Secure Browser-Based Instant Messaging

Total Page:16

File Type:pdf, Size:1020Kb

Secure Browser-Based Instant Messaging Brigham Young University BYU ScholarsArchive Theses and Dissertations 2012-09-22 Secure Browser-Based Instant Messaging Christopher Douglas Robison Brigham Young University - Provo Follow this and additional works at: https://scholarsarchive.byu.edu/etd Part of the Computer Sciences Commons BYU ScholarsArchive Citation Robison, Christopher Douglas, "Secure Browser-Based Instant Messaging" (2012). Theses and Dissertations. 3372. https://scholarsarchive.byu.edu/etd/3372 This Thesis is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of BYU ScholarsArchive. For more information, please contact [email protected], [email protected]. Secure Browser-Based Instant Messaging Christopher D. Robison A thesis submitted to the faculty of Brigham Young University in partial fulfillment of the requirements for the degree of Master of Science Kent E. Seamons, Chair Daniel M. A. Zappala Sean C. Warnick Department of Computer Science Brigham Young University December 2012 Copyright c 2012 Christopher D. Robison All Rights Reserved ABSTRACT Secure Browser-Based Instant Messaging Christopher D. Robison Department of Computer Science, BYU Master of Science Instant messaging is a popular form of communication over the Internet. Statistics show that instant messaging has overtaken email in popularity. Traditionally, instant messaging has consisted of a desktop client communicating with other clients via an instant messaging service provider. However, instant messaging solutions are starting to become available in the web browser{services like Google Talk, Live Messenger and Facebook. Despite the work done by researchers to secure instant messaging networks, little work has been done to secure instant messaging in the browser. We present secure browser-based instant messaging overlays as a means to enable convenient, secure communication in existing browser-based instant messaging interfaces. Additionally, we present a prototype implementation of the secure messaging overlays and the results of two user studies{the first study focusing on user interest in secure chat and the second being a usability study of the prototype. Keywords: secure instant messaging, secure chat, Facebook Chat, Private Facebook Chat ACKNOWLEDGMENTS Marci's love, patience, and help inspired me throughout the entire thesis process. Dr. Seamons's thoughtful advice and reviews greatly contributed to the concepts on which the thesis is built, as well as to this document itself. Internet Security Research lab provided the foundation and initial ideas on which to build. Brigham Young University - made possible by its owners and donors - made the ideal learning environment. Thank you, all. Table of Contents 1 Introduction 1 1.1 The Problem . 2 1.2 Secure Overlays . 3 2 Related Work 5 2.1 Challenges . 5 2.2 Off-the-Record Messaging . 5 2.3 Key Exchange . 6 2.4 Other Systems . 7 3 User Survey 8 3.1 Description . 8 3.2 Chat Systems . 8 3.3 Transmitted Information . 9 3.4 Privacy . 13 4 Design and Architecture 16 4.1 Goals . 16 4.1.1 Usability . 16 4.1.2 Bootstrapping . 17 4.1.3 Confidentiality . 17 4.2 Architecture . 18 4.2.1 Key Management . 18 iv 4.2.2 Client Overlays . 19 4.2.3 Service Provider . 19 4.2.4 Client Proxy . 20 4.3 Threat Model . 20 5 Implementation 22 5.1 Walk-through . 22 5.2 The Client . 27 5.2.1 PFC Website . 27 5.2.2 Bookmarklet . 27 5.2.3 In-Page Services . 29 5.2.4 Window Services . 30 5.2.5 Messages . 31 5.3 The Key Server . 32 6 Usability Study 35 6.1 Task #1 . 35 6.2 Task #2 . 37 6.3 Task #3 . 38 6.4 Task #4 . 40 6.5 Task #5 . 40 6.6 Follow-up . 41 6.7 Summary . 43 7 Threat Analysis 45 7.1 Secure Content Disclosure . 45 7.2 Authentication Vulnerabilities . 46 7.3 Content Swapping . 47 7.4 Successful Message Modifying . 47 v 7.5 Denial of Service . 47 7.6 Malicious Links . 48 8 Conclusion 49 8.1 Contributions . 49 8.2 Summary of Findings . 49 8.3 Future work . 51 8.3.1 Formalize Secure Overlay APIs for Service Providers . 51 8.3.2 Multi-factor Authentication . 51 8.3.3 Usability . 51 References 52 A Initial user survey 55 B Usability study 60 B.1 Demographics . 