计算机科学 ›› 2020, Vol. 47 ›› Issue (7): 257-262.doi: 10.11896/jsjkx.190900107

所属专题: 信息安全 虚拟专题

• 信息安全 • 上一篇    下一篇

一种新的设备指纹特征选择及模型构建方法

王萌, 丁志军   

  1. 嵌入式系统与服务计算教育部重点实验室(同济大学) 上海201804
    上海市电子交易与信息服务协同创新中心(同济大学) 上海201804
  • 收稿日期:2019-09-16 出版日期:2020-07-15 发布日期:2020-07-16
  • 通讯作者: 丁志军(zhujun_ding@outlook.com)
  • 作者简介:1830799@tongji.edu.cn
  • 基金资助:
    国家自然科学基金面上项目(61672381);中央高校基本科研业务费专项资金重点项目(22120180508)

New Device Fingerprint Feature Selection and Model Construction Method

WANG Meng, DING Zhi-jun   

  1. Key Laboratory of Embedded System and Service Computing of Ministry of Education (Tongji University),Shanghai 201804,China
    Shanghai Electronic Transactions and Information Service Collaborative Innovation Center (Tongji University),Shanghai 201804,China
  • Received:2019-09-16 Online:2020-07-15 Published:2020-07-16
  • About author:WANG Meng,born in 1996,postgra-duate,is a member of China Computer Federation.His main research interests include machine learning,feature engineering.
    DING Zhi-Jun,born in 1974,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include service computing,formal method and intelligent system.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61672381) and Fundamental Research Funds for the Central Universities (22120180508)

摘要: 近年来,随着移动互联网的快速发展,越来越多的业务从浏览器端转移到了移动端。但是,寄生在移动互联网上的黑色产业链也达到了泛滥的地步。设备指纹技术应运而生,即利用设备的特征属性为每个设备生成独一无二的标识。其间涌现了很多利用机器学习方法进行设备唯一性认证的策略,其中大部分方法注重于模型的建立,很少对特征选择部分展开深入研究,而特征选择直接关系到最终模型的性能。针对该问题,文中提出了一种新的设备指纹特征选择及模型构建方法(Feature Selection Based on Discrimination and Stability and Weight-based Similarity Calculation,FSDS-WSC),即根据不同设备的特征区分度和相同设备的特征稳定性选出最具价值的一些特征,并将这些特征的重要程度作为特征权重应用到模型建立的后续过程中。在真实场景中的6424台Android设备上,将FSDS-WSC与当今主流的其他特征选择方法进行了对比实验。结果表明,FSDS-WSC相比其他方法有了较大改进,设备唯一性认证的准确率达到了99.53%,证实了FSDS-WSC的优越性。

关键词: 区分度, 权重, 设备指纹, 特征选择, 稳定性, 相似度

Abstract: In recent years,with the rapid development of mobile Internet,more and more businesses have moved from the browser to the mobile.But the black industry chain that is parasitic on the mobile Internet has reached the point of flooding.To solve this problem,the device fingerprint,that is,the use of the device’s characteristic attributes to generate a unique identifier for each device came into being.Many algorithms based on machine learning methods for device uniqueness authentication have emerged,most of which focus on the establishment of models.Few of them have in-depth research on feature selection.However,feature selection is directly related to the performance of the final model.Aiming at this problem,this paper proposes a new device fingerprint feature selection and model construction method (FSDS-WSC),which is based on the feature discrimination of different devices and the feature stability of the same device to select some of the most valuable features.The importance of the selected features’ weights is applied to the later model establishment.The FSFS-WSC is compared with other mainstream feature selection methods on 6424 Android devices in the real sence.The results show that FSFS-WSC has a great improvement compared with other methods,and the accuracy of device uniqueness authentication reaches 99.53%,which shows the superiority of FSFS-WSC.

Key words: Device fingerprint, Discrimination, Feature selection, Similarity, Stability, Weight

中图分类号: 

  • TP3-05
[1]BUJLOW T,CARELA-ESPANÑOL V,SOLEÉ-PARETA J,et al.Web tracking:Mechanisms,implications,and defenses[J].Proc.of the IEEE,2017,105(8):1476-1510.
[2]LIU J W,HUO Y M,WAN Y L.Review of equipment fingerprint research [C]//Proceedings of the 33rd National Computer Security Academic Exchange.2018.
[3]ECKERSLEY P.How Unique is Your Web Browser?[C]//Privacy Enhancing Technologies,10th International Symposium(PETS 2010).Berlin:DBLP,2010.
[4]Mobile apps overtake PC Web usage in U.S.[EB/OL].ht-tps://www.mendeley.com/catalogue/mobile-apps-overtake-pc-web-usage/.
[5]Percentage of all global web pages served to mobile phones from 2009 to 2018[EB/OL].https://www.statista.com/statistics/241462/global-mobile-phone-website-traffic-share/.
[6]BOJINOV H,MICHALEVSKY Y,NAKIBLY G,et al.Mobile Device Identification via Sensor Fingerprinting[J].arXiv:1408.1416.
[7]DEY S,ROY N,XU W,et al.AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable[C]//Network and Distributed System Security Symposium.2014.
[8]BALDINI G,AMERINI I,GENTILE C.Microphone identification using convolutional neural networks[J].IEEE Sensors Lett.,2019,3(7):6001504.
[9]BALDINI G,STERI G.A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in compo nents[J].IEEE Commun.Surveys Tuts.,2017,19(3):1761-1789.
[10]HUPPERICH T,MAIORCA D,MARC K,et al.On the Robustness of Mobile Device Fingerprinting:Can Mobile Users Escape Modern Web-Tracking Mechanisms?[C]//the 31st Annual Computer Security Applications Conference.ACM,2015.
[11]CAI J,LUO J,WANG S,et al.Feature selection in machinelearning:a new perspective[J].Neurocomputing,2018,300:70-79.
[12]KIRA K,RENDELL L A.The Feature Selection Problem:Traditional Methods and a New Algorithm[C]//Tenth National Conference on Artificial Intelligence.AAAI Press,1992.
[13]KONONENKO I.Estimating attributes:analysis and extensionof relief[C]//European Conference on Machine Learning.Berlin:Springer,1994.
[14]RESHEF D N,RESHEF Y A,FINUCANE H K,et al.Detecting Novel Associations in Large Data Sets[J].Science,2011,334 (6062):1518-1524.
[15]WEN T,DONG D,CHEN Q,et al.Maximal Information Coeffi-cient-Based Two-Stage Feature Selection Method for Railway Condition Monitoring[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(7):2681-2690.
[16]PRAMESTI H,TALOMPO H R A.Determination of CreditDecision Attributes Using Maximal Information Coefficient[C]//International Conference on Information Technology Systems and Innovation (ICITSI).2018.
[17]PONTIVEROS B B F,NORVILL R,STATE R.Monitoring the transaction selection policy of Bitcoin mining pools[C]//NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.IEEE,2018.
[18]TAN Y Q,ZHANG X,LI Z,et al.Construction of Information Push Model Based on Maximum Mutual Information Coefficient[J].Journal of Jilin University(Engineering Edition),2018,48(2):558-563.
[19]Cryptographic hash funcation[EB/OL].https://en.wikipedia.org/wiki/cryptographic_hash_ funcation.
