Combating client fingerprinting through the real-time detection and analysis of tailored web content

dc.contributor.authorBorn, Kenton P.
dc.date.accessioned2012-01-04T14:40:38Z
dc.date.available2012-01-04T14:40:38Z
dc.date.graduationmonthMay
dc.date.issued2012-01-04
dc.date.published2012
dc.description.abstractThe web is no longer composed of static resources. Technology and demand have driven the web towards a complex, dynamic model that tailors content toward specific client fingerprints. Servers now commonly modify responses based on the browser, operating system, or location of the connecting client. While this information may be used for legitimate purposes, malicious adversaries can also use this information to deliver misinformation or tailored exploits. Currently, there are no tools that allow a user to detect when a response contains tailored content. Developing an easily configurable multiplexing system solved the problem of detecting tailored web content. In this solution, a custom proxy receives the initial request from a client, duplicating and modifying it in many ways to change the browser, operating system, and location-based client fingerprint. All of the requests with various client fingerprints are simultaneously sent to the server. As the responses are received back at the proxy, they are aggregated and analyzed against the original response. The results of the analysis are then sent to the user along with the original response. This process allowed the proxy to detect tailored content that was previously undetectable through casual browsing. Theoretical and empirical analysis was performed to ensure the multiplexing proxy detected tailored content at an acceptable false alarm rate. Additionally, the tool was analyzed for its ability to provide utility to open source analysts, cyber analysts, and reverse engineers. The results showed that the proxy is an essential, scalable tool that provides capabilities that were not previously available.
dc.description.advisorDavid A. Gustafson
dc.description.degreeDoctor of Philosophy
dc.description.departmentDepartment of Computing Science
dc.description.levelDoctoral
dc.identifier.urihttp://hdl.handle.net/2097/13277
dc.language.isoen_US
dc.publisherKansas State University
dc.rights© the author. This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subjectTailored web content
dc.subjectComputer security
dc.subjectClient fingerprint
dc.subjectMultiplexing proxy
dc.subject.umiComputer Science (0984)
dc.titleCombating client fingerprinting through the real-time detection and analysis of tailored web content
dc.typeDissertation

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
KentonBorn2012.pdf
Size:
4.6 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.61 KB
Format:
Item-specific license agreed upon to submission
Description: