Repositori Institusi

Politeknik Siber dan Sandi Negara

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Analisis eksplorasi browser fingerprint pada online anonymity internet browser, proxy, VPN, dan TOR
Bookmark Share

Text

Analisis eksplorasi browser fingerprint pada online anonymity internet browser, proxy, VPN, dan TOR

Bimo Setyo Husodo - Personal Name; Jeckson Sidabutar - Personal Name; Setiyo Cahyono - Personal Name; Amiruddin - Personal Name;

Pada era teknologi informasi, tren pemanfaatan website untuk mengiklankan produk sangat banyak dilakukan. Untuk meningkatkan user experience, pemilik website biasa melakukan personalisasi pengunjung website dengan cara menggunakan Third-party Tracker. Third-party Tracker bekerja dengan cara mencatat mengenai informasi penjelajahan browser serta informasi device saat user mengunjungi website. Pada proses tracking yang dilakukan, Third-party Tracker menggunakan browser fingerprint sebagai sumber informasi. Banyaknya tracking yang dilakukan oleh pemilik website terhadap aktivitas pengunjung website mengakibatkan munculnya ancaman terhadap privasi data pengguna internet. Hal tersebut diperburuk dengan adanya penelitian yang menyatakan bahwa browser fingerprint juga digunakan oleh para pelaku kriminal untuk profil scanning guna mendapatkan informasi awal dari target korban kejahatan siber. Salah satu cara untuk meminimalisir tracking oleh website yaitu dengan menyembunyikan IP address atau biasa disebut menggunakan anonymity layanan internet. Saat ini terdapat empat teknik yang sering digunakan oleh user untuk melakukan online anonymity yaitu menggunakan mode anonim pada internet browser, proxy, VPN, dan TOR. Pada penelitian ini digunakan analisis eksplorasi untuk mengetahui browser fingerprint yang dapat diblokir, di-spoofing, serta yang masih dapat terdeteksi dari empat teknik online anonymity, sedangkan untuk mengetahui ancaman dari browser fingerprint digunakan studi literatur. Hasil analisis eksplorasi browser fingerprint dari empat teknik online anonymity dengan sampel tiga puluh device menunjukan bahwa rata-rata device dengan browser fingerprint dapat dideteksi oleh www.deviceinfo.me yaitu sebanyak 28 device pada Chrome mode incognito, enam belas device pada Proxy, lima belas device pada VPN, dan lima device pada TOR. Berdasarkan data diatas dapat disimpulkan bahwa dari empat teknik online anonymity, hanya teknik online anonymity TOR yang terbukti mampu mengatasi pencatatan browser fingerprint. --

In the era of information technology, the trend of using websites to advertise products is very much done. To improve the user experience, website owners usually personalize website visitors using a third-party tracker. Third-party trackers record information about browser searches and device information when users visit websites. Third-party Tracker uses a browser fingerprint as a source of information in the tracking process. The amount of tracking carried out by website owners on the activities of website visitors results in the emergence of a threat to the privacy of internet user data. It is exacerbated by research stating that criminals also use fingerprint browsers for profile scanning to obtain initial information from cybercrime victims. One way to minimize website tracking is to hide the IP address, commonly referred to as using the anonymity of internet services. Currently, users often use four techniques to perform online anonymity, namely using anonymous mode on internet browsers, proxies, VPN, and TOR. This study used exploratory analysis to determine browser fingerprints that could be blocked, spoofed, and still detectable from four online anonymity techniques, while literature studies were used to determine the threat from browser fingerprints. The results of the browser fingerprint exploration analysis of four online anonymity techniques with a sample of thirty devices show that the average device with a browser fingerprint can be detected by www.deviceinfo.me, namely 28 devices in Chrome incognito mode, sixteen devices on Proxy, fifteen devices on VPN, and five devices on TOR. Based on the data above, it can be guaranteed that of the four online anonymity techniques, only the TOR online anonymity technique is proven to be able to manage browser fingerprinting.


Availability

No copy data

Detail Information
Series Title
-
Call Number
2022 BIM a
Publisher
Bogor : Poltek SSN., 2022
Collation
xiii, 46 hlm.
Language
Indonesia
ISBN/ISSN
--
Classification
--
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
VPN
browser fingerprint
online anonymity
web tracking
Proxy
TOR.
Specific Detail Info
-
Statement of Responsibility
Bimo Setyo Husodo
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Repositori Institusi
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?