60 B.2 Instructions . 61 B.3 Task #1 . 61 B.3.1 Preparation . 61 B.3.2 Scenario . 61 B.3.3 Questions . 61 B.4 Task #2 . 62 B.4.1 Preparation . 62 B.4.2 Scenario . 63 B.4.3 Questions . 63 B.5 Task #3 . 63 B.5.1 Preparation . 63 B.5.2 Scenario . 63 vi B.5.3 Questions . 63 B.6 Task #4 . 64 B.6.1 Preparation . 64 B.6.2 Scenario . 64 B.6.3 Questions . 64 B.7 Task #5 . 65 B.7.1 Preparation . 65 B.7.2 Scenario . 65 B.7.3 Questions . 65 B.8 Follow-up Questions . 66 vii Chapter 1 Introduction Instant messaging is a convenient form of communication. Each year the instant messaging user base grows by 200 million. In 2004, a published report showed that the volume of instant messages surpassed email as the preferred communication medium on the Internet. The market has become saturated with various desktop clients to provide easy instant messaging access. Over the last 5 years, instant messaging usage has moved away from desktop clients to web-based clients. In 2005, Google launched its Google Talk platform, which was primarily web-based and integrated with Gmail. In 2010, Microsoft launched a new Windows Live Mail platform, which includes a web-based Live Messenger client. These solutions are convenient as they provide a one-stop shop for email and instant messaging. However, a recent report shows that users are shifting away from the email/instant messaging mash-ups and moving to online social networks as their primary communication platform.1 Social networks provide a handy interface for users to peruse through the happenings of others' lives and actively instant message at the same time. According to one survey, most teenagers now only instant message when logged into a social networking website. Although convenient, social networks (i.e., Facebook) have been criticized for their lax attitudes towards the privacy of user data. 1Email Statistics Report, 2009-2013, http://www.radicati.com/?p=3229 1 1.1 The Problem One of the problems with browser-based instant messaging applications is the lack of true end-to-end privacy between users. Although work has been done to create end-to-end privacy for desktop clients, web-based clients remain at the mercy of those hosting the service. There are four components to web-based instant messaging systems: service providers, client proxies, browser clients and the underlying network. Each presents complex privacy issues. Service providers facilitate the transport of messages from one user to another. A service provider can read every message traversing its system. Google Talk, for example, archives all conversations in Google's Gmail. The text of these archived messages is then mined to provide better AdSense marketing. In addition to reading messages, a service provider can also impersonate a user. For example, suppose Alice works for the messaging services division of Google and Bob is an average user of those messaging services. Alice wants to phish for information from Bob's friends. Because Alice has direct access to the internal workings of the messaging service, she can impersonate Bob and begin conversations with Bob's friends. Bob's friends will not know that it is actually Alice that is talking with them. Web browsers are a mature technology that provide a window into the vast data repositories and applications of the Internet. All major browsers have been exploited through web sites specifically designed to take advantage of them. A browser also has access to the user data on the machine on which it is running as well as the input given by the user, which could be used for malicious purposes. Because web browsers communicate with web servers over the stateless HTTP protocol, a client proxy is needed. A client proxy is a program that runs outside of the context of web server; it creates a persistent connection to the service provider. Client proxies are given users' credentials in order to impersonate them. There are many online, browser-based services (i.e. Meebo, ILoveIM, eBuddy, KoolIM) that aggregate and proxy the use of many 2 different popular instant messaging services. As with the service providers, client proxies can read every instant message it receives. Even if we could trust the.
