User tracking mechanisms and counter measures

Authors

  • Asra ISHTIAQ
  • Salma Hussain ABBASI
  • Muhammad ALEEM
  • Muhammad Arshad Islam Islam

DOI:

https://doi.org/10.18100/ijamec.2017528829

Keywords:

Countermeasures, Discrimination, Privacy, Tracking mechanism

Abstract

Online customers have lots of alternatives while making purchase or discovering information on websites. Now a day, tracking services and passive traffic check are widely used to collect knowledge about user’s internet activities and interests. For end users such tracking has significant privacy implications. So, Privacy becomes a sensitive issue which attracts a lot of user’s attention. Discrimination is a way to differentiate, isolate, or make a difference. User discrimination is a tactic used to present personalized content to the user, based on user profile. It helps the web owner to improve the content of web site. It also ensures that the content caters to largest population of user visiting their website. Our major contribution in this paper is to empirically show the tracking mechanism used for user discrimination on the Web, and also provide defense mechanism against these tracking mechanisms.

Downloads

Download data is not yet available.

References

Roesner, F., Kohno, T., & Wetherall, D. (2012, April). Detecting and defending against third-party tracking on the web. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (pp. 12-12). USENIX Association.

Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., & Diaz, C. (2014, November). The web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 674-689). ACM.

Mayer, J. R., & Mitchell, J. C. (2012, May). Third-party web tracking: Policy and technology. In Security and Privacy (SP), 2012 IEEE Symposium on (pp. 413-427). IEEE.

Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., & Vigna, G. (2013, May). Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Security and privacy (SP), 2013 IEEE symposium on (pp. 541-555). IEEE.

Boda, K., Földes, Á. M., Gulyás, G. G., & Imre, S. (2011, October). User tracking on the web via cross-browser fingerprinting. In Nordic Conference on Secure IT Systems (pp. 31-46). Springer Berlin Heidelberg.

Acar, G., Juarez, M., Nikiforakis, N., Diaz, C., Gürses, S., Piessens, F., & Preneel, B. (2013, November). FPDetective: dusting the web for fingerprinters. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (pp. 1129-1140). ACM.

Gomer, R., Rodrigues, E. M., Milic-Frayling, N., & Schraefel, M. C. (2013, November). Network analysis of third party tracking: User exposure to tracking cookies through search. In Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)-Volume 01 (pp. 549-556). IEEE Computer Society.

Bau, J., Mayer, J., Paskov, H., & Mitchell, J. C. (2013). A promising direction for web tracking countermeasures. Proceedings of W2SP.

Kim, D. (2014, May). Poster: Detection and prevention of web-based device fingerprinting. In IEEE Symposium on Security and Privacy (SP).

Schmucker, N. (2011). Web tracking. In SNET2 Seminar Paper-Summer Term.

Broenink, R. (2012, January). Using browser properties for fingerprinting purposes. In 16th biennial Twente Student Conference on IT, Enschede, Holanda.

Chaabane, A., Kaafar, M. A., & Boreli, R. (2012, August). Big friend is watching you: Analyzing online social networks tracking capabilities. In Proceedings of the 2012 ACM workshop on Workshop on online social networks (pp. 7-12). ACM.

Purra, J., & Carlsson, N. (2016, November). Third-party tracking on the web: A Swedish perspective. In Local Computer Networks (LCN), 2016 IEEE 41st Conference on (pp. 28-34). IEEE.

Sanchez-Rola, I., Ugarte-Pedrero, X., Santos, I., & Bringas, P. G. (2016). The web is watching you: A comprehensive review of web-tracking techniques and countermeasures. Logic Journal of IGPL, jzw041.

Sánchez-Rola, I., Ugarte-Pedrero, X., Santos, I., & Bringas, P. G. (2015). Tracking users like there is no tomorrow: Privacy on the current internet. In International Joint Conference (pp. 473-483). Springer International Publishing.

Bielova, N. (2013). Survey on JavaScript security policies and their enforcement mechanisms in a web browser. The Journal of Logic and Algebraic Programming, 82(8), 243-262.

Englehardt, S., & Narayanan, A. (2016, October). Online tracking: A 1-million-site measurement and analysis. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1388-1401). ACM.

Tran, M., Dong, X., Liang, Z., & Jiang, X. (2012, June). Tracking the trackers: Fast and scalable dynamic analysis of web content for privacy violations.In InternationalConference on Applied Cryptography and Network Security (pp. 418-435). Springer Berlin Heidelberg.

