Analysis of user identification methods in web browsers
Article Sidebar
Open full text
Issue Vol. 34 (2025)
-
Impact of metrics on the effectiveness of Kohonen network clustering
Krystian Wypart, Edyta Łukasik1-7
-
Analysis of object recognition systems using augmented reality glasses
Jan Figura, Rafał Kuźmiczuk, Marcin Badurowicz8-13
-
Comparative analysis of selected data recovery software
Tomasz Szymczyk, Rafał Wróbel14-20
-
Usability analysis of graphic user interfaces for Internet forums with consideration for Universal Design Principles
Krystian Łęczycki, Jakub Łabendowicz, Maria Skublewska-Paszkowska21-28
-
Ergonomic analysis of book web services’ interfaces
Patrycja Kłodnicka, Dawid Matraszek29-35
-
Comparison of the effectiveness of tools for testing the security of web applications
Izabela Kaźmierak36-43
-
Comparative analysis of the performance of relational and non-relational databases in applications implemented in C#
Patryk Baliński, Łukasz Chudy, Maria Skublewska-Paszkowska44-53
-
Analysis of performance and energy efficiency of processors with hybrid architecture
Dawid Żytko, Marcin Badurowicz54-59
-
Analysis of user identification methods in web browsers
Eduard Chyzhik, Jakub Smołka60-67
-
Multi-aspect comparative analysis of JavaScript programming frameworks – React.js and Solid.js
Jakub Kryk, Małgorzata Plechawska-Wójcik68-75
-
Realization and discussion of selected artificial intelligence algorithms in computer games
Yurii Tyshchenko76-80
-
Comparative analysis of selected aspects of web application architectures
Łukasz Krzysztoń, Konrad Łatwiński, Małgorzata Plechawska-Wójcik81-88
-
Evaluation of deep learning models for flood forecasting in Bangladesh
Asif Rahman Rumee89-97
-
Optical character recognition for ancient scripts: a case study on Syloti Nagri using deep learning models
Tanzidul Islam, Sheikh Kamrul Hasan Omur, Nafiz Nahid, Lukman Chowdhury, Gourab Roy, Md. Abu Naser Mojumder, Md. Janibul Alam Soeb, Md. Fahad Jubayer98-107
-
Design of a non-human proctoring and authentication system for mobile phone-based online examination
Brendan Ubochi, Emmanuel Oluleye, Charity Odeyemi, Chinyere Ubochi108-112
Main Article Content
DOI
Authors
Abstract
Website visitor data helps to increase application security, control limited access, personalize content, collect data and improve the application. The article analyzes user identification methods in a browser: Browser Fingerprint, Supercookie, Keystroke Dynamics. The analysis of the methods was perfomed based on 4 criteria: False Acceptance Rate, applicability, avoidance resistance, Frontend Performance. For the research, literature, tests in different browsers, demo scripts in JavaScript, and the Performance API were used. It has been shown that the Supercookie is ineffective today, but Browser Fingerprint and Keystroke Dynamics can still be utilized for identification.
Keywords:
References
[1] A. Gómez-Boix, P. Laperdrix and B. Baudry, Hiding in the Crowd: an Analysis of the Effective-ness of Browser Fingerprinting at Large Scale, Proceedings of the 2018 World Wide Web Confer-ence (2018) 309-318, https://doi.org/10.1145/3178876.3186097. DOI: https://doi.org/10.1145/3178876.3186097
[2] P. Laperdrix, N. Bielova, B. Baudry, G. Avoine, Browser Fingerprinting: A survey, ACM Transac-tions on the Web (TWEB) 14(2) (2020) 1-33, https://doi.org/10.1145/3386040. DOI: https://doi.org/10.1145/3386040
[3] Supercookie, https://supercookie.me/workwise, [28.09.2024].
[4] S. Roy, J. Pradhan, A. Kumar, D. R. Das Adhikary, A Systematic Literature Review on Latest Keystroke Dynamics Based Models, IEEE Access 10 (2022) 92192-92236, http://dx.doi.org/10.1109/ACCESS.2022.3197756. DOI: https://doi.org/10.1109/ACCESS.2022.3197756
[5] Device fingerprint. Browser fingerprint, https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint, [28.09.2024].
[6] Zombie cookie, https://en.wikipedia.org/wiki/Zombie_cookie, [28.09.2024].
[7] Keystroke dynamics, https://en.wikipedia.org/wiki/Keystroke_dynamics, [28.09.2024].
[8] ISO/IEC 19795-10:2024, Information technolo-gy — Biometric performance testing and reporting, Part 10: Quantifying biometric system per-formance variation across demographic groups, https://www.iso.org/standard/81223.html.
[9] Navigator, https://developer.mozilla.org/en-US/docs/Web/API/Navigator, [28.09.2024].
[10] Performance, https://developer.mozilla.org/en-US/docs/Web/API/Performance, [28.09.2024].
[11] Browser-Fingerprinting via Favicon, https://supercookie.me/, [28.09.2024].
[12] KeyboardEvent, https://developer.mozilla.org/en-US/docs/Web/API/KeyboardEvent, [28.09.2024].
[13] P. Eckersley, How unique is your web browser?, Proceedings of the 10th international conference on Privacy enhancing technologies (2010) 1-18. DOI: https://doi.org/10.1007/978-3-642-14527-8_1
[14] P. Laperdrix, W. Rudametkin, B. Baudry, Beauty and the Beast: Diverting modern web browsers to build unique browser fingerprints, 2016 IEEE Symposium on Security and Privacy (SP) (2016) 878-894, http://dx.doi.org/10.1109/SP.2016.57. DOI: https://doi.org/10.1109/SP.2016.57
[15] E. Alamri, A. Alnajim, S. Alsuhibany, Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks, Fu-ture Internet 14(3) (2022) 1-21, https://doi.org/10.3390/fi14030082. DOI: https://doi.org/10.3390/fi14030082
[16] A. Alsultan, K. Warwick i H. Wei, Free-text key-stroke dynamics authentication for Arabic lan-guage, IET Biometrics 5(3) (2016) 164-169, http://dx.doi.org/10.1049/iet-bmt.2015.0101. DOI: https://doi.org/10.1049/iet-bmt.2015.0101
Article Details
Abstract views: 191