Recommended publications
  • Instant Messaging Market, 2009-2013 Executive Summary
    THE RADICATI GROUP, INC. A TECHNOLOGY MARKET RESEARCH FIRM 1900 EMBARCADERO ROAD, SUITE 206. • PALO ALTO, CA 94303 TEL. 650 322-8059 • FAX 650 322-8061 Instant Messaging Market, 2009-2013 Editor: Sara Radicati, Ph.D; Principal Analyst: Todd Yamasaki SCOPE This study examines the market for Instant Messaging (IM) solutions from 2009 to 2013. It provides extensive data regarding current installed base, broken out by region, business size, and other variables, including four year forecasts. This report also examines IM solution features, business strategies, plus product strengths and weaknesses. All market numbers, such as market size, forecasts, installed base, and any financial information presented in this study represent worldwide figures, unless otherwise indicated. All pricing numbers are expressed in $USD. METHODOLOGY The information and analysis in this report is based on primary research conducted by The Radicati Group, Inc. It consists of information collected from vendors, and users within global corporations via interviews and surveys. Secondary research sources have also been used, where appropriate, to cross-check the information collected. These include company annual reports and market size information from various market segments of the computer industry. EUROPE: 29E FITZJOHNS AVE • LONDON NW3 5JY • TEL. +44 (0)207 794 4298 • FAX. +44 (0)207 431 9375 e-mail: [email protected] http://www.radicati.com Instant Messaging Market, 2009-2013 – Executive Summary EXECUTIVE SUMMARY EXECUTIVE SUMMARY This study looks at the Instant Messaging market as comprising four different market segments: o Public IM networks – This segment includes free IM services which primarily target consumers, but are also prevalent amongst business users.
    [Show full text]
  • Survey of Instant Messaging Applications Encryption Methods
    Avrupa Bilim ve Teknoloji Dergisi European Journal of Science and Technology Cilt. 2, No. 4, S. 112-117, Haziran 2015 Vol. 2, No. 4, pp. 112-117, June 2015 © Telif hakkı EJOSAT’a aittir Copyright © 2014 EJOSAT Araştırma Makalesi www.ejosat.com ISSN:2148-2683 Research Article Survey of Instant Messaging Applications Encryption Methods Abdullah Talha Kabakus1*, Resul Kara2 1 Abant Izzet Baysal University, IT Center, 14280, Bolu, Turkey 2 Duzce University, Faculty of Engineering, Department of Computer Engineering, 81620, Duzce, Turkey (First received 15 February 2015 and in final form 29 May 2015) Abstract Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, and contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Realization (GSM), they are free to use and they only require internet connection which is the most common way of communication today. The critical point here is providing privacy of these messages in order to prevent any vulnerable points for hackers and cyber criminals. According to the latest research by PricewaterhouseCoopers, percentage of global cyber attacks is increased to 48% with 42.8 million detected incidents. Another report that is published by security company Postini indicates that 90% of instant messaging targeted threats are highly destructive worms. In this study, instant messaging applications encryption methods are comparatively presented.
    [Show full text]
  • Guess Who's Texting You? Evaluating the Security of Smartphone
    Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Fruhwirt,¨ Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl SBA Research gGmbH Vienna, Austria (1stletterfirstname)(lastname)@sba-research.org Abstract been the subject of an ample amount of past research. The common advantages of the tools we examined lie in In recent months a new generation of mobile messag- very simple and fast setup routines combined with the possi- ing and VoIP applications for smartphones was introduced. bility to incorporate existing on-device address books. Ad- These services offer free calls and text messages to other ditionally these services offer communication free of charge subscribers, providing an Internet-based alternative to the and thus pose a low entry barrier to potential customers. traditional communication methods managed by cellular However, we find that the very design of most of these mes- network carriers such as SMS, MMS and voice calls. While saging systems thwarts their security measures, leading to user numbers are estimated in the millions, very little atten- issues such as the possibility for communication without tion has so far been paid to the security measures (or lack proper sender authentication. thereof) implemented by these providers. The main contribution of our paper is an evaluation of the In this paper we analyze nine popular mobile messaging security of mobile messaging applications with the afore- and VoIP applications and evaluate their security models mentioned properties and the possibilities of abuse in real- with a focus on authentication mechanisms. We find that a world scenarios.
