Big Data fingerprinting information analytics for sustainability
@article{Kobusiska2018BigDF, title={Big Data fingerprinting information analytics for sustainability}, author={Anna Kobusińska and Kamil Pawluczuk and Jerzy Brzeziński}, journal={Future Gener. Comput. Syst.}, year={2018}, volume={86}, pages={1321-1337} }
Figures and Tables from this paper
9 Citations
Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic
- Computer ScienceJ. Artif. Intell. Soft Comput. Res.
- 2020
New algorithms for coding and comparing fingerprints are presented, in which the values of parameters with low stability and low entropy are especially taken into account.
Tracking Browser Fingerprint using Rule Based Algorithm
- Computer Science2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA)
- 2020
This work explores the diversity and stability of browser fingerprint by modifying the rule-based algorithm and employing twenty (20) attributes to identify promising high value information to track how device information evolve and consistent in a period of time.
Actions speak louder than words: Semi-supervised learning for browser fingerprinting detection
- Computer ScienceArXiv
- 2020
Over one hundred device-class fingerprinting scripts present on hundreds of domains are identified, the first time device- class fingerprinting has been measured in the wild, and the power of a sparse vector representation and semi-supervised learning to complement and extend existing tracking detection techniques.
Web Privacy Measurement in Real-Time Bidding Systems. A Graph-Based Approach to RTB System Classification
- Computer Science
- 2019
It transpires that the interconnection between partners in an RTB network is caused by the data flows of the companies themselves due to their specializations in ad technology, and a Graph-Based Methodological Approach (GBMA) controls the situation of differences in consent implementations in European countries.
The Gaze and Mouse Signal as additional Source for User Fingerprints in Browser Applications
- Computer ScienceArXiv
- 2021
In this work, different data sources for browser fingerprints are inspected and the influence of all possible combinations of the three information sources for user recognition are shown and described in detail.
Application of a Neural Network to Generate the Hash Code for a Device Fingerprint
- Computer ScienceICAISC
- 2021
Methods of Searching for Similar Device Fingerprints Using Changes in Unstable Parameters
- Environmental ScienceICAISC
- 2020
References
SHOWING 1-10 OF 46 REFERENCES
Device Fingerprinting: Analysis of Chosen Fingerprinting Methods
- Computer ScienceIoTBDS
- 2017
In this paper, features and corresponding optimal implementations that may enrich and improve an open-source fingerprinting library Fingerprintjs2 that is daily consumed by hundreds of websites are discovered.
JavaScript-based device fingerprinting mitigation using personal HTTP proxy
- Computer Science2015 International Conference on Information Technology Systems and Innovation (ICITSI)
- 2015
A mechanism to mitigate the existence of device fingerprinting process by utilizing personal HTTP proxy, which utilizes a two-stage filtering process; header-based filtering and content- based filtering.
FPDetective: dusting the web for fingerprinters
- Computer ScienceCCS
- 2013
The design, implementation and deployment of FPDetective, a framework for the detection and analysis of web-based fingerprinters, are reported on, showing that there needs to be a change in the way users, companies and legislators engage with fingerprinting.
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
- Computer Science2013 IEEE Symposium on Security and Privacy
- 2013
By analyzing the code of three popular browser-fingerprinting code providers, it is revealed the techniques that allow websites to track users without the need of client-side identifiers and how fragile the browser ecosystem is against fingerprinting through the use of novel browser-identifying techniques.
Device fingerprinting for augmenting web authentication: classification and analysis of methods
- Computer ScienceACSAC
- 2016
This work summarizes and classify 29 available methods and their properties; defines attack models relevant to augmenting passwords for user authentication; and qualitatively compare them based on stability, repeatability, resource use, client passiveness, difficulty of spoofing, and distinguishability offered.
Device Fingerprinting in Wireless Networks: Challenges and Opportunities
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2016
This paper aims to provide a detailed treatment on developing novel wireless security solutions using device fingerprinting techniques, and to introduce a comprehensive taxonomy of wireless features that can be used in fingerprinting.
Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection
- Computer ScienceWPES@CCS
- 2016
This work demonstrates the first anti-fingerprinting strategy, which protects against Flash fingerprinting without deactivating it, provides robust and undetectable anti-canvas fingerprinting, and uses a large set of real word data to hide the actual system and browser properties without losing usability.
Poster : Detection and Prevention of Web-based Device Fingerprinting
- Computer Science
- 2014
This study presents FPBlock, a system that detects web-based device fingerprinting and prevents users from being fingerprinted, and takes a different approach from those of existing countermeasures, which randomize the value of properties or rely on a blacklist and the DNT header.
PriVaricator: Deceiving Fingerprinters with Little White Lies
- Computer ScienceWWW
- 2015
In PriVaricator the power of randomization is used to "break" linkability by exploring a space of parameterized randomization policies, and renders all the fingerprinters tested ineffective, while causing minimal damage on a set of 1000 Alexa sites on which they were tested.
User Tracking on the Web via Cross-Browser Fingerprinting
- Computer ScienceNordSec
- 2011
It is shown that a part of the IP address, the availability of a specific font set, the time zone, and the screen resolution are enough to uniquely identify most users of the five most popular web browsers, and that user agent strings are fairly effective but fragile identifiers of a browser instance.