Please use this identifier to cite or link to this item:
http://hdl.handle.net/1942/26915
Title: | Social profiling of users through information leakages | Authors: | DI MARTINO, Mariano | Advisors: | QUAX, Peter LAMOTTE, Wim |
Issue Date: | 2018 | Publisher: | tUL | Abstract: | Over the last decade, an overwhelming number of network attacks and methods have been developed to obtain sensitive information about end users. Such sensitive information can then be analyzed to predict the behaviour or interests of individuals or even worse, to enable the use of identity theft. More recently, companies that analyze such data have garnered attraction due to the legality and questionable effectiveness of these analyses. Regardless whether or not these social analyses are legal, they are actively being used for predicting social media influence, personalized advertisements, assessing financial and health conditions or even in forensic science. Based on this, we discuss and analyze the different attacks that can be used to socially profile Internet users. First, we discuss some practical cases why social profiling is in demand and examples in which context a malicious adversary can deploy such methods. Next, we discuss several attacks that can be utilized to fingerprint the devices and websites used by an Internet user and provide some effective countermeasures to defend ourselves against those attacks. Furthermore, we propose a novel fingerprinting method named 'IUPTIS' to identify specific profile URLs navigated by an end user. To quantify the practicality of this method, we conduct several experiments where we analyze the impact and defenses of utilizing this method in a realistic scenario. | Notes: | master in de informatica | Document URI: | http://hdl.handle.net/1942/26915 | Category: | T2 | Type: | Theses and Dissertations |
Appears in Collections: | Master theses |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
4c189e45-3d13-4241-97b5-01759357ec7c.pdf | 1.54 MB | Adobe PDF | View/Open |
Page view(s)
154
checked on Aug 26, 2023
Download(s)
124
checked on Aug 26, 2023
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.