    [Show full text]
  • Case No COMP/M.6281 - MICROSOFT/ SKYPE
    EN Case No COMP/M.6281 - MICROSOFT/ SKYPE Only the English text is available and authentic. REGULATION (EC) No 139/2004 MERGER PROCEDURE Article 6(1)(b) NON-OPPOSITION Date: 07/10/2011 In electronic form on the EUR-Lex website under document number 32011M6281 Office for Publications of the European Union L-2985 Luxembourg EUROPEAN COMMISSION Brussels, 07/10/2011 C(2011)7279 In the published version of this decision, some information has been omitted pursuant to Article MERGER PROCEDURE 17(2) of Council Regulation (EC) No 139/2004 concerning non-disclosure of business secrets and other confidential information. The omissions are shown thus […]. Where possible the information omitted has been replaced by ranges of figures or a general description. PUBLIC VERSION To the notifying party: Dear Sir/Madam, Subject: Case No COMP/M.6281 - Microsoft/ Skype Commission decision pursuant to Article 6(1)(b) of Council Regulation No 139/20041 1. On 02.09.2011, the European Commission received notification of a proposed concentration pursuant to Article 4 of the Merger Regulation by which the undertaking Microsoft Corporation, USA (hereinafter "Microsoft"), acquires within the meaning of Article 3(1)(b) of the Merger Regulation control of the whole of the undertaking Skype Global S.a.r.l, Luxembourg (hereinafter "Skype"), by way of purchase of shares2. Microsoft and Skype are designated hereinafter as "parties to the notified operation" or "the parties". I. THE PARTIES 2. Microsoft is active in the design, development and supply of computer software and the supply of related services. The transaction concerns Microsoft's communication services, in particular the services offered under the brands "Windows Live Messenger" (hereinafter "WLM") for consumers and "Lync" for enterprises.
    [Show full text]
  • RELEASE NOTES UFED PHYSICAL ANALYZER, Version 5.0 | March 2016 UFED LOGICAL ANALYZER
    NOW SUPPORTING 19,203 DEVICE PROFILES +1,528 APP VERSIONS UFED TOUCH, UFED 4PC, RELEASE NOTES UFED PHYSICAL ANALYZER, Version 5.0 | March 2016 UFED LOGICAL ANALYZER COMMON/KNOWN HIGHLIGHTS System Images IMAGE FILTER ◼ Temporary root (ADB) solution for selected Android Focus on the relevant media files and devices running OS 4.3-5.1.1 – this capability enables file get to the evidence you need fast system and physical extraction methods and decoding from devices running OS 4.3-5.1.1 32-bit with ADB enabled. In addition, this capability enables extraction of apps data for logical extraction. This version EXTRACT DATA FROM BLOCKED APPS adds this capability for 110 devices and many more will First in the Industry – Access blocked application data with file be added in coming releases. system extraction ◼ Enhanced physical extraction while bypassing lock of 27 Samsung Android devices with APQ8084 chipset (Snapdragon 805), including Samsung Galaxy Note 4, Note Edge, and Note 4 Duos. This chipset was previously supported with UFED, but due to operating system EXCLUSIVE: UNIFY MULTIPLE EXTRACTIONS changes, this capability was temporarily unavailable. In the world of devices, operating system changes Merge multiple extractions in single unified report for more frequently, and thus, influence our support abilities. efficient investigations As our ongoing effort to continue to provide our customers with technological breakthroughs, Cellebrite Logical 10K items developed a new method to overcome this barrier. Physical 20K items 22K items ◼ File system and logical extraction and decoding support for iPhone SE Samsung Galaxy S7 and LG G5 devices. File System 15K items ◼ Physical extraction and decoding support for a new family of TomTom devices (including Go 1000 Point Trading, 4CQ01 Go 2505 Mm, 4CT50, 4CR52 Go Live 1015 and 4CS03 Go 2405).
