e.g. when changing the browser version number or screen resolution). Minor changes in the input values generate a completely different fingerprint hash, making it impossible to find similar ones in the database. On the other hand, omitting these unstable values when creating a hash, significantly limits the ability of the fingerprint to distinguish between devices. This weak point is commonly exploited by fraudsters who knowingly evade this form of protection by deliberately changing the value of device parameters. The paper presents methods that significantly limit this type of activity. New algorithms for coding and comparing fingerprints are presented, in which the values of parameters with low stability and low entropy are especially taken into account. The fingerprint generation methods are based on popular Minhash, the LSH, and autoencoder methods. The effectiveness of coding and comparing each of the presented methods was also examined in comparison with the currently used hash generation method. Authentic data of the devices and browsers of users visiting 186 different websites were collected for the research.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
浏览器指纹编码方法提高了Web流量中用户识别的有效性
摘要基于Web的浏览器指纹(或设备指纹)是一种用于识别和跟踪网络流量中用户活动的工具。它还用于识别滥用在线广告的计算机,并防止信用卡欺诈。通过从浏览器API提取多个参数值(例如,操作系统类型或浏览器版本)来创建设备指纹。然后,所获取的参数值用于使用哈希函数创建哈希。使用这种方法的缺点是对通常发生的小变化(例如,在更改浏览器版本号或屏幕分辨率时)的敏感性太高。输入值的微小更改会生成完全不同的指纹哈希,因此无法在数据库中找到类似的指纹哈希。另一方面,在创建哈希时忽略这些不稳定的值,极大地限制了指纹在设备之间进行区分的能力。欺诈者通常会利用这一弱点,故意改变设备参数的值来逃避这种形式的保护。本文提出了显著限制这类活动的方法。提出了一种新的指纹编码和比较算法,其中特别考虑了低稳定性和低熵的参数值。指纹生成方法基于流行的Minhash、LSH和自动编码器方法。与目前使用的哈希生成方法相比,还检查了编码和比较每种方法的有效性。本研究收集了访问186个不同网站的用户的设备和浏览器的真实数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Artificial Intelligence and Soft Computing Research
Journal of Artificial Intelligence and Soft Computing Research COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-
CiteScore
7.00
自引率
25.00%
发文量
10
审稿时长
24 weeks
期刊介绍: Journal of Artificial Intelligence and Soft Computing Research (available also at Sciendo (De Gruyter)) is a dynamically developing international journal focused on the latest scientific results and methods constituting traditional artificial intelligence methods and soft computing techniques. Our goal is to bring together scientists representing both approaches and various research communities.
期刊最新文献
Bending Path Understanding Based on Angle Projections in Field Environments Self-Organized Operational Neural Networks for The Detection of Atrial Fibrillation Interpreting Convolutional Layers in DNN Model Based on Time–Frequency Representation of Emotional Speech A Few-Shot Learning Approach for Covid-19 Diagnosis Using Quasi-Configured Topological Spaces Metrics for Assessing Generalization of Deep Reinforcement Learning in Parameterized Environments
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1