Skip to main content

Fingerprint Defender: Defense Against Browser-Based User Tracking

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2021)

Abstract

It is difficult to be anonymous online with user activities always under the scanner. Multiple identifiers and their combinatories are used for user identification. While browsing, trackers keep a record of artifacts such as OS version, screen resolution, and fonts enabled. Browser fingerprinting tries to identify a user’s browser uniquely, without using cookies or other stateful signatures. We propose a browser fingerprint defender tool to anonymize user browsers. It creates captures current user attributes and anonymizes them before sending a request to the server. It also gives current browser fingerprint attributes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://panopticlick.eff.org/.

  2. 2.

    https://amiunique.org/.

  3. 3.

    https://uniquemachine.org/.

References

  1. Al-Fannah, N.M., Mitchell, C.: Too little too late: can we control browser fingerprinting? J. Intellect. Capit. (2020)

    Google Scholar 

  2. Bae, D., Ha, J.: Performance metric for differential deep learning analysis. J. Internet Serv. Inf. Secur. (JISIS) 11(2), 22–33 (2021)

    Google Scholar 

  3. Blakemore, C., Redol, J., Correia, M.: Fingerprinting for web applications: from devices to related groups. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 144–151. IEEE (2016)

    Google Scholar 

  4. Boda, K., Földes, Á.M., Gulyás, G.G., Imre, S.: User tracking on the web via cross-browser fingerprinting. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 31–46. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29615-4_4

    Chapter  Google Scholar 

  5. Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(1), 35–53 (2020)

    Google Scholar 

  6. Chen, R., Guo, J., Wang, D.-C., Tsai, J.J., Al-Hamadi, H., You, I.: Trust-based service management for mobile cloud IoT systems. IEEE Trans. Netw. Serv. Manage. 16(1), 246–263 (2018)

    Article  Google Scholar 

  7. Cimpanu, C.: Brave to generate random browser fingerprints to preserve user privacy, March 2020

    Google Scholar 

  8. Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1–18. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14527-8_1

    Chapter  Google Scholar 

  9. FaizKhademi, A., Zulkernine, M., Weldemariam, K.: FPGuard: detection and prevention of browser fingerprinting. In: Samarati, P. (ed.) DBSec 2015. LNCS, vol. 9149, pp. 293–308. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20810-7_21

    Chapter  Google Scholar 

  10. Gómez-Boix, A., Laperdrix, P., Baudry, B.: Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale. In: Proceedings of the 2018 World Wide Web Conference, pp. 309–318 (2018)

    Google Scholar 

  11. Greitzer, F.L., Purl, J., Sticha, P.J., Yu, M.C., Lee, J.: Use of expert judgments to inform Bayesian models of insider threat risk. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(2), 3–47 (2021)

    Google Scholar 

  12. Gulyás, G., Schulcz, R., Imre, S.: Comprehensive analysis of web privacy and anonymous web browsers: are next generation services based on collaborative filtering? In: Joint SPACE and TIME International Workshops. Citeseer (2008)

    Google Scholar 

  13. Iqbal, U., Englehardt, S., Shafiq, Z.: Fingerprinting the fingerprinters: learning to detect browser fingerprinting behaviors. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1143–1161. IEEE (2021)

    Google Scholar 

  14. Johnson, C., Khadka, B., Basnet, R.B., Doleck, T.: Towards detecting and classifying malicious URLs using deep learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 31–48 (2020)

    Google Scholar 

  15. Kaur, N., Azam, S., Kannoorpatti, K., Yeo, K.C., Shanmugam, B.: Browser fingerprinting as user tracking technology. In: 2017 11th International Conference on Intelligent Systems and Control (ISCO), pp. 103–111. IEEE (2017)

    Google Scholar 

  16. Laperdrix, P., Bielova, N., Baudry, B., Avoine, G.: Browser fingerprinting: a survey. ACM Trans. Web (TWEB) 14(2), 1–33 (2020)

    Article  Google Scholar 

  17. Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of android malware. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 1–28 (2020)

    Google Scholar 

  18. Sharma, V., You, I., Kul, G.: Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pp. 81–84 (2017)

    Google Scholar 

  19. Sharma, V., You, I., Yim, K., Chen, R., Cho, J.-H.: BRIoT: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7, 118556–118580 (2019)

    Article  Google Scholar 

  20. Shichkina, Y.A., Kataeva, G.V., Irishina, Y.A., Stanevich, E.S.: The use of mobile phones to monitor the status of patients with Parkinson’s disease. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), 55–73 (2020)

    Google Scholar 

  21. Sihag, V., Vardhan, M., Singh, P., Choudhary, G., Son, S.: De-LADY: deep learning based android malware detection using dynamic features. J. Internet Serv. Inf. Secur. (JISIS) 11(2), 34–45 (2021)

    Google Scholar 

  22. Talegaon, S., Krishnan, R.: Administrative models for role based access control in android. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 31–46 (2020)

    Google Scholar 

  23. Trickel, E., Starov, O., Kapravelos, A., Nikiforakis, N., Doupé, A.: Everyone is different: client-side diversification for defending against extension fingerprinting. In: 28th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 19), pp. 1679–1696 (2019)

    Google Scholar 

  24. Unger, T., Mulazzani, M., Frühwirt, D., Huber, M., Schrittwieser, S., Weippl, E.: SHPF: enhancing HTTP (S) session security with browser fingerprinting. In: 2013 International Conference on Availability, Reliability and Security, pp. 255–261. IEEE (2013)

    Google Scholar 

  25. Upathilake, R., Li, Y., Matrawy, A.: A classification of web browser fingerprinting techniques. In: 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5. IEEE (2015)

    Google Scholar 

  26. Walls, A., Agrafiotis, I.: A Bayesian approach to insider threat detection. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(2), 48–84 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Moad, D., Sihag, V., Choudhary, G., Duguma, D.G., You, I. (2022). Fingerprint Defender: Defense Against Browser-Based User Tracking. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-9576-6_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-9575-9

  • Online ISBN: 978-981-16-9576-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics