Computer Science ›› 2020, Vol. 47 ›› Issue (7): 257-262.doi: 10.11896/jsjkx.190900107

• Information Security • Previous Articles     Next Articles

New Device Fingerprint Feature Selection and Model Construction Method

WANG Meng, DING Zhi-jun   

  1. Key Laboratory of Embedded System and Service Computing of Ministry of Education (Tongji University),Shanghai 201804,China
    Shanghai Electronic Transactions and Information Service Collaborative Innovation Center (Tongji University),Shanghai 201804,China
  • Received:2019-09-16 Online:2020-07-15 Published:2020-07-16
  • About author:WANG Meng,born in 1996,postgra-duate,is a member of China Computer Federation.His main research interests include machine learning,feature engineering.
    DING Zhi-Jun,born in 1974,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include service computing,formal method and intelligent system.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61672381) and Fundamental Research Funds for the Central Universities (22120180508)

Abstract: In recent years,with the rapid development of mobile Internet,more and more businesses have moved from the browser to the mobile.But the black industry chain that is parasitic on the mobile Internet has reached the point of flooding.To solve this problem,the device fingerprint,that is,the use of the device’s characteristic attributes to generate a unique identifier for each device came into being.Many algorithms based on machine learning methods for device uniqueness authentication have emerged,most of which focus on the establishment of models.Few of them have in-depth research on feature selection.However,feature selection is directly related to the performance of the final model.Aiming at this problem,this paper proposes a new device fingerprint feature selection and model construction method (FSDS-WSC),which is based on the feature discrimination of different devices and the feature stability of the same device to select some of the most valuable features.The importance of the selected features’ weights is applied to the later model establishment.The FSFS-WSC is compared with other mainstream feature selection methods on 6424 Android devices in the real sence.The results show that FSFS-WSC has a great improvement compared with other methods,and the accuracy of device uniqueness authentication reaches 99.53%,which shows the superiority of FSFS-WSC.

Key words: Device fingerprint, Feature selection, Similarity, Weight, Discrimination, Stability

CLC Number: 

