Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications

  • Authors:
  • Ting-Fang Yen;Xin Huang;Fabian Monrose;Michael K. Reiter

  • Affiliations:
  • Carnegie Mellon University, Pittsburgh;University of North Carolina, Chapel Hill;University of North Carolina, Chapel Hill;University of North Carolina, Chapel Hill

  • Venue:
  • DIMVA '09 Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses and ports, packet and byte counts, and the start and end times of each connection. We additionally provide two applications of browser identification. First, we show how to extend a network intrusion detection system to detect a broader range of malware. Second, we demonstrate the consequences of web browser identification to the deanonymization of web sites in flow records that have been anonymized.