Abstract
Cameras for visual surveillance are extensively deployed to monitor people’s locations and activities. The law enforcement can analyze the surveillance videos (V-data) to track the whereabouts of the criminal suspects. On the other hand, with the popular use of the mobile phones and a wide coverage of wireless networks, people can easily access the Internet. The law enforcement also need to analyze the network traffic (N-data) to track the device so as to monitor the criminal suspects’ online behaviors. In order to match the suspects’ online and offline behaviors, the key problem is to link the device and its user. In this paper, we present a novel method to link the target with his mobile device by analyzing the N-V data. We use a camera and a wireless access point to monitor people operating their mobile devices in public places such as bars, shopping malls, or similar gathering places. Our user-device linking method is based on the premise that when a user is playing an app, his click activities can generate particular network traffic packets in a short time. Based on this premise, our research is carried out as follows. First, we design experiments to detect the particular packets and figure out the time gap distribution between the user’s clicks and these packets. Through statistical work, we find that for 97.4% of all instances, the time gap is less than 0.5 s. Then we choose five popular social networking apps to evaluate our method. We find that the main impact factors on the experimental results are the different user’s habits and the app’s category. Finally, by simulating two real-world scenarios in which people use different apps, we verify the effectiveness of the linking method. Both in scenario 1 and 2, the accuracy rate of experimental results reaches about 94% when the participants include 5 persons and exceeds 84% in experiments including 10 persons, with the fastest linking speed achieved in 20 s.
Similar content being viewed by others
References
Breiman L (2001) Random forests. Mach Learn 45(1):5–32
Conti M, Mancini LV, Spolaor R, Verde NV (2016) Analyzing android encrypted network traffic to identify user actions. IEEE Trans Inf Forensics Secur 11(1):114–125
Cunche M, Kaafar M-A, Boreli R (2014) Linking wireless devices using information contained in wi-fi probe requests. Pervasive Mob Comput 11:56–69
Dai S, Tongaonkar A, Wang X, Nucci A, Song D (2013) Networkprofiler: towards automatic fingerprinting of android apps. In: Proceedings of the IEEE international conference on computer communications (INFOCOM). IEEE, pp 809–817
Felzenszwalb P, McAllester D, Ramanan D (2008) A discriminatively trained, multiscale, deformable part model. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 1–8
Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395
Girshick R (2015) Fast r-cnn. In: Proceedings of the IEEE international conference on computer vision (ICCV), pp 1440–1448
Girshick R, Donahue J, Darrell T, Malik J (2014) Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 580–587
Herrmann D, Banse C, Federrath H (2013) Behavior-based tracking: exploiting characteristic patterns in dns traffic. Computers & Security 39:17–33
Huang Y, Liu X, Jin L, Zhang X (2015) Deepfinger: a cascade convolutional neuron network approach to finger key point detection in egocentric vision with mobile camera. In: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, pp 2944–2949
Huang Y, Liu X, Zhang X, Jin L (2016) A pointing gesture based egocentric interaction system: dataset, approach and application. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 16–23
Kalal Z, Mikolajczyk K, Matas J (2012) Tracking-learning-detection. IEEE Trans Pattern Anal Mach Intell 34(7):1409–1422
Kumpošt M, Matyáš V (2009) User profiling and re-identification: case of university-wide network analysis. In: Proceedings of the international conference on trust, privacy and security in digital business. Springer, pp 1–10
Li X, Teng J, Zhai Q, Zhu J, Xuan D, Zheng YF, Zhao W (2013) Ev-human: human localization via visual estimation of body electronic interference. In: Proceedings of the IEEE international conference on computer communications (INFOCOM). IEEE, pp 500–504
Li G, Yang F, Chen G, Zhai Q, Li X, Teng J, Zhu J, Xuan D, Chen B, Zhao W (2017) Ev-matching: bridging large visual data and electronic data for efficient surveillance. In: Proceedings of the IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 689–698
Matte C, Achara JP, Cunche M (2015) Device-to-identity linking attack using targeted wi-fi geolocation spoofing. In: Proceedings of the 8th ACM conference on security & privacy in wireless and mobile networks. ACM, p 20
