User Identification and Tracking with online device fingerprints fusion

K. Takeda
{"title":"User Identification and Tracking with online device fingerprints fusion","authors":"K. Takeda","doi":"10.1109/CCST.2012.6393552","DOIUrl":null,"url":null,"abstract":"Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2012.6393552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16

Abstract

Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.
基于在线设备指纹融合的用户识别与跟踪
在线数字身份的识别和跟踪一直是网络安全工作中的一个重要问题。本研究的目的是展示如何利用可疑用户携带的数字设备发出的信息。本文提出了一种识别连接到Internet或本地网络的数字设备所有者的技术。技术包括跟踪网络接口的物理id、分析设备的网络流量模式、蓝牙设备信号、web浏览器指纹和电子邮件消息的标头信息。每个连接到计算机网络的设备都有自己的指纹,如物理MAC地址、操作系统产生的网络流量及其安装的应用程序,从而可以应用这些信息来识别和跟踪唯一的数字设备。如果设备是个人物品,如智能手机或个人电脑,由一个特定的人拥有,这些信息可以用来检测和跟踪人的位置。这些设备上安装的每个浏览器都有其独特的特征,如版本、安装的字体和设置的差异,这些信息可以用来识别一个人。电子邮件的邮件头中含有重要的信息,通过对邮件头的分析,可以提取出邮件发送者的一定数量的信息。这也用于检测消息发送方的模拟。通过整合这些通过此类监测活动和相关网络传感器获得的信息,我们能够识别目标人员的存在和物理位置,监控他们的行为,我们也能够将这些数据用作法律诉讼的证据。隐私保护是此类应用程序要考虑的问题,这将讨论如何在某些类型的网络中平衡用户隐私和用户的可追溯性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信