Laperdrix, P., Rudametkin, W., & Baudry, B. (2016, May). Beauty and the beast: Diverting modern web browsers to build unique browser fingerprints. In Security and Privacy (SP), 2016 IEEE Symposium on (pp. 878-894). IEEE.

Hoofnagle, C. J., & Good, N. (2012). Web privacy census.

Lerner, A., Simpson, A. K., Kohno, T., & Roesner, F. (2016). Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association.

Zarras, A., Kapravelos, A., Stringhini, G., Holz, T., Kruegel, C., & Vigna, G. (2014, November). The dark alleys of madison avenue: Understanding malicious advertisements. In Proceedings of the 2014 Conference on Internet Measurement Conference (pp. 373-380). ACM.

Krishnamurthy, B., Naryshkin, K., & Wills, C. (2011, May). Privacy leakage vs. protection measures: the growing disconnect. In Proceedings of the Web (Vol. 2, pp. 1-10).

Bujlow, T., Carela-Español, V., Solé-Pareta, J., & Barlet-Ros, P. (2015). Web tracking: Mechanisms, implications, and defenses. arXiv preprint arXiv:1507.07872.

Eubank, C., Melara, M., Perez-Botero, D., & Narayanan, A. (2013, May). Shining the floodlights on mobile web tracking-a privacy survey. In Proceedings of the IEEE Workshop on Web (Vol. 2).

Liu, B., Sheth, A., Weinsberg, U., Chandrashekar, J., & Govindan, R. (2013, November). AdReveal: improving transparency into online targeted advertising. In Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks (p. 12). ACM.

Malandrino, D., Petta, A., Scarano, V., Serra, L., Spinelli, R., & Krishnamurthy, B. (2013, November). Privacy awareness about information leakage: Who knows what about me?. In Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (pp. 279-284). ACM.

Nikiforakis, N., Invernizzi, L., Kapravelos, A., Van Acker, S., Joosen, W., Kruegel, C., ... & Vigna, G. (2012, October). You are what you include: large-scale evaluation of remote javascript inclusions. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 736-747). ACM.

Saez-Trumper, D., Liu, Y., Baeza-Yates, R., Krishnamurthy, B., & Mislove, A. (2014, October). Beyond cpm and cpc: Determining the value of users on osns. In Proceedings of the second ACM conference on Online social networks (pp. 161-168). ACM.

Yuan, N. J., Zhang, F., Lian, D., Zheng, K., Yu, S., & Xie, X. (2013, October). We know how you live: exploring the spectrum of urban lifestyles. In Proceedings of the first ACM conference on Online social networks (pp. 3-14). ACM.

Keil, F., Schmidt, D., Burgiss, H., Rian, L., & Rosenfeld, R. (2012). Privoxy-Home Page [online], Boston USA, Privoxy Developers.

Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. Naval Research Lab Washington DC.

Eckersley, P. (2010, July). How unique is your web browser? In International Symposium on Privacy Enhancing Technologies Symposium (pp. 1-18). Springer Berlin Heidelberg.

Wills, C. E., & Tatar, C. (2012, October). Understanding what they do with what they know. In Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (pp. 13-18). ACM.

Weinberg, Z., Chen, E. Y., Jayaraman, P. R., & Jackson, C. (2011, May). I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks. In Security and Privacy (SP), 2011 IEEE Symposium on (pp. 147-161). IEEE.

Mulazzani, M., Reschl, P., Huber, M., Leithner, M., Schrittwieser, S., Weippl, E., & Wien, F. C. (2013, May). Fast and reliable browser identification with javascript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP) (Vol. 5).

Verleg, P., van Eekelen, M. C. J. D., & Vranken, H. P. E. (2014). Cache Cookies: searching for hidden browser storage.

Yen, T. F., Xie, Y., Yu, F., Yu, R. P., & Abadi, M. (2012, February). Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. In NDSS.

Guha, S., Cheng, B., & Francis, P. (2011, March). Privad: Practical privacy in online advertising. In USENIX conference on Networked systems design and implementation (pp. 169-182).

Omidvar, M. A., Mirabi, V. R., & Shokry, N. (2011). Analyzing the impact of visitors on page views with Google analytics. arXiv preprint arXiv:1102.0735.

Downloads

Published

30-06-2017

Issue

Section

Research Articles

How to Cite

[1]
“User tracking mechanisms and counter measures”, J. Appl. Methods Electron. Comput., vol. 5, no. 2, pp. 33–40, Jun. 2017, doi: 10.18100/ijamec.2017528829.

Similar Articles

31-38 of 38

You may also start an advanced similarity search for this article.