User Identification and Tracking with online device fingerprints fusion

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)


Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.

Original languageEnglish
Title of host publicationProceedings - 46th Annual 2012 IEEE International Carnahan Conference on Security Technology, ICCST 2012
Number of pages5
Publication statusPublished - 2012 Dec 1
Event46th Annual 2012 IEEE International Carnahan Conference on Security Technology, ICCST 2012 - Boston, MA, United States
Duration: 2012 Oct 152012 Oct 18

Publication series

NameProceedings - International Carnahan Conference on Security Technology
ISSN (Print)1071-6572


Other46th Annual 2012 IEEE International Carnahan Conference on Security Technology, ICCST 2012
Country/TerritoryUnited States
CityBoston, MA


  • Data Fusion
  • Digital Forensic
  • Privacy
  • Targeted Attack
  • User Tacking

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Law


Dive into the research topics of 'User Identification and Tracking with online device fingerprints fusion'. Together they form a unique fingerprint.

Cite this