Anti-Fingerprinting Technique : (Record no. 8865)

MARC details
000 -LEADER
fixed length control field 06995nam a22002537a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210125b2018 a|||f mb|| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
041 0# - Language Code
Language code of text eng
Language code of abstract eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Amr El-Banna
245 1# - TITLE STATEMENT
Title Anti-Fingerprinting Technique :
Remainder of title NONYM!ZER /
Statement of responsibility, etc. Amr El-Banna
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Date of publication, distribution, etc. 2018
300 ## - PHYSICAL DESCRIPTION
Extent 59 p.
Other physical details ill.
Dimensions 21 cm.
500 ## - GENERAL NOTE
Materials specified Supervisor: Nashwa Abd El-Baki
502 ## - Dissertation Note
Dissertation type Thesis (M.A.)—Nile University, Egypt, 2018 .
504 ## - Bibliography
Bibliography "Includes bibliographical references"
505 0# - Contents
Formatted contents note Contents:<br/>Abstract.......................................................................................................................XII<br/>How Web Tracking has started?.....................................................................................1<br/>Web Tracking Dynamics................................................................................................4<br/>Techniques & Methods:.............................................................................................6<br/>1. TCP/IP stack......................................................................................................7<br/>2. User-Agent........................................................................................................8<br/>3. FlashPlayer........................................................................................................8<br/>4. ServerLight.....................................................................................................10<br/>5. WebGL............................................................................................................10<br/>6. JavaApplet.......................................................................................................11<br/>7. Canvas.............................................................................................................13<br/>8. Fonts................................................................................................................14<br/>9. Cascade Style Sheet - CSS..............................................................................14<br/>10. Social Media Login.......................................................................................15<br/>11. geoLocation API...........................................................................................16<br/>Countermeasures and preventive actions.....................................................................17<br/>1. Less verbosity of User-Agent String and Plugins................................................17<br/>2. Canvas blocker.....................................................................................................17<br/>3. Flash Blocker.......................................................................................................17<br/>4. Applications in the middle...................................................................................17<br/>5. Social Media Protection.......................................................................................18<br/>6. Do Not Track – DNT Header...............................................................................18<br/>7. Universal Fonts list usage....................................................................................18<br/>NONYM!ZER – Anti-Fingerprinting Tool..................................................................21<br/>Anoymize UA String...............................................................................................22<br/>Anoymize Canvas....................................................................................................25<br/>How does Canvas fingerprinting happen?..........................................................25<br/>Experiment...................................................................................................................29<br/>Test Environment Preparations................................................................................29<br/>Detailed steps on how to setup each environment:.............................................31<br/>Performance Evaluation...............................................................................................33<br/>VIII<br/>Test Results Comparison.........................................................................................33<br/>Individual environment evaluation:.........................................................................35<br/>Across environments evaluation:.............................................................................36<br/>Conclusion....................................................................................................................37<br/>Future Work..................................................................................................................38<br/>Appendix A...................................................................................................................39<br/>NONYM!ZER Web Extension Code.......................................................................39<br/>References....................................................................................................................
520 3# - Abstract
Abstract Abstract:<br/>Back in the early days of the Internet, web content (for example web site) was<br/>designed and hosted by a single entity or organization. Web pages were mainly<br/>developed to share knowledge, news, data to the public. The main objective of the<br/>Internet was to connect the world. It was never meant to target third-parties. With the<br/>continuous and aggressive competition in advertising businesses, uncontrollably<br/>desires have emerged to identify and classify consumers. It is proven that companies<br/>must have a clear definition of its target market. Based on this we have seen different<br/>ways to identify, analyze, and track consumers, either voluntarily or without their<br/>consent.<br/>Not only recent compelled regulations have radically restrained Cookies usage but<br/>also increased people knowledge and awareness have been playing a fundamental<br/>part. This have put lots of pressure on enterprises to find alternatives to bridge this<br/>gap and satisfy business demands. Since then fingerprinting have gained enormous<br/>popularity. Browser fingerprinting techniques have evolved from being privacyfriendly<br/>to privacy intrusive to serve these demands. This also has pushed privacy<br/>concerned people to save no effort to advance countermeasures.<br/>In this thesis we introduce different browser fingerprinting techniques and their<br/>relevant technologies in the wild. It additionally elaborates widely known<br/>countermeasures. we introduce “nonym!zer” as a mitigation framework for browser<br/>fingerprinting. It helps to hinder or impede browser fingerprinting on desktop<br/>browsers that web servers use such as WebGL or Canvas technologies.
546 ## - Language Note
Language Note Text in English, abstracts in English.
650 #4 - Subject
Subject Information Security
655 #7 - Index Term-Genre/Form
Source of term NULIB
focus term Dissertation, Academic
690 ## - Subject
School Information Security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Thesis
650 #4 - Subject
-- 294
655 #7 - Index Term-Genre/Form
-- 187
690 ## - Subject
-- 294
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Date last seen Price effective from Koha item type
    Dewey Decimal Classification   Not For Loan Main library Main library 01/25/2021   658 /A.B.A/ 2018 01/25/2021 01/25/2021 Thesis