    [Show full text]
  • Ebuddy Software for Nokia 6300
    Ebuddy software for nokia 6300 click here to download Chat on MSN, Facebook, Yahoo!, GTalk (Orkut), AIM, MySpace and ICQ. Get the most popular free chat app on your phone, with more than million. eBuddy Messenger - Chat on Facebook, MSN, Yahoo!, Orkut (Google Talk), AIM, ICQ & MySpace. Get the most popular free IM app on your. eBuddy - EBuddy is samsung s for Nokia Free Download. Max99 is a global community software that lets you keep in touch. Get free downloadable EBuddy Nokia Java Apps for your mobile device. Free mobile Latest version of eBuddy Mobile Messenger with several bug fixes . Facebook chat messenger for mobile nokia All Manuals online it Chat flirt Apps Stay mais 1 install 1 on Software any Nokia EBuddy. Now you can Chat with your Friends on the Biggest Social Network In the World on your Mobile for Nokia Free App Download. Java ebuddy mobile nokia. On nokia ,sms chat nokia free,nokia c facebook chat software. Ebuddy facebook messenger downloader mobile nokia I use a Nokia that I recently downloaded Ebuddy I buy, I also of CI, but when I run the application Ebuddy, an error message and tell. Hi i have a nokia and i have recently downloaded and installed Ebuddy mobile messenger version but when i lauch it, my mobile. ebuddy messenger for Download, ebuddy messenger for, ebuddy messenger for free download, free mp3 music pic monkey photo nokia space. Facebook Messenger latest version: Official Facebook chat app for Nokia S Facebook Messenger (Nokia Series 40) eBuddy Mobile Messenger. Send free text messages with WhatsApp on your Nokia phone .
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • Strategic Performance Measurement for Ebuddy
    Strategic performance measurement for eBuddy May 2007 Graduation thesis of: V.J.M. Hoogsteder Student number 9901795 Business Information Technology Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) University of Twente [email protected] +31 (0) 6 16 376 233 On behalf of: eBuddy Keizersgracht 585 1017 DR Amsterdam +31 (0) 20 514 1430 Under supervision of: P. Bliek (University of Twente, School of Management and Governance, NIKOS group) L. Bodenstaff (University of Twente, faculty of EEMCS, Information Systems group) J.J. Rueb (CEO eBuddy) 1 Management summary Motivation eBuddy management wants to define and implement strategic performance measurement to improve strategic decision making by reducing the necessary time to support decisions and by gaining a solid and complete view on eBuddy’s strategic performance. Recommendations 1) Assess strategic performance with the strategic performance measures identified in eBuddy’s balanced scorecard, as defined in this research; 2) Assign a responsible employee for monthly reporting of the balanced scorecard; 3) Update the balanced scorecard based on changes in strategic objectives; 4) Define desired employee skills and measure these in the balanced scorecard; 5) Develop an information system to present the defined strategic performance measures; 6) Involve business unit directors in strategic performance assessment; 7) Use the balanced scorecard to facilitate problem solving and action planning. Argumentation 1) The eBuddy balanced scorecard is defined according to Kaplan & Norton’s model (Kaplan & Norton 1996). This model provides a comprehensive set of guidelines for definition and implementation of strategic performance measurement and is supported by extensive literature attention. The steps taken towards the definition and implementation of eBuddy’s balanced scorecard were based on the roadmap identified by Assiri et al.
    [Show full text]
  • 3000 Applications
    Uila Supported Applications and Protocols updated March 2021 Application Protocol Name Description 01net.com 05001net plus website, is a Japanese a French embedded high-tech smartphonenews site. application dedicated to audio- 050 plus conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also classifies 10086.cn the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese cloudweb portal storing operated system byof theYLMF 115 Computer website. TechnologyIt is operated Co. by YLMF Computer 115.com Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr ThisKorean protocol shopping plug-in website classifies 11st. the It ishttp operated traffic toby the SK hostPlanet 123people.com. Co. 123people.com Deprecated. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt ChineseLithuanian web news portal portal 163. It is operated by NetEase, a company which pioneered the 163.com development of Internet in China. 17173.com Website distributing Chinese games. 17u.com 20Chinese minutes online is a travelfree, daily booking newspaper website. available in France, Spain and Switzerland. 20minutes This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Checkout (acquired by Verifone) provides global e-commerce, online payments 2Checkout and subscription billing solutions.
    [Show full text]
  • Evaluating the Security of Smartphone Messaging Applications
    TelcoSecDay @ Troopers � 3/20/12 � Heidelberg, Germany Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser SBA Research, Vienna, Austria Source: path.com address book-gate android.permission.READ_CONTACTS android.permission.READ_CALENDAR android.permission.INTERNET Analyzing network traffic of smartphones • Data flow analysis • Security evaluation • Example: Smartphone Messengers Smartphone Messaging • Aim at replacing traditional text messaging (SMS) and GSM/CDMA/3G calls • Free phone calls and text messages over the Internet • Novel authentication concept • Phone number used as single authenticating identifier Internet Telecom infrastructure Motivation Traditional SMS/talk Messenger/VoIP Apps Protocol proprietary HTTP(S), XMPP cryptographically sound application depended, much Security authentication weaker authentication (SIM card) (phone number, IMSI, UDID) Users’ SMS/talk perception Evaluation Authentication Mechanism and Account Hijacking Sender ID Spoofing / Message Manipulation Unrequested SMS / phone calls User Enumeration Modifying Status Messages Experimental Setup • Samsung Nexus S running Android 2.3.3 and Apple iPhone 4 running iOS 4.3.3 • SSL proxy to read encrypted HTTPS traffic Phone SSL-Interception Server • Used to understand the protocol, not for the actual attack (i.e., MITM between victim and server)! Certificates? WhatsApp eBuddy XMS WowTalk Viber HeyTell Forfone Voypi Tango EasyTalk WhatsApp Paper: Guess who’s texting you? Evaluating the Security of Smartphone Messaging Applications Schrittwieser, S., Frühwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., Weippl, E., NDSS 2012 WhatsApp • Instant Messaging • Status messages • 23+ million users worldwide (estimation) • > 1 billion messages per day • Clients available for Android, iOS, Symbian and Blackberry Authentication in WhatsApp 1. (HTTPS): Phone number 2. (SMS): Code SMS Proxy 3.
    [Show full text]
  • Online Identifiers in Everyday Life
    © 2010 by Benjamin M. Gross. All rights reserved. ONLINE IDENTIFIERS IN EVERYDAY LIFE BY BENJAMIN M. GROSS DISSERTATION Submied in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Library and Information Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2010 Urbana, Illinois Doctoral Commiee: Associate Professor Michael Twidale, Chair Professor Geof Bowker, University of Pisburgh Professor Chip Bruce Associate Professor Ann Bishop Abstract Identifiers are an essential component of online communication. Email addresses and instant messenger usernames are two of the most common online identi- fiers. is dissertation focuses on the ways that social, technical and policy fac- tors affect individual’s behavior with online identifiers. Research for this dissertation was completed in two parts, an interview-based study drawn from two populations and an examination of the infrastructure for managing identifiers in two large consumer services. e exploratory study ex- amines how individuals use online identifiers to segment and integrate aspects of their lives. e first population is drawn from employees of a financial ser- vice firm with substantial constraints on communication in the workplace. e second population is drawn from a design firm with minimal constraints on com- munication. e two populations provide the opportunity to explore the social, technical, and policy issues that arise from diverse communication needs, uses, strategies, and technologies. e examination of systems focuses on the infras- tructure that Google and Yahoo! provide for individuals to manage their iden- tifiers across multiple services, and the risks and benefits of employing single sign-on systems.
    [Show full text]
  • Classification of Internet Video Traffic Using Multi-Fractals Pingping TANG1,2, Yuning DONG1, Zaijian WANG 2, Lingyun YANG 1 1
    Classification of Internet Video Traffic Using multi-Fractals Pingping TANG1,2, Yuning DONG1, Zaijian WANG 2, Lingyun YANG 1 1. College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China. 210003 2. College of Physics and Electronic Information, Anhui Normal University, Wuhu, China. 2410002 e-mail: [email protected]; [email protected]; [email protected]; [email protected] Abstract—Video traffic is booming in the Internet, and the machine (SVM), decision tree, or neural network, etc. types of video traffic are numerous. So it is necessary and The above methods have achieved some preliminary results. imminent to effectively classify video traffic. The existing methods For example, Literature [7] was concentrating on classifying of classifying video traffic depend heavily on extracted features, P2P-TV with SVM, in which the extracted feature is the which are statistically accessed from given samples, and thus are destined to be ineffective for other types of video traffic. Therefore, number of packets during a given period of time and then in this paper, we propose a novel classification method based on P2P-TV is divided into four categories: PPlive, Sop Cast, the theory of multi-fractals, and it relies on fractal characteristics TVAnts and Joost. Literature [8] provided deeper insight into rather than statistical features to classify video traffic. A number Skype flows by utilizing active and passive technology; then bit of experiments are performed to demonstrate the feasibility of the rate, interval time of packets and size of packets are designated proposed method and its adaptability to new environments.
    [Show full text]