Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems
Abstract
One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks.
The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained.
The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated.
The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases.
Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem.
In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed.
Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.
References
2. Mowery K., Bogenreif D., Yilek S., Shacham H. Fingerprinting information in JavaScript implementations // Proceedings of W2SP. 2011. vol. 2. no. 11.
3. Pham K., Santos A.S.R., Freire J. Understanding website behavior based on user agent. Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval. 2016. pp. 1053–1056.
4. Torres C.F., Jonker H., Mauw S. FP-Block: usable web privacy by controlling browser fingerprinting. European Symposium on Research in Computer Security. 2015. pp. 3–19.
5. Xu H., et al. Detecting and characterizing web bot traffic in a large e-commerce marketplace. European Symposium on Research in Computer Security. 2018. vol. 11099. pp. 143–163.
6. Navpreet K. et al. Browser Fingerprinting as user tracking technology. 2017 11th International Conference on Intelligent Systems and Control (ISCO). 2017. pp. 103–111.
7. Queiroz J.S., Feitosa E.L. A Web Browser Fingerprinting Method Based on the Web Audio API. The Computer Journal. 2019. vol. 62. no. 8. pp. 1106–1120.
8. Carpenter L. The A-buffer an Antialiased Hidden Surface Method. IEEE Computer Graphics and applications. 1984. vol. 18. no. 3. pp. 103–108.
9. Crow F.C. Comparison of Antialiasing Techniques. IEEE Computer Graphics and applications. 1981. vol. 1. no. 1. pp. 40–48.
10. Sazonov K.V., Tatarka M.V., Shuvaev F.L. [The method of structural statistical recognition of the operating modes of information and computer networks]. Information and Space – Informaciya i Kosmos. 2019. vol. 1. pp. 40–46. (In Russ.).
11. Sazonov K.V., Tatarka M.V., Shuvaev F.L. [The method of reducing the dimension of probabilistic suffix trees]. Information and Space – Informaciya i Kosmos. 2018. pp. 55–61. (In Russ.).
12. Flach P. Machine learning: the art of science of algorithms that make sense of data. Cambridge University press. 2012. 400 p.
13. Jordan M.I., Mitchell T.M. Machine learning: Trends, perspectives, and prospects. Science. 2015. vol. 349(6245). pp. 255–260.
14. Ayma V.A. et al. Classification algorithms for big data analysis a map reduce approach. The International Archives of the Photogrammetry"in Remote Sensing and Spatial Information Sciences. 2015. vol. 40. no. 3. pp 17.
15. Grolinger K. et al. Challenges for MapReduce in Big Data. IEEE 10th World Congress on Services. 2014. pp. 182–189.
16. Dhillon S., Kaur K. Comparative Study of Classification Algorithms for Web Usage Mining. International Journal of Advanced Research in Computer Science and Software Engineering. 2014. vol. 4(7). pp. 137–140.
17. Nikiforakis N. et al. Cookieless monster: Exploring the ecosystem of web- based device fingerprinting. 2013 IEEE Symposium on Security and Privacy (SP). 2013. pp. 541–555.
18. Khan T.M., Khan M.A.U., Kong Y. Fingerprint image enhancement using multi-scale DDFB based diffusion filters and modified Hong filters. Optik. 2014. vol. 125. no. 16. pp. 4206–4214.
19. Khan M.A.U., Khan T.M., Bailey D.G., Kong Y. A spatial domain scar removal strategy for fingerprint image enhancement. Pattern Recognition. 2016. vol. 60. pp. 258–274.
20. Khan T.M., Khan M.A.U., Kittaneh O., Kong Y. Stopping criterion for linear anisotropic image diffusion: A fingerprint image enhancement case. EURASIP Journal on Image and Video Processing. 2016. vol. 2016. no. 1. pp. 6.
21. Dunbar C., Qu G. A practical circuit fingerprinting method utilizing observability don’t care condition. Proceedings of the 52nd Annual Design Automation Conference. 2015. pp. 1–6.
22. Dunbar C., Qu G. Satisfiability don’t care condition based circuit fingerprinting techniques. The 20th Asia and South Pacific Design Automation Conference (ASPDAC’15). 2015. pp. 815–820.
Published
How to Cite
Section
Copyright (c) Константин Викторович Сазонов
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms: Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).