Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study

被引:0
作者
Haga, Yumehisa [1 ]
Takata, Yuta [2 ]
Akiyama, Mitsuaki [2 ]
Mori, Tatsuya [1 ]
机构
[1] Waseda Univ, Dept Commun Engn, Tokyo 1698555, Japan
[2] NTT Secure Platform Labs, Musashino, Tokyo 1808585, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2017年 / E100D卷 / 08期
关键词
web tracking; web browser fingerprint;
D O I
10.1587/transinf.2016ICP0020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web tracking is widely used as a means to track user's behavior on websites. While web tracking provides new opportunities of e-commerce, it also includes certain risks such as privacy infringement. Therefore, analyzing such risks in the wild Internet is meaningful to make the user's privacy transparent. This work aims to understand how the web tracking has been adopted to prominent websites. We also aim to understand their resilience to the ad-blocking techniques. Web tracking-enabled websites collect the information called the web browser fingerprints, which can be used to identify users. We develop a scalable system that can detect fingerprinting by using both dynamic and static analyses. If a tracking site makes use of many and strong fingerprints, the site is likely resilient to the ad-blocking techniques. We also analyze the connectivity of the third-party tracking sites, which are linked from multiple websites. The link analysis allows us to extract the group of associated tracking sites and understand how influential these sites are. Based on the analyses of 100,000 websites, we quantify the potential risks of the web tracking-enabled websites. We reveal that there are 226 websites that adopt fingerprints that cannot be detected with the most of off-the-shelf anti-tracking tools. We also reveal that a major, resilient third-party tracking site is linked to 50.0 % of the top-100,000 popular websites.
引用
收藏
页码:1663 / 1670
页数:8
相关论文
共 17 条
  • [1] The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
    Acar, Gunes
    Eubank, Christian
    Englehardt, Steven
    Juarez, Marc
    Narayanan, Arvind
    Diaz, Claudia
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 674 - 689
  • [2] [Anonymous], NORD C SEC IT SYST
  • [3] [Anonymous], 2004, P 13 C USENIX SEC S, DOI [DOI 10.5555/1251375.1251396, DOI 10.1186/1476-0711-3-21]
  • [4] [Anonymous], P WEB 2 0 WORKSH SEC
  • [5] [Anonymous], 2013, P 2013 ACM SIGSAC C, DOI DOI 10.1145/2508859.2516674
  • [6] [Anonymous], 2011, USENIX C NETWORKED S
  • [7] How Unique Is Your Web Browser?
    Eckersley, Peter
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2010, 6205 : 1 - 18
  • [8] Iso Y., 2014, P COMP SEC S CSS 201, P377
  • [9] Kravets D, FACEBOOKS 9 5 MILLIO
  • [10] Mowery Keaton, 2011, P W2SP, V2