Abstract
It is difficult to be anonymous online with user activities always under the scanner. Multiple identifiers and their combinatories are used for user identification. While browsing, trackers keep a record of artifacts such as OS version, screen resolution, and fonts enabled. Browser fingerprinting tries to identify a user’s browser uniquely, without using cookies or other stateful signatures. We propose a browser fingerprint defender tool to anonymize user browsers. It creates captures current user attributes and anonymizes them before sending a request to the server. It also gives current browser fingerprint attributes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Fannah, N.M., Mitchell, C.: Too little too late: can we control browser fingerprinting? J. Intellect. Capit. (2020)
Bae, D., Ha, J.: Performance metric for differential deep learning analysis. J. Internet Serv. Inf. Secur. (JISIS) 11(2), 22–33 (2021)
Blakemore, C., Redol, J., Correia, M.: Fingerprinting for web applications: from devices to related groups. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 144–151. IEEE (2016)
Boda, K., Földes, Á.M., Gulyás, G.G., Imre, S.: User tracking on the web via cross-browser fingerprinting. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 31–46. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29615-4_4
Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(1), 35–53 (2020)
Chen, R., Guo, J., Wang, D.-C., Tsai, J.J., Al-Hamadi, H., You, I.: Trust-based service management for mobile cloud IoT systems. IEEE Trans. Netw. Serv. Manage. 16(1), 246–263 (2018)
Cimpanu, C.: Brave to generate random browser fingerprints to preserve user privacy, March 2020
Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1–18. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14527-8_1
FaizKhademi, A., Zulkernine, M., Weldemariam, K.: FPGuard: detection and prevention of browser fingerprinting. In: Samarati, P. (ed.) DBSec 2015. LNCS, vol. 9149, pp. 293–308. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20810-7_21
Gómez-Boix, A., Laperdrix, P., Baudry, B.: Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale. In: Proceedings of the 2018 World Wide Web Conference, pp. 309–318 (2018)
Greitzer, F.L., Purl, J., Sticha, P.J., Yu, M.C., Lee, J.: Use of expert judgments to inform Bayesian models of insider threat risk. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(2), 3–47 (2021)
Gulyás, G., Schulcz, R., Imre, S.: Comprehensive analysis of web privacy and anonymous web browsers: are next generation services based on collaborative filtering? In: Joint SPACE and TIME International Workshops. Citeseer (2008)
Iqbal, U., Englehardt, S., Shafiq, Z.: Fingerprinting the fingerprinters: learning to detect browser fingerprinting behaviors. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1143–1161. IEEE (2021)
Johnson, C., Khadka, B., Basnet, R.B., Doleck, T.: Towards detecting and classifying malicious URLs using deep learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 31–48 (2020)
Kaur, N., Azam, S., Kannoorpatti, K., Yeo, K.C., Shanmugam, B.: Browser fingerprinting as user tracking technology. In: 2017 11th International Conference on Intelligent Systems and Control (ISCO), pp. 103–111. IEEE (2017)
Laperdrix, P., Bielova, N., Baudry, B., Avoine, G.: Browser fingerprinting: a survey. ACM Trans. Web (TWEB) 14(2), 1–33 (2020)
Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of android malware. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 1–28 (2020)
Sharma, V., You, I., Kul, G.: Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pp. 81–84 (2017)
Sharma, V., You, I., Yim, K., Chen, R., Cho, J.-H.: BRIoT: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7, 118556–118580 (2019)
Shichkina, Y.A., Kataeva, G.V., Irishina, Y.A., Stanevich, E.S.: The use of mobile phones to monitor the status of patients with Parkinson’s disease. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), 55–73 (2020)
Sihag, V., Vardhan, M., Singh, P., Choudhary, G., Son, S.: De-LADY: deep learning based android malware detection using dynamic features. J. Internet Serv. Inf. Secur. (JISIS) 11(2), 34–45 (2021)
Talegaon, S., Krishnan, R.: Administrative models for role based access control in android. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 31–46 (2020)
Trickel, E., Starov, O., Kapravelos, A., Nikiforakis, N., Doupé, A.: Everyone is different: client-side diversification for defending against extension fingerprinting. In: 28th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 19), pp. 1679–1696 (2019)
Unger, T., Mulazzani, M., Frühwirt, D., Huber, M., Schrittwieser, S., Weippl, E.: SHPF: enhancing HTTP (S) session security with browser fingerprinting. In: 2013 International Conference on Availability, Reliability and Security, pp. 255–261. IEEE (2013)
Upathilake, R., Li, Y., Matrawy, A.: A classification of web browser fingerprinting techniques. In: 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5. IEEE (2015)
Walls, A., Agrafiotis, I.: A Bayesian approach to insider threat detection. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(2), 48–84 (2021)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Moad, D., Sihag, V., Choudhary, G., Duguma, D.G., You, I. (2022). Fingerprint Defender: Defense Against Browser-Based User Tracking. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_17
Download citation
DOI: https://doi.org/10.1007/978-981-16-9576-6_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-9575-9
Online ISBN: 978-981-16-9576-6
eBook Packages: Computer ScienceComputer Science (R0)