Combating client fingerprinting through the real-time detection and analysis of tailored web content

dc.contributor.authorBorn, Kenton P.
dc.date.accessioned2012-01-04T14:40:38Z
dc.date.available2012-01-04T14:40:38Z
dc.date.graduationmonthMayen_US
dc.date.issued2012-01-04
dc.date.published2012en_US
dc.description.abstractThe web is no longer composed of static resources. Technology and demand have driven the web towards a complex, dynamic model that tailors content toward specific client fingerprints. Servers now commonly modify responses based on the browser, operating system, or location of the connecting client. While this information may be used for legitimate purposes, malicious adversaries can also use this information to deliver misinformation or tailored exploits. Currently, there are no tools that allow a user to detect when a response contains tailored content. Developing an easily configurable multiplexing system solved the problem of detecting tailored web content. In this solution, a custom proxy receives the initial request from a client, duplicating and modifying it in many ways to change the browser, operating system, and location-based client fingerprint. All of the requests with various client fingerprints are simultaneously sent to the server. As the responses are received back at the proxy, they are aggregated and analyzed against the original response. The results of the analysis are then sent to the user along with the original response. This process allowed the proxy to detect tailored content that was previously undetectable through casual browsing. Theoretical and empirical analysis was performed to ensure the multiplexing proxy detected tailored content at an acceptable false alarm rate. Additionally, the tool was analyzed for its ability to provide utility to open source analysts, cyber analysts, and reverse engineers. The results showed that the proxy is an essential, scalable tool that provides capabilities that were not previously available.en_US
dc.description.advisorDavid A. Gustafsonen_US
dc.description.degreeDoctor of Philosophyen_US
dc.description.departmentDepartment of Computing Scienceen_US
dc.description.levelDoctoralen_US
dc.identifier.urihttp://hdl.handle.net/2097/13277
dc.language.isoen_USen_US
dc.publisherKansas State Universityen
dc.subjectTailored web contenten_US
dc.subjectComputer securityen_US
dc.subjectClient fingerprinten_US
dc.subjectMultiplexing proxyen_US
dc.subject.umiComputer Science (0984)en_US
dc.titleCombating client fingerprinting through the real-time detection and analysis of tailored web contenten_US
dc.typeDissertationen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
KentonBorn2012.pdf
Size:
4.6 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.61 KB
Format:
Item-specific license agreed upon to submission
Description: