Font Size: a A A

Browser Fingerprint Technology And Implementation

Posted on:2015-02-24Degree:MasterType:Thesis
Country:ChinaCandidate:J T WuFull Text:PDF
GTID:2268330428477083Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The Internet develops fast, whose position in people’s daily lives is also rapidly increasing. Meanwhile Web application providers’ demand that distinguishing and tracking user grows increasingly, which is due to two reasons. Firstly, Web application developers want to differentiate users who access their applications to get information about the use of their applications and to find the "hot" content. It helps developers optimizing their applications and enhancing the user experience; meanwhile, for a large number of websites, advertising revenue is the major part of their income. Analyzing user behavior can help Web advertisers to advertise more effectively. Secondly, the leaks of user’s password happen frequently. This is not only a serious threat to the security of users’ privacy information on internet, but also to the safety of users’ property. Therefore, more and more companies provide new authentication mechanisms beyond user name and password, namely two-factor authentication. Two-factor authentication contributes to distinguishing between users more accurately, and improving user login security.Browser fingerprint technology can effectively distinguish and track users by collecting parameters of user devices, operating systems and browsers. However, according to these parameters we can infer the user’s age, gender, marital status, birth and other information, which is a serious threat to users’ privacy. Therefore, more and more researchers begin to focus on fight browser fingerprint technology.Main work in this thesis includes:Firstly, this paper describes the background and research status of browser fingerprint. Secondly, it introduces how browser fingerprint works; what it collects; how to identify browser fingerprint; how to assess the validity of a browser fingerprint framework theoretically; the differences when it’s used in different situations. Thirdly, this paper proposes a browser fingerprint algorithm using list-type parameters that has high sensitivity and stability, which would not upload user privacy information, and meet the both requirements told above. This paper also designed a browser fingerprint system based on the existing browser fingerprinting technology, which is modular, extensible, and easy to deploy and can be applied to Web application analysis and two-factor authentication. Finally, the experiment proved the effectiveness of this system.
Keywords/Search Tags:browser fingerprint, track user, Web application analysis, two-factor authentication
PDF Full Text Request
Related items