• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Qixu, Liu Xinyu, Luo Cheng, Wang Junnan, Chen Langping, Liu Jiaxi. Android Browser Fingerprinting Identification Method Based on Bidirectional Recurrent Neural Network[J]. Journal of Computer Research and Development, 2020, 57(11): 2294-2311. DOI: 10.7544/issn1000-1239.2020.20200459
Citation: Liu Qixu, Liu Xinyu, Luo Cheng, Wang Junnan, Chen Langping, Liu Jiaxi. Android Browser Fingerprinting Identification Method Based on Bidirectional Recurrent Neural Network[J]. Journal of Computer Research and Development, 2020, 57(11): 2294-2311. DOI: 10.7544/issn1000-1239.2020.20200459

Android Browser Fingerprinting Identification Method Based on Bidirectional Recurrent Neural Network

Funds: This work was supported by the Youth Innovation Promotion Association of Chinese Academy of Sciences (2019163), the National Natural Science Foundation of China (61902396), the Strategic Priority Research Program of Chinese Academy of Sciences (XDC02040100), and the Project of the Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences and Beijing Key Laboratory of Network Security and Protection Technology.
More Information
  • Published Date: October 31, 2020
  • Browser fingerprinting is a user identification method which has gradually matured since its concept was proposed in 2010 and is widely used in a lot of popular business websites to serve ads accurately. However, traditional fingerprinting has lots of problems in tracing users because it changes subtly no matter if the fingerprint feature value is changed due to system upgrade, browser update or tampering caused by fingerprint blocker. On the basis of research on the attributes of browser fingerprint, a great number of fingerprints from the volunteers who used Android devices are collected and supervised learning framework RNNBF for user identification is proposed. The robustness of RNNBF is reflected in the data and the model respectively. In the data aspect, the fingerprint-based data enhancement technology is used to generate the enhanced data set. In the model aspect, the attention mechanism is used to make our model focus more on the invariant fingerprint features. In terms of model evaluation, the RNNBF model is compared with the single-layer LSTM model and the random forest model. When F1-Score is used as the evaluation standard, the recognition effect of the RNNBF model is better than the latter two, which proves the excellent performance of RNNBF in dynamically linking fingerprints.
  • Related Articles

    [1]Feng Jun, Shi Yichen, Gao Yuhao, He Jingjing, Yu Zitong. Domain Adaptation for Face Anti-Spoofing Based on Dual Disentanglement and Liveness Feature Progressive Alignment[J]. Journal of Computer Research and Development, 2023, 60(8): 1727-1739. DOI: 10.7544/issn1000-1239.202330251
    [2]Wang Xiaoxi, Liu Qixu, Liu Chaoge, Zhang Fangjiao, Liu Xinyu, Cui Xiang. Survey of Web Tracking[J]. Journal of Computer Research and Development, 2023, 60(4): 839-859. DOI: 10.7544/issn1000-1239.202110681
    [3]Ma Anxiang, Zhang Bin, Gao Kening, Qi Peng, and Zhang Yin. Deep Web Data Extraction Based on Result Pattern[J]. Journal of Computer Research and Development, 2009, 46(2): 280-288.
    [4]Ban Zhijie, Gu Zhimin, Jin Yu. A Survey of Web Prefetching[J]. Journal of Computer Research and Development, 2009, 46(2): 202-210.
    [5]Ye Lei and Zhang Bin. A Method of Web Service Discovery Based on Functional Semantics[J]. Journal of Computer Research and Development, 2007, 44(8): 1357-1364.
    [6]Deng Xiaopeng, Xing Chunxiao, Cai Lianhong. Progress in Testing for Web Applications[J]. Journal of Computer Research and Development, 2007, 44(8): 1273-1283.
    [7]Shi Yuliang, Huang Guang'an, Ye Wei, Zhang Liang, Shi Baile. Automatic Composition of Web Services Based on Task Dependency Specification[J]. Journal of Computer Research and Development, 2006, 43(12): 2110-2116.
    [8]Li Shijun, Yu Junqing, Ou Weijie. Web Information Extraction Based on HTML Pattern Algebra[J]. Journal of Computer Research and Development, 2006, 43(9): 1644-1650.
    [9]Wang Bennian, Gao Yang, Chen Shifu, Xie Junyuan. A Review of Web Intelligence Research[J]. Journal of Computer Research and Development, 2005, 42(5): 721-727.
    [10]Yang Nan, Gong Danzhi, Li Xian, and Meng Xiaofeng. Survey of Web Communities Identification[J]. Journal of Computer Research and Development, 2005, 42(3): 1.
  • Cited by

    Periodical cited type(7)

    1. 李建伏,宋国平. 基于多分类LSTM的浏览器指纹识别方法. 计算机应用与软件. 2024(04): 173-178 .
    2. 楚小茜,张建辉,张德升,苏珲. 基于改进GraphSAGE算法的浏览器指纹追踪. 计算机科学. 2024(06): 409-415 .
    3. 王晓茜,刘奇旭,刘潮歌,张方娇,刘心宇,崔翔. Web追踪技术综述. 计算机研究与发展. 2023(04): 839-859 . 本站查看
    4. 张德升,陈博,张建辉,卜佑军,孙重鑫,孙嘉. 基于改进Self-paced Ensemble算法的浏览器指纹识别. 计算机科学. 2023(07): 317-324 .
    5. 叶得学,韩如冰,颜鲁合. 基于轻量级DenseNet和ZigBee的指纹识别方法. 湖南科技大学学报(自然科学版). 2023(04): 78-87 .
    6. 贾晓霞. 基于神经网络的并行混沌数据安全加密系统设计. 现代电子技术. 2022(09): 61-65 .
    7. 张军,邱龙龙. 一种基于BERT和池化操作的文本分类模型. 计算机与现代化. 2022(06): 1-7 .

    Other cited types(5)

Catalog

    Article views (965) PDF downloads (452) Cited by(12)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return