Mayer JR, Mitchell JC (2012) Third-party web tracking: policy and technology. In: Proceedings of the IEEE symposium on security and privacy (S&P). IEEE, pp 413–427
Mills D (2006) Computer network time synchronization-the network time protocol. CRC Press, Boca Raton. 304pp
Musa A, Eriksson J (2012) Tracking unmodified smartphones using wi-fi monitors. In: Proceedings of the 10th ACM conference on embedded network sensor systems. ACM, pp 281–294
Myers CS, Rabiner LR (1981) A comparative study of several dynamic time-warping algorithms for connected-word recognition. Bell Syst Tech J 60 (7):1389–1409
Nebehay G, Pflugfelder R (2014) Consensus-based tracking and matching of keypoints for object tracking. In: Proceedings of the IEEE Winter conference on applications of computer vision (WACV)
Nebehay G, Pflugfelder R (2015) Clustering of static-adaptive correspondences for deformable object tracking. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 2784–2791
Nguyen LT, Kim YS, Tague P, Zhang J (2014) Identitylink: user-device linking through visual and rf-signal cues. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing. ACM, pp 529–539
Olejnik L, Minh-Dung T, Castelluccia C (2013) Selling off privacy at auction. <hal-00915249>
Peng P, Shou L, Chen K, Chen G, Wu S (2013) The knowing camera: recognizing places-of-interest in smartphone photos. In: Proceedings of the 36th international ACM SIGIR conference on research and development in information retrieval. ACM, pp 969–972
Peng P, Shou L, Chen K, Chen G, Wu S (2014) The knowing camera 2: recognizing and annotating places-of-interest in smartphone photos. In: Proceedings of the 37th international ACM SIGIR conference on research and development in information retrieval. ACM, pp 707–716
Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: towards real-time object detection with region proposal networks. In: Advances in neural information processing systems, pp 91–99
Shukla D, Kumar R, Serwadda A, Phoha VV (2014) Beware, your hands reveal your secrets!. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM, pp 904–917
Stöber T, Frank M, Schmitt J, Martinovic I (2013) Who do you sync you are?: smartphone fingerprinting via application behaviour. In: Proceedings of the sixth ACM conference on security and privacy in wireless and mobile networks. ACM, pp 7–12
Teng J, Zhu J, Zhang B, Xuan D, Zheng YF (2012) Ev: efficient visual surveillance with electronic footprints. In: Proceedings of the IEEE international conference on computer communications (INFOCOM). IEEE, pp 109–117
Teng J, Zhang B, Zhu J, Li X, Xuan D, Zheng YF (2014) Ev-loc: integrating electronic and visual signals for accurate localization. IEEE/ACM Trans Netw (TON) 22(4):1285–1296
Wang Y, Kankanhalli MS (2015) Tweeting cameras for event detection. In: Proceedings of the 24th international conference on world wide web. ACM, pp 1231–1241
Wang Q, Yahyavi A, Kemme B, He W (2015) I know what you did on your smartphone: inferring app usage over encrypted data traffic. In: Proceedings of the IEEE conference on communications and network security (CNS). IEEE, pp 433–441
Yoon S-H, Park J-S, Kim M-S (2015) Behavior signature for fine-grained traffic identification. Appl Math 9(2L):523–534
Yue Q, Ling Z, Fu X, Liu B, Ren K, Zhao W (2014) Blind recognition of touched keys on mobile devices. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM, pp 1403–1414
Acknowledgements
We thank Yichao Huang at SCUT- HCII Laboratory for discussions and his valuable feedback.
This work was supported in part by National Key R&D Program of China 2017YFB1003000, and 2018YFB0803400, National Natural Science Foundation of China under grants 61502100, 61532013, 61572130, and 61632008, by Jiangsu Provincial Natural Science Foundation of China under grants BK20150637, Jiangsu Provincial Scientific and Technological Achievements Transfer Fund BA2016052, by Jiangsu Provincial Key Laboratory of Network and Information Security under grants BM2003201, by Key Laboratory of Computer Network and Information Integration of Ministry of Education of China under grants 93K-9 and by Collaborative Innovation Center of Novel Software Technology and Industrialization. Any opinions, findings, conclusions, and recommendations in this paper are those of the authors and do not necessarily reflect the views of the funding agencies.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Guo, N., Luo, J., Ling, Z. et al. Your clicks reveal your secrets: a novel user-device linking method through network and visual data. Multimed Tools Appl 78, 8337–8362 (2019). https://doi.org/10.1007/s11042-018-6815-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6815-6