  • TP3-05
[1] BUJLOW T,CARELA-ESPANÑOL V,SOLEÉ-PARETA J,et al.Web tracking:Mechanisms,implications,and defenses[J].Proc.of the IEEE,2017,105(8):1476-1510.
[2] LIU J W,HUO Y M,WAN Y L.Review of equipment fingerprint research [C]//Proceedings of the 33rd National Computer Security Academic Exchange.2018.
[3] ECKERSLEY P.How Unique is Your Web Browser?[C]//Privacy Enhancing Technologies,10th International Symposium(PETS 2010).Berlin:DBLP,2010.
[4] Mobile apps overtake PC Web usage in U.S.[EB/OL].ht-tps://www.mendeley.com/catalogue/mobile-apps-overtake-pc-web-usage/.
[5] Percentage of all global web pages served to mobile phones from 2009 to 2018[EB/OL].https://www.statista.com/statistics/241462/global-mobile-phone-website-traffic-share/.
[6] BOJINOV H,MICHALEVSKY Y,NAKIBLY G,et al.Mobile Device Identification via Sensor Fingerprinting[J].arXiv:1408.1416.
[7] DEY S,ROY N,XU W,et al.AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable[C]//Network and Distributed System Security Symposium.2014.
[8] BALDINI G,AMERINI I,GENTILE C.Microphone identification using convolutional neural networks[J].IEEE Sensors Lett.,2019,3(7):6001504.
[9] BALDINI G,STERI G.A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in compo nents[J].IEEE Commun.Surveys Tuts.,2017,19(3):1761-1789.
[10] HUPPERICH T,MAIORCA D,MARC K,et al.On the Robustness of Mobile Device Fingerprinting:Can Mobile Users Escape Modern Web-Tracking Mechanisms?[C]//the 31st Annual Computer Security Applications Conference.ACM,2015.
[11] CAI J,LUO J,WANG S,et al.Feature selection in machinelearning:a new perspective[J].Neurocomputing,2018,300:70-79.
[12] KIRA K,RENDELL L A.The Feature Selection Problem:Traditional Methods and a New Algorithm[C]//Tenth National Conference on Artificial Intelligence.AAAI Press,1992.
[13] KONONENKO I.Estimating attributes:analysis and extensionof relief[C]//European Conference on Machine Learning.Berlin:Springer,1994.
[14] RESHEF D N,RESHEF Y A,FINUCANE H K,et al.Detecting Novel Associations in Large Data Sets[J].Science,2011,334 (6062):1518-1524.
[15] WEN T,DONG D,CHEN Q,et al.Maximal Information Coeffi-cient-Based Two-Stage Feature Selection Method for Railway Condition Monitoring[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(7):2681-2690.
[16] PRAMESTI H,TALOMPO H R A.Determination of CreditDecision Attributes Using Maximal Information Coefficient[C]//International Conference on Information Technology Systems and Innovation (ICITSI).2018.
[17] PONTIVEROS B B F,NORVILL R,STATE R.Monitoring the transaction selection policy of Bitcoin mining pools[C]//NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.IEEE,2018.
[18] TAN Y Q,ZHANG X,LI Z,et al.Construction of Information Push Model Based on Maximum Mutual Information Coefficient[J].Journal of Jilin University(Engineering Edition),2018,48(2):558-563.
[19] Cryptographic hash funcation[EB/OL].https://en.wikipedia.org/wiki/cryptographic_hash_ funcation.
[20] Pearson correlation coefficient[EB/OL].https://en.wikipedia.org/wiki/Pearson_correlation_coefficient.
[21] COVER T M,THOMAS J A.Elements of Information Theory[M].Wiley,1991.
[1] HU Ping, QIN Ke-yun. Similarity Construction Method for Pythagorean Fuzzy Set Based on Fuzzy Equivalence [J]. Computer Science, 2021, 48(1): 152-156.
[2] DONG Ming-gang, HUANG Yu-yang, JING Chao. K-Nearest Neighbor Classification Training Set Optimization Method Based on Genetic Instance and Feature Selection [J]. Computer Science, 2020, 47(8): 178-184.
[3] ZHU Zhen, HUANG Rui, ZANG Tie-gang, LU Shi-jun. Single Image Defogging Method Based on Weighted Near-InFrared Image Fusion [J]. Computer Science, 2020, 47(8): 241-244.
[4] SUN Yan-li, YE Jiong-yao. Convolutional Neural Networks Compression Based on Pruning and Quantization [J]. Computer Science, 2020, 47(8): 261-266.
[5] ZHANG Zhi-qiang, LU Xiao-feng, SUI Lian-sheng, LI Jun-huai. Salp Swarm Algorithm with Random Inertia Weight and Differential Mutation Operator [J]. Computer Science, 2020, 47(8): 297-301.
[6] LIU Jing, FANG Xian-wen. Mining Method of Business Process Change Based on Cost Alignment [J]. Computer Science, 2020, 47(7): 78-83.
[7] ZHANG Yan, QIN Liang-xi. Improved Salp Swarm Algorithm Based on Levy Flight Strategy [J]. Computer Science, 2020, 47(7): 154-160.
[8] LI Zhang-wei, XIAO Lu-qian, HAO Xiao-hu, ZHOU Xiao-gen, ZHANG Gui-jun. Multimodal Optimization Algorithm for Protein Conformation Space [J]. Computer Science, 2020, 47(7): 161-165.
[9] SHI Chao-wei, MENG Xiang-ru, MA Zhi-qiang, HAN Xiao-yang. Virtual Network Embedding Algorithm Based on Topology Comprehensive Evaluation and Weight Adaptation [J]. Computer Science, 2020, 47(7): 236-242.
[10] LUO Jia-lei and MENG Li-min. Signal Timing Scheme Recommendation Algorithm Based on Intersection Similarity [J]. Computer Science, 2020, 47(6A): 66-69.
[11] CHENG Zhong-Jian, ZHOU Shuang-e and LI Kang. Sparse Representation Target Tracking Algorithm Based on Multi-scale Adaptive Weight [J]. Computer Science, 2020, 47(6A): 181-186.
[12] PENG Wei, HU Ning and HU Jing-Jing. Overview of Research on Image Steganalysis Algorithms [J]. Computer Science, 2020, 47(6A): 325-331.
[13] LI Jin-xia, ZHAO Zhi-gang, LI Qiang, LV Hui-xian and LI Ming-sheng. Improved Locality and Similarity Preserving Feature Selection Algorithm [J]. Computer Science, 2020, 47(6A): 480-484.
[14] LI Jian-Jun, FU Jia, YANG Yu, HOU Yue, WANG Xiao-ling and RONG Xin. Research on Agricultural Products Recommendation Technology Based on User Interest [J]. Computer Science, 2020, 47(6A): 521-525.
[15] SHU Yun-feng and WANG Zhong-qing. Research on Chinese Patent Summarization Based on Patented Structure [J]. Computer Science, 2020, 47(6A): 45-48.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .