
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGYRESEARCH VOLUME 9, ISSUE 03, MARCH 2020 ISSN 2277-8616
3638
IJSTR©2020
www.ijstr.org
This result of attributes changes having 3% entropy difference
from day 1 to day 74.
The result shown in Fig. 3 are based on the selected 5
users having different devices configurations. All users are
required to login using their account to demonstrate how
accurate the identification online. This result provides 100%
device identification even if the users are trying to login
from other devices.
4 CONCLUSIONS
Device fingerprinting has been an active research topic in
web security, particularly web fingerprinting, in recent years.
These methods can be used for a wide range of tasks, such
as user access control, web tracking and analytics. In this
paper, we established a better way of identifying devices
using the browser information with the common attributes.
Browser fingerprints are really an amazing way to prove
that the device you are communicating islegitimate in terms
of security communications. The selection of browser
fingerprints attributes is important in this research, we
identify the common attributes that is not affected by
software deprecation and useful to any browser and
retrieve only by JavaScript.We hope that our basis, which is
freely presented to other researchers and can easily be
extended for further studies and it helps to address issues
by providing a means to shed light on web fingerprinting
practices and methods.
5REFERENCES
[1]. A. (University of W. Lerner, A. K. (University of W.
Simpson, T. (University of W. Kohno, and F.
(University of W. Roesner, ―Internet Jones and the
Raiders of the Lost Trackers: An Archaeological
Study of Web Tracking from 1996 to 2016,‖ Proc.
25th USENIX Secur. Symp., pp. 997–1013, 2016.
[2]. S. Englehardt and A. Narayanan, ―Online Tracking: A
1-million-site Measurement and Analysis,‖ Proc. 2016
ACM SIGSAC Conf. Comput. Commun. Secur. -
CCS’16, no. 1, pp. 1388–1401, 2016.
[3]. Y. Cao, S. Li, and E. Wijmans, ―(Cross-)Browser
Fingerprinting via OS and Hardware Level Features,‖
Ndss ’17, no. March, 2017.
[4]. A. Vastel et al., ―FP-STALKER : Tracking Browser
Fingerprint Evolutions To cite this version : HAL Id :
hal-01652021 F P -S TALKER : Tracking Browser
Fingerprint Evolutions,‖ 2018.
[5]. P. De Boer and D. P. Kroese, ―A Tutorial on the
Cross-Entropy Method,‖ pp. 1–47.
[6]. P. Laperdrix, B. Baudry, and V. Mishra, ―FPRandom :
Randomizing core browser objects to break
advanced device fingerprinting techniques.‖ .
[7]. R. Binns, J. Zhao, M. Van Kleek, and N. Shadbolt,
―Measuring third-party tracker power across web and
mobile,‖ ACM Trans. Internet Technol., vol. 18, no. 4,
2018.
[8]. A. Kobusi, K. Pawluczuk, and J. Brzezi, ―Big Data
Fingerprinting Information Analytics for Sustainability
Anna,‖ 2018.
[9]. P. Laperdrix, W. Rudametkin, and B. Baudry, ―Beauty
and the Beast: Diverting Modern Web Browsers to
Build Unique Browser Fingerprints,‖ Proc. - 2016
IEEE Symp. Secur. Privacy, SP 2016, pp. 878–894,
2016.
[10]. K. Mowery and H. Shacham, ―Pixel Perfect :
Fingerprinting Canvas in HTML5,‖ Web 2.0 Secur.
Priv. 20, pp. 1–12, 2012.
[11]. G. Acar, C. Eubank, S. Englehardt, M. Juarez, A.
Narayanan, and C. Diaz, ―The Web never forgets :
Persistent tracking mechanisms in the wild,‖ 21st
ACM Conf. Comput. Commun. Secur., no. Section 4,
pp. 1–16, 2014.
[12]. O. Starov and N. Nikiforakis, ―XHOUND: Quantifying
the Fingerprintability of Browser Extensions,‖ Proc. -
IEEE Symp. Secur. Priv., pp. 941–956, 2017.
[13]. X. Liu, Q. Liu, X. Wang, and Z. Jia, ―Fingerprinting
web browser for tracing anonymous web attackers,‖
Proc. - 2016 IEEE 1st Int. Conf. Data Sci.
Cyberspace, DSC 2016, pp. 222–229, 2017.
[14]. A. Vastel, A. Vastel, S. Prof, R. Rouvoy, and P.
Walter, ―Tracking Versus Security : Investigating the
Two Facets of Browser Fingerprinting To cite this
version : Tracking Versus Security : Investigating the
Two Facets of Browser Fingerprinting .,‖ 2019.
[15]. Z. Jia, X. Cui, Q. Liu, X. Wang, and C. Liu, ―Micro-
honeypot: Using browser fingerprinting to track
attackers,‖ Proc. - 2018 IEEE 3rd Int. Conf. Data Sci.
Cyberspace, DSC 2018, no. 201636000100038, pp.
197–204, 2018.
[16]. A. Gómez-Boix, P. Laperdrix, and B. Baudry, ―Hiding
in the Crowd: an Analysis of the Effectiveness of
Browser Fingerprinting at Large Scale,‖ WWW2018 -
TheWebConf 2018 27th Int. World Wide Web Conf.,
p. 10, 2018.
[17]. G. Acar et al., ―FPDetective,‖ Proc. 2013 ACM
SIGSAC Conf. Comput. Commun. Secur. - CCS ’13,
pp. 1129–1140, 2013.
[18]. P. Laperdrix, W. Rudametkin, and B. Baudry,
―Mitigating Browser Fingerprint Tracking: Multi-level
Reconfiguration and Diversification,‖ Proc. - 10th Int.
Symp. Softw. Eng. Adapt. Self-Managing Syst.
SEAMS 2015, pp. 98–108, 2015.
[19]. F. Rochet, F. Koeune, K. Efthymiadis, and O. Pereira,
―SWAT: Seamless web authentication technology,‖
Web Conf. 2019 - Proc. World Wide Web Conf.
WWW 2019, vol. 2, pp. 1579–1589, 2019.
[20]. I. Sanchez-Rola, I. Santos, and D. Balzarotti, ―Clock
around the clock: Time-based device fingerprinting,‖
Fig. 3. This result covered within 30 days in evaluating returning
devices.