User Identification and Tracking with online device fingerprints fusion

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.

Original languageEnglish
Title of host publicationProceedings - International Carnahan Conference on Security Technology
Pages163-167
Number of pages5
DOIs
Publication statusPublished - 2012
Event46th Annual 2012 IEEE International Carnahan Conference on Security Technology, ICCST 2012 - Boston, MA, United States
Duration: 2012 Oct 152012 Oct 18

Other

Other46th Annual 2012 IEEE International Carnahan Conference on Security Technology, ICCST 2012
CountryUnited States
CityBoston, MA
Period12/10/1512/10/18

Fingerprint

Digital devices
Fusion reactions
Web browsers
Physical addresses
Smartphones
Bluetooth
Electronic mail
Computer networks
Personal computers
Sensor networks
Interfaces (computer)
Printing
Internet
Personnel
privacy
human being
Monitoring
e-mail
PC
personnel

Keywords

  • Data Fusion
  • Digital Forensic
  • Privacy
  • Targeted Attack
  • User Tacking

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Law

Cite this

Takeda, K. (2012). User Identification and Tracking with online device fingerprints fusion. In Proceedings - International Carnahan Conference on Security Technology (pp. 163-167). [6393552] https://doi.org/10.1109/CCST.2012.6393552

User Identification and Tracking with online device fingerprints fusion. / Takeda, Keiji.

Proceedings - International Carnahan Conference on Security Technology. 2012. p. 163-167 6393552.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Takeda, K 2012, User Identification and Tracking with online device fingerprints fusion. in Proceedings - International Carnahan Conference on Security Technology., 6393552, pp. 163-167, 46th Annual 2012 IEEE International Carnahan Conference on Security Technology, ICCST 2012, Boston, MA, United States, 12/10/15. https://doi.org/10.1109/CCST.2012.6393552
Takeda K. User Identification and Tracking with online device fingerprints fusion. In Proceedings - International Carnahan Conference on Security Technology. 2012. p. 163-167. 6393552 https://doi.org/10.1109/CCST.2012.6393552
Takeda, Keiji. / User Identification and Tracking with online device fingerprints fusion. Proceedings - International Carnahan Conference on Security Technology. 2012. pp. 163-167
@inproceedings{0794e3cb581a46418597d1f3c32f16db,
title = "User Identification and Tracking with online device fingerprints fusion",
abstract = "Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.",
keywords = "Data Fusion, Digital Forensic, Privacy, Targeted Attack, User Tacking",
author = "Keiji Takeda",
year = "2012",
doi = "10.1109/CCST.2012.6393552",
language = "English",
isbn = "9781467348072",
pages = "163--167",
booktitle = "Proceedings - International Carnahan Conference on Security Technology",

}

TY - GEN

T1 - User Identification and Tracking with online device fingerprints fusion

AU - Takeda, Keiji

PY - 2012

Y1 - 2012

N2 - Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.

AB - Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.

KW - Data Fusion

KW - Digital Forensic

KW - Privacy

KW - Targeted Attack

KW - User Tacking

UR - http://www.scopus.com/inward/record.url?scp=84873129638&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84873129638&partnerID=8YFLogxK

U2 - 10.1109/CCST.2012.6393552

DO - 10.1109/CCST.2012.6393552

M3 - Conference contribution

AN - SCOPUS:84873129638

SN - 9781467348072

SP - 163

EP - 167

BT - Proceedings - International Carnahan Conference on Security Technology

ER -