Your clicks reveal your secrets: a novel user-device linking method through network and visual data

Cameras for visual surveillance are extensively deployed to monitor people’s locations and activities. The law enforcement can analyze the surveillance videos (V-data) to track the whereabouts of the criminal suspects. On the other hand, with the popular use of the mobile phones and a wide coverage of wireless networks, people can easily access the Internet. The law enforcement also need to analyze the network traffic (N-data) to track the device so as to monitor the criminal suspects’ online behaviors. In order to match the suspects’ online and offline behaviors, the key problem is to link the device and its user. In this paper, we present a novel method to link the target with his mobile device by analyzing the N-V data. We use a camera and a wireless access point to monitor people operating their mobile devices in public places such as bars, shopping malls, or similar gathering places. Our user-device linking method is based on the premise that when a user is playing an app, his click activities can generate particular network traffic packets in a short time. Based on this premise, our research is carried out as follows. First, we design experiments to detect the particular packets and figure out the time gap distribution between the user’s clicks and these packets. Through statistical work, we find that for 97.4% of all instances, the time gap is less than 0.5 s. Then we choose five popular social networking apps to evaluate our method. We find that the main impact factors on the experimental results are the different user’s habits and the app’s category. Finally, by simulating two real-world scenarios in which people use different apps, we verify the effectiveness of the linking method. Both in scenario 1 and 2, the accuracy rate of experimental results reaches about 94% when the participants include 5 persons and exceeds 84% in experiments including 10 persons, with the fastest linking speed achieved in 20 s.

[1]  Wenbo He,et al.  I know what you did on your smartphone: Inferring app usage over encrypted data traffic , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[2]  Claude Castelluccia,et al.  Selling Off Privacy at Auction , 2014, NDSS 2014.

[3]  Yichao Huang,et al.  DeepFinger: A Cascade Convolutional Neuron Network Approach to Finger Key Point Detection in Egocentric Vision with Mobile Camera , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.

[4]  Rajesh Kumar,et al.  Beware, Your Hands Reveal Your Secrets! , 2014, CCS.

[5]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[6]  Dawn Xiaodong Song,et al.  NetworkProfiler: Towards automatic fingerprinting of Android apps , 2013, 2013 Proceedings IEEE INFOCOM.

[7]  Yuan F. Zheng,et al.  EV-Human: Human localization via visual estimation of body electronic interference , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[9]  Gang Chen,et al.  The knowing camera: recognizing places-of-interest in smartphone photos , 2013, SIGIR.

[10]  David L. Mills,et al.  Computer network time synchronization : the network time protocol on earth and in space , 2006 .

[11]  Nino Vincenzo Verde,et al.  Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.

[12]  John C. Mitchell,et al.  Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.

[13]  Zdenek Kalal,et al.  Tracking-Learning-Detection , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  Ivan Martinovic,et al.  Who do you sync you are?: smartphone fingerprinting via application behaviour , 2013, WiSec '13.

[15]  Mohan S. Kankanhalli,et al.  Tweeting Cameras for Event Detection , 2015, WWW.

[16]  Sung-Ho Yoon,et al.  Behavior Signature for Fine-grained Traffic Identification , 2015 .

[17]  Patrick Tague,et al.  IdentityLink: user-device linking through visual and RF-signal cues , 2014, UbiComp.

[18]  Hannes Federrath,et al.  Behavior-based tracking: Exploiting characteristic patterns in DNS traffic , 2013, Comput. Secur..

[19]  Fan Yang,et al.  EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[20]  Vashek Matyas,et al.  User Profiling and Re-identification: Case of University-Wide Network Analysis , 2009, TrustBus.

[21]  A. B. M. Musa,et al.  Tracking unmodified smartphones using wi-fi monitors , 2012, SenSys '12.

[22]  Trevor Darrell,et al.  Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation , 2013, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[23]  Roman P. Pflugfelder,et al.  Clustering of static-adaptive correspondences for deformable object tracking , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[24]  Roman P. Pflugfelder,et al.  Consensus-based matching and tracking of keypoints for object tracking , 2014, IEEE Winter Conference on Applications of Computer Vision.

[25]  Gang Chen,et al.  The knowing camera 2: recognizing and annotating places-of-interest in smartphone photos , 2014, SIGIR.

[26]  Roksana Boreli,et al.  Linking wireless devices using information contained in Wi-Fi probe requests , 2014, Pervasive Mob. Comput..

[27]  Yuan F. Zheng,et al.  EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization , 2014, IEEE/ACM Transactions on Networking.

[28]  Zhen Ling,et al.  Blind Recognition of Touched Keys on Mobile Devices , 2014, CCS.

[29]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[30]  Mathieu Cunche,et al.  Device-to-identity linking attack using targeted wi-fi geolocation spoofing , 2015, WISEC.

[31]  Ross B. Girshick,et al.  Fast R-CNN , 2015, 1504.08083.

[32]  L. R. Rabiner,et al.  A comparative study of several dynamic time-warping algorithms for connected-word recognition , 1981, The Bell System Technical Journal.

[33]  Yuan F. Zheng,et al.  E-V: Efficient visual surveillance with electronic footprints , 2012, 2012 Proceedings IEEE INFOCOM.

[34]  Yichao Huang,et al.  A Pointing Gesture Based Egocentric Interaction System: Dataset, Approach and Application , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[35]  David A. McAllester,et al.  A discriminatively trained, multiscale, deformable part model , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.