Netinfo Security ›› 2016, Vol. 16 ›› Issue (3): 34-39.doi: 10.3969/j.issn.1671-1122.2016.03.006

• Orginal Article • Previous Articles     Next Articles

Research on Browsers Recognition

Zhouhui LI(), Yanqun HUANG, Yi TANG   

  1. School of Mathematics and Information Sciences, Guangzhou University, Guangzhou Guangdong 510006, China
  • Received:2015-12-13 Online:2016-03-25 Published:2020-05-13

Abstract:

In recent years, with the high-speed development of Internet, network software has been the main target of the hacker. As the network software that users use most frequently, the safety and the service of the browser has always been the focus of attention, which is also a measure that users choose to use. On the one hand, recognizing the browsers can achieve system attacks according to corresponding loopholes of browsers and then open the gate for attackers. On the other hand, using the browsers recognition technology can further recognize the users, and then bring a better user experiences. Previous studies get browsers fingerprint information by implanting server-side scripts, and there are some people that use traffic analysis technology to recognize the browsers, but the recognition rate is relatively low. This paper derives trace information of thirteen browsers from the encryption transmission traffic, and processes trace information by three typical machine learning methods, in order to recognize the browsers. The experimental results show that the browsers can be recognized, and the recognition accuracy is as high as 100%. This means that the users must improve safety awareness, update the browser version, and install the latest patch to prevent system damages caused by the hackers using the original browsers vulnerabilities.

Key words: browser, encryption, kernel, trace, machine learning

CLC Number: