Skip to main content

Smart Device Fingerprinting Based on Webpage Loading

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10874))

Abstract

Detecting devices connected to a network has become of serious importance for the network. Different devices differ in CPU scheduler, screen resolution and clock frequency, resulting in different performances when loading the same webpage. In this paper, we present a content-agnostic device identification method, a technique which decomposes webpage loading time and loads as the features to identify physical devices. This proposed method can deal with various types of devices such as mobiles, laptops, and other smart devices. We conduct experiments to evaluate the performance of the proposed method with real-world traffic. The experiment results demonstrate that the proposed method can accurately identify the types of devices from encrypted traffic and the recognition rate can reach \(98.4\%\). To demonstrate the scalability of the method, we heuristically applied it to website identification and found that it has better effects than existing methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Al-Shehari, T., Shahzad, F.: Improving operating system fingerprinting using machine learning techniques. Int. J. Comput. Theory Eng. 6(1), 57 (2014)

    Article  Google Scholar 

  2. Beverly, R.: A robust classifier for passive TCP/IP fingerprinting. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 158–167. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24668-8_16

    Chapter  Google Scholar 

  3. Bruce, S.: Applied Cryptography, 2nd edn. Wiley, Hoboken (1996)

    MATH  Google Scholar 

  4. Chen, Y.C., Liao, Y., Baldi, M., Lee, S.J., Qiu, L.: OS fingerprinting and tethering detection in mobile networks. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 173–180. ACM (2014)

    Google Scholar 

  5. Gayle, D.: This is a secure line: the groundbreaking encryption app that will scrample your calls and messages (2013)

    Google Scholar 

  6. Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 31–42. ACM (2009)

    Google Scholar 

  7. Hjelmvik, E.: Passive network security analysis with networkminer. In: (IN)Secure, no. 18, pp. 1–100 (2008)

    Google Scholar 

  8. JetStream: Sunspider 1.0.2 javascript benchmark. https://webkit.org/perf/sunspider/sunspider.html Accessed 8 May 2017

  9. Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)

    Article  Google Scholar 

  10. Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 255–263. ACM (2006)

    Google Scholar 

  11. Lippmann, R., Fried, D., Piwowarski, K., Streilein, W.: Passive operating system identification from TCP/IP packet headers. In: Workshop on Data Mining for Computer Security, p. 40. Citeseer (2003)

    Google Scholar 

  12. Matoušek, P., Ryšavỳ, O., Grégr, M., Vymlátil, M.: Towards identification of operating systems from the internet traffic: IPFIX monitoring with fingerprinting and clustering. In: 2014 5th International Conference on Data Communication Networking (DCNET), pp. 1–7. IEEE (2014)

    Google Scholar 

  13. Matsunaka, T., Yamada, A., Kubota, A.: Passive OS fingerprinting by DNS traffic analysis. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp. 243–250. IEEE (2013)

    Google Scholar 

  14. Medeiros, J.P.S., Brito, A.M., Pires, P.S.M.: A data mining based analysis of Nmap operating system fingerprint database. In: Herrero, Á., Gastaldo, P., Zunino, R., Corchado, E. (eds.) CISIS 2009. AINSC, vol. 63, pp. 1–8. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04091-7_1

    Chapter  Google Scholar 

  15. Miłós, G., Murray, D.G., Hand, S., Fetterman, M.A.: Satori: enlightened page sharing. In: Proceedings of the 2009 Conference on USENIX Annual Technical Conference, p. 1 (2009)

    Google Scholar 

  16. Ornaghi, A., Valleri, M.: Ettercap. https://www.ettercap-project.org/. Accessed 28 Apr 2017

  17. Radhakrishnan, S.V., Uluagac, A.S., Beyah, R.: GTID: a technique for physical device and device type fingerprinting. IEEE Trans. Dependable Secur. Comput. 12(5), 519–532 (2015)

    Article  Google Scholar 

  18. Sarraute, C., Burroni, J.: Using neural networks to improve classical operating system fingerprinting techniques. arXiv preprint arXiv:1006.1918 (2010)

  19. Schwartzenberg, J.: Using machine learning techniques for advanced passive operating system fingerprinting. Master’s thesis, University of Twente (2010)

    Google Scholar 

  20. Spitzner, L.: Know your enemy: passive fingerprinting. In: World Wide Web, March 2002

    Google Scholar 

  21. Zalewski, M.: p0f: passive OS fingerprinting tool. http://lcamtuf.coredump.cx/p0f.shtml. Accessed 6 May 2017

Download references

Acknowledgments

This paper is supported in part by NSFC under Grant 61472383, Grant U1709217, Grant 61728207, and Grant 61472385, and in part by the Natural Science Foundation of Jiangsu Province in China under Grant BK20161257.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liusheng Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fang, P., Huang, L., Xu, H., He, Q. (2018). Smart Device Fingerprinting Based on Webpage Loading. In: Chellappan, S., Cheng, W., Li, W. (eds) Wireless Algorithms, Systems, and Applications. WASA 2018. Lecture Notes in Computer Science(), vol 10874. Springer, Cham. https://doi.org/10.1007/978-3-319-94268-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94268-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94267-4

  • Online ISBN: 978-3-319-94268-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics