Computer Science ›› 2020, Vol. 47 ›› Issue (7): 257-262.doi: 10.11896/jsjkx.190900107

Special Issue: Information Security

• Information Security • Previous Articles     Next Articles

New Device Fingerprint Feature Selection and Model Construction Method

WANG Meng, DING Zhi-jun   

  1. Key Laboratory of Embedded System and Service Computing of Ministry of Education (Tongji University),Shanghai 201804,China
    Shanghai Electronic Transactions and Information Service Collaborative Innovation Center (Tongji University),Shanghai 201804,China
  • Received:2019-09-16 Online:2020-07-15 Published:2020-07-16
  • About author:WANG Meng,born in 1996,postgra-duate,is a member of China Computer Federation.His main research interests include machine learning,feature engineering.
    DING Zhi-Jun,born in 1974,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include service computing,formal method and intelligent system.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61672381) and Fundamental Research Funds for the Central Universities (22120180508)

Abstract: In recent years,with the rapid development of mobile Internet,more and more businesses have moved from the browser to the mobile.But the black industry chain that is parasitic on the mobile Internet has reached the point of flooding.To solve this problem,the device fingerprint,that is,the use of the device’s characteristic attributes to generate a unique identifier for each device came into being.Many algorithms based on machine learning methods for device uniqueness authentication have emerged,most of which focus on the establishment of models.Few of them have in-depth research on feature selection.However,feature selection is directly related to the performance of the final model.Aiming at this problem,this paper proposes a new device fingerprint feature selection and model construction method (FSDS-WSC),which is based on the feature discrimination of different devices and the feature stability of the same device to select some of the most valuable features.The importance of the selected features’ weights is applied to the later model establishment.The FSFS-WSC is compared with other mainstream feature selection methods on 6424 Android devices in the real sence.The results show that FSFS-WSC has a great improvement compared with other methods,and the accuracy of device uniqueness authentication reaches 99.53%,which shows the superiority of FSFS-WSC.

Key words: Device fingerprint, Discrimination, Feature selection, Similarity, Stability, Weight

CLC Number: 

  • TP3-05
[1]BUJLOW T,CARELA-ESPANÑOL V,SOLEÉ-PARETA J,et al.Web tracking:Mechanisms,implications,and defenses[J].Proc.of the IEEE,2017,105(8):1476-1510.
[2]LIU J W,HUO Y M,WAN Y L.Review of equipment fingerprint research [C]//Proceedings of the 33rd National Computer Security Academic Exchange.2018.
[3]ECKERSLEY P.How Unique is Your Web Browser?[C]//Privacy Enhancing Technologies,10th International Symposium(PETS 2010).Berlin:DBLP,2010.
[4]Mobile apps overtake PC Web usage in U.S.[EB/OL].ht-tps://www.mendeley.com/catalogue/mobile-apps-overtake-pc-web-usage/.
[5]Percentage of all global web pages served to mobile phones from 2009 to 2018[EB/OL].https://www.statista.com/statistics/241462/global-mobile-phone-website-traffic-share/.
[6]BOJINOV H,MICHALEVSKY Y,NAKIBLY G,et al.Mobile Device Identification via Sensor Fingerprinting[J].arXiv:1408.1416.
[7]DEY S,ROY N,XU W,et al.AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable[C]//Network and Distributed System Security Symposium.2014.
[8]BALDINI G,AMERINI I,GENTILE C.Microphone identification using convolutional neural networks[J].IEEE Sensors Lett.,2019,3(7):6001504.
[9]BALDINI G,STERI G.A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in compo nents[J].IEEE Commun.Surveys Tuts.,2017,19(3):1761-1789.
[10]HUPPERICH T,MAIORCA D,MARC K,et al.On the Robustness of Mobile Device Fingerprinting:Can Mobile Users Escape Modern Web-Tracking Mechanisms?[C]//the 31st Annual Computer Security Applications Conference.ACM,2015.
[11]CAI J,LUO J,WANG S,et al.Feature selection in machinelearning:a new perspective[J].Neurocomputing,2018,300:70-79.
[12]KIRA K,RENDELL L A.The Feature Selection Problem:Traditional Methods and a New Algorithm[C]//Tenth National Conference on Artificial Intelligence.AAAI Press,1992.
[13]KONONENKO I.Estimating attributes:analysis and extensionof relief[C]//European Conference on Machine Learning.Berlin:Springer,1994.
[14]RESHEF D N,RESHEF Y A,FINUCANE H K,et al.Detecting Novel Associations in Large Data Sets[J].Science,2011,334 (6062):1518-1524.
[15]WEN T,DONG D,CHEN Q,et al.Maximal Information Coeffi-cient-Based Two-Stage Feature Selection Method for Railway Condition Monitoring[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(7):2681-2690.
[16]PRAMESTI H,TALOMPO H R A.Determination of CreditDecision Attributes Using Maximal Information Coefficient[C]//International Conference on Information Technology Systems and Innovation (ICITSI).2018.
[17]PONTIVEROS B B F,NORVILL R,STATE R.Monitoring the transaction selection policy of Bitcoin mining pools[C]//NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.IEEE,2018.
[18]TAN Y Q,ZHANG X,LI Z,et al.Construction of Information Push Model Based on Maximum Mutual Information Coefficient[J].Journal of Jilin University(Engineering Edition),2018,48(2):558-563.
[19]Cryptographic hash funcation[EB/OL].https://en.wikipedia.org/wiki/cryptographic_hash_ funcation.
[20]Pearson correlation coefficient[EB/OL].https://en.wikipedia.org/wiki/Pearson_correlation_coefficient.
[21]COVER T M,THOMAS J A.Elements of Information Theory[M].Wiley,1991.
[1] WU Zi-yi, LI Shao-mei, JIANG Meng-han, ZHANG Jian-peng. Ontology Alignment Method Based on Self-attention [J]. Computer Science, 2022, 49(9): 215-220.
[2] CHAI Hui-min, ZHANG Yong, FANG Min. Aerial Target Grouping Method Based on Feature Similarity Clustering [J]. Computer Science, 2022, 49(9): 70-75.
[3] ZHENG Wen-ping, LIU Mei-lin, YANG Gui. Community Detection Algorithm Based on Node Stability and Neighbor Similarity [J]. Computer Science, 2022, 49(9): 83-91.
[4] LI Bin, WAN Yuan. Unsupervised Multi-view Feature Selection Based on Similarity Matrix Learning and Matrix Alignment [J]. Computer Science, 2022, 49(8): 86-96.
[5] YANG Wen-kun, YUAN Xiao-pei, CHEN Xiao-feng, GUO Rui. Spatial Multi-feature Segmentation of 3D Lidar Point Cloud [J]. Computer Science, 2022, 49(8): 143-149.
[6] WANG Can, LIU Yong-jian, XIE Qing, MA Yan-chun. Anchor Free Object Detection Algorithm Based on Soft Label and Sample Weight Optimization [J]. Computer Science, 2022, 49(8): 157-164.
[7] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[8] ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112.
[9] CAI Xiao-juan, TAN Wen-an. Improved Collaborative Filtering Algorithm Combining Similarity and Trust [J]. Computer Science, 2022, 49(6A): 238-241.
[10] WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271.
[11] HAO Qiang, LI Jie, ZHANG Man, WANG Lu. Spatial Non-cooperative Target Components Recognition Algorithm Based on Improved YOLOv3 [J]. Computer Science, 2022, 49(6A): 358-362.
[12] HUANG Shao-bin, SUN Xue-wei, LI Rong-sheng. Relation Classification Method Based on Cross-sentence Contextual Information for Neural Network [J]. Computer Science, 2022, 49(6A): 119-124.
[13] KANG Yan, WANG Hai-ning, TAO Liu, YANG Hai-xiao, YANG Xue-kun, WANG Fei, LI Hao. Hybrid Improved Flower Pollination Algorithm and Gray Wolf Algorithm for Feature Selection [J]. Computer Science, 2022, 49(6A): 125-132.
[14] YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171.
[15] CAI Xin-yu, FENG Xiang, YU Hui-qun. Adaptive Weight Based Broad Learning Algorithm for Cascaded Enhanced Nodes [J]. Computer Science, 2022, 49(6): 134-141.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!