[20]Pearson correlation coefficient[EB/OL].https://en.wikipedia.org/wiki/Pearson_correlation_coefficient.
[21]COVER T M,THOMAS J A.Elements of Information Theory[M].Wiley,1991.
[1] 柴慧敏, 张勇, 方敏.
基于特征相似度聚类的空中目标分群方法
Aerial Target Grouping Method Based on Feature Similarity Clustering
计算机科学, 2022, 49(9): 70-75. https://doi.org/10.11896/jsjkx.210800203
[2] 郑文萍, 刘美麟, 杨贵.
一种基于节点稳定性和邻域相似性的社区发现算法
Community Detection Algorithm Based on Node Stability and Neighbor Similarity
计算机科学, 2022, 49(9): 83-91. https://doi.org/10.11896/jsjkx.220400146
[3] 吴子仪, 李邵梅, 姜梦函, 张建朋.
基于自注意力模型的本体对齐方法
Ontology Alignment Method Based on Self-attention
计算机科学, 2022, 49(9): 215-220. https://doi.org/10.11896/jsjkx.210700190
[4] 李斌, 万源.
基于相似度矩阵学习和矩阵校正的无监督多视角特征选择
Unsupervised Multi-view Feature Selection Based on Similarity Matrix Learning and Matrix Alignment
计算机科学, 2022, 49(8): 86-96. https://doi.org/10.11896/jsjkx.210700124
[5] 王灿, 刘永坚, 解庆, 马艳春.
基于软标签和样本权重优化的Anchor Free目标检测算法
Anchor Free Object Detection Algorithm Based on Soft Label and Sample Weight Optimization
计算机科学, 2022, 49(8): 157-164. https://doi.org/10.11896/jsjkx.210600240
[6] 胡艳羽, 赵龙, 董祥军.
一种用于癌症分类的两阶段深度特征选择提取算法
Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification
计算机科学, 2022, 49(7): 73-78. https://doi.org/10.11896/jsjkx.210500092
[7] 曾志贤, 曹建军, 翁年凤, 蒋国权, 徐滨.
基于注意力机制的细粒度语义关联视频-文本跨模态实体分辨
Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism
计算机科学, 2022, 49(7): 106-112. https://doi.org/10.11896/jsjkx.210500224
[8] 黄少滨, 孙雪薇, 李熔盛.
基于跨句上下文信息的神经网络关系分类方法
Relation Classification Method Based on Cross-sentence Contextual Information for Neural Network
计算机科学, 2022, 49(6A): 119-124. https://doi.org/10.11896/jsjkx.210600150
[9] 康雁, 王海宁, 陶柳, 杨海潇, 杨学昆, 王飞, 李浩.
混合改进的花授粉算法与灰狼算法用于特征选择
Hybrid Improved Flower Pollination Algorithm and Gray Wolf Algorithm for Feature Selection
计算机科学, 2022, 49(6A): 125-132. https://doi.org/10.11896/jsjkx.210600135
[10] 王毅, 李政浩, 陈星.
基于用户场景的Android 应用服务推荐方法
Recommendation of Android Application Services via User Scenarios
计算机科学, 2022, 49(6A): 267-271. https://doi.org/10.11896/jsjkx.210700123
[11] 蔡欣雨, 冯翔, 虞慧群.
自适应权重的级联增强节点的宽度学习算法
Adaptive Weight Based Broad Learning Algorithm for Cascaded Enhanced Nodes
计算机科学, 2022, 49(6): 134-141. https://doi.org/10.11896/jsjkx.210500119
[12] 徐化池, 史殿习, 崔玉宁, 景罗希, 刘聪.
面向事件相机的时间信息融合网络框架
Time Information Integration Network for Event Cameras
计算机科学, 2022, 49(5): 43-49. https://doi.org/10.11896/jsjkx.210400047
[13] 成科扬, 王宁, 崔宏纲, 詹永照.
基于局部注意力图互迁移的可解释性优化方法
Interpretability Optimization Method Based on Mutual Transfer of Local Attention Map
计算机科学, 2022, 49(5): 64-70. https://doi.org/10.11896/jsjkx.210400176
[14] 陈壮, 邹海涛, 郑尚, 于化龙, 高尚.
基于用户覆盖及评分差异的多样性推荐算法
Diversity Recommendation Algorithm Based on User Coverage and Rating Differences
计算机科学, 2022, 49(5): 159-164. https://doi.org/10.11896/jsjkx.210300263
[15] 唐春阳, 肖玉芝, 赵海兴, 冶忠林, 张娜.
面向双层网络的EWCC社区发现算法
EWCC Community Discovery Algorithm for Two-Layer Network
计算机科学, 2022, 49(4): 49-55. https://doi.org/10.11896/jsjkx.210800275
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!