Analyzing characteristic host access patterns for re-identification of web user sessions

  • Authors:
  • Dominik Herrmann;Christoph Gerber;Christian Banse;Hannes Federrath

  • Affiliations:
  • Research Group Security in Distributed Systems, Department of Informatics, University of Hamburg, Hamburg, Germany;Research Group Security in Distributed Systems, Department of Informatics, University of Hamburg, Hamburg, Germany;Research Group Security in Distributed Systems, Department of Informatics, University of Hamburg, Hamburg, Germany;Research Group Security in Distributed Systems, Department of Informatics, University of Hamburg, Hamburg, Germany

  • Venue:
  • NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

An attacker, who is able to observe a web user over a long period of time, learns a lot about his interests. It may be difficult to track users with regularly changing IP addresses, though. We show how patterns mined from web traffic can be used to re-identify a majority of users, i. e. link multiple sessions of them. We implement the web user re-identification attack using a Multinomial Naïve Bayes classifier and evaluate it using a real-world dataset from 28 users. Our evaluation setup complies with the limited knowledge of an attacker on a malicious web proxy server, who is only able to observe the host names visited by its users. The results suggest that consecutive sessions can be linked with high probability for session durations from 5 minutes to 48 hours and that user profiles degrade only slowly over time. We also propose basic countermeasures and evaluate their efficacy.