Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility

@inproceedings{Banse2012TrackingUO,
  title={Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility},
  author={Christian Banse and Dominik Herrmann and Hannes Federrath},
  booktitle={SEC},
  year={2012}
}
Traditionally, service providers, who want to track the activities of Internet users, rely on explicit tracking techniques like HTTP cookies. From a privacy perspective behavior-based tracking is even more dangerous, because it allows service providers to track users passively, i. e., without cookies. In this case multiple sessions of a user are linked by exploiting characteristic patterns mined from network traffic. In this paper we study the feasibility of behavior-based tracking in a real… CONTINUE READING
Highly Cited
This paper has 33 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 16 extracted citations

A Novel Behavior-Based Tracking Attack for User Identification

2015 Third International Conference on Advanced Cloud and Big Data • 2015
View 7 Excerpts
Highly Influenced

Activity Pattern Discovery from Network Captures

2016 IEEE Security and Privacy Workshops (SPW) • 2016
View 9 Excerpts
Highly Influenced

A novel attack to track users based on the behavior patterns

Concurrency and Computation: Practice and Experience • 2017
View 2 Excerpts

Privacy Implications of DNSSEC Look-Aside Validation

2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) • 2017
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 31 references

Web user behavioral profiling for user identification

Decision Support Systems • 2010
View 5 Excerpts
Highly Influenced

The WEKA data mining software: an update

SIGKDD Explorations • 2009
View 4 Excerpts
Highly Influenced

Towards Plugging Privacy Leaks in the Domain Name System

2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P) • 2010
View 1 Excerpt

Similar Papers

Loading similar papers…