RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Tr. SPIIRAN, 2020 Issue 19, volume 2, Pages 446–474 (Mi trspy1105)

Digital Information Telecommunication Technologies

Identification of subscriber terminals of infocommunication networks based on the model of forming images in modern computer systems

K. Sazonov, M. Tatarka, A. Tsyganov, V. Bessolcev

Mozhaisky Military Space Academy

Abstract: One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks.
The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained.
The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated.
The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases.
Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem.
In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed.
Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.

Keywords: identification, imaging model, subscriber terminal, digital fingerprint, deanonymization.

UDC: 004.93

Received: 14.10.2019

DOI: 10.15622/sp.2020.19.2.8



© Steklov Math. Inst. of RAS, 2024