Enter your keyword

2-s2.0-84967185280

[vc_empty_space][vc_empty_space]

JavaScript-based device fingerprinting mitigation using personal HTTP proxy

Laksono T.D.a, Rosmansyah Y.a, Dabarsyah B.a, Choi J.U.b

a School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, West Java, Indonesia
b Sangmyung University, Seoul, South Korea

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2015 IEEE.In this paper, we designed a mechanism to mitigate the existence of device fingerprinting process by utilizing personal HTTP proxy. For the purpose of detection and prevention of device fingerprinting, the proxy utilizes a two-stage filtering process; header-based filtering and content-based filtering. We define 6 values of attribute among with their weight based on the value of the highest entropy. In addition, we also define the ConfLevel coefficient as the weight accumulation value of the existence of each attribute. There is also defined ThresholdLevel coefficient for the purpose of determining the limit condition if there is an indication of device fingerprinting. System testing was performed by accessing Alexa’s Top 125 Indonesia Website. We obtained 15.5796 as the ThresholdLevel value. Among the 125 web pages tested, it was found that 38 web pages were indicated utilizing JavaScript as the media of device fingerprinting activity.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Content based filtering,Device fingerprinting,Filtering process,Indonesia,Javascript,Mitigation,System testing[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Device Fingerprinting,HTTP Proxy,JavaScript,Mitigation[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITSI.2015.7437697[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]