Tracker Detector: A system to detect third-party trackers through machine learning

被引:12
|
作者
Wu, Qianru [1 ]
Liu, Qixu [1 ]
Zhang, Yuqing [1 ]
Wen, Guanxing [1 ]
机构
[1] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Web privacy; Third-party tracking; Classifier; Blacklist; BFTree;
D O I
10.1016/j.comnet.2015.08.012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy violation caused by third-party tracking has become a serious problem, and the most effective defense against it is blocking. However, as the core part of blocking, the blacklist is usually manually curated and is difficult to maintain. To make it easier to generate a blacklist and reduce human work, we propose an effective system with high accuracy, named Tracker-Detector, to detect third-party trackers automatically. Intuitively, the behaviors of trackers and non-trackers are different, which leads to different JavaScript API sets being called. Thus, an incremental classifier is trained from JavaScript files crawled from a large number of websites to detect whether a website is a third-party tracker. High accuracy of 97.34% is obtained with our dataset and that of 93,56% is obtained within a 10-fold cross validation. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:164 / 173
页数:10
相关论文
共 50 条
  • [1] A Machine Learning Approach for Detecting Third-Party Trackers on the Web
    Wu, Qianru
    Liu, Qixu
    Zhang, Yuqing
    Liu, Peng
    Wen, Guanxing
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 238 - 258
  • [2] On Analyzing Third-party Tracking via Machine Learning
    Guarino, Alfonso
    Malandrino, Delfina
    Zaccagnino, Rocco
    Cozza, Federico
    Rapuano, Antonio
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 532 - 539
  • [3] Detecting Third-Party User Trackers with Cookie Files
    Dudykevych, Valery
    Nechypor, Vitalii
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 78 - 80
  • [4] Measuring Personal Privacy Breaches Using Third-Party Trackers
    Shuford, Erica
    Kavanaugh, Tara
    Ralph, Brian
    Ceesay, Ebrima
    Watters, Paul A.
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1615 - 1618
  • [5] TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers
    Li, Tai-Ching
    Hang, Huy
    Faloutsos, Michalis
    Efstathopoulos, Petros
    PASSIVE AND ACTIVE MEASUREMENT (PAM 2015), 2015, 8995 : 277 - 289
  • [6] The State of Documentation Practices of Third-Party Machine Learning Models and Datasets
    Oreamuno, Ernesto Lang
    Khan, Rohan Faiyaz
    Bangash, Abdul Ali
    Stinson, Catherine
    Adams, Bram
    IEEE SOFTWARE, 2024, 41 (05) : 52 - 59
  • [7] Adversarial Machine Learning: On the Resilience of Third-party Library Recommender Systems
    Nguyen, Phuong T.
    Di Ruscio, Davide
    Di Rocco, Juri
    Di Sipio, Claudio
    Di Penta, Massimiliano
    PROCEEDINGS OF EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING (EASE 2021), 2021, : 247 - 253
  • [8] Measuring Third-party Tracker Power across Web and Mobile
    Binns, Reuben
    Zhao, Jun
    van Kleek, Max
    Shadbolt, Nigel
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2018, 18 (04)
  • [9] Analysis of third-party request structures to detect fraudulent websites
    Gopal, Ram D.
    Hojati, Afrouz
    Patterson, Raymond A.
    DECISION SUPPORT SYSTEMS, 2022, 154
  • [10] Real-time monitoring to detect third-party damage
    Leis, BN
    Francini, RB
    Stulen, FB
    Hyatt, RW
    Norman, R
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL OFFSHORE AND POLAR ENGINEERING, VOL 2, 1998, : 34 - 38