Beyond the Request: Harnessing HTTP Response Headers for Cross-Browser Web Tracker Classification in an Imbalanced Setting

AI-generated keywords: Device fingerprinting Web trackers Graph analysis Machine learning classifiers Cross-browser performance

AI-generated Key Points

  • Bahrami et al. focused on device fingerprinting to detect web trackers by combining graph analysis with supervised and unsupervised learning.
  • Their method utilized historical JavaScript file data from 2010 to 2019 and achieved high accuracies up to 89.13%.
  • Kalavri et al. achieved over 97% accuracy through neighborhood analysis and label propagation on a bipartite graph representing connections between first-party websites and third-party services.
  • Castell-Uroz et al. proposed a tripartite network graph for identifying third-party tracking resources within first-party websites based on hash value popularity and dirt level correlation.
  • Metwalley et al. developed an unsupervised algorithm that analyzed URL queries and HTTP request headers for tracker identification among Alexa-ranked websites.
  • The study evaluates the cross-browser performance of machine learning classifiers trained on HTTP response headers for web tracker detection, focusing on delineating tracking entities rather than tracking activity.
  • Ten supervised models were trained on Chrome data and tested across Chrome, Firefox, and Brave browsers using data obtained through the T.EX traffic monitoring browser extension, showing high accuracy for Chrome and Firefox but subpar performance for Brave due to distinct data distribution.
  • While promising, real-world application testing of these classifiers is still pending, highlighting the need for further exploration into distinguishing tracker types and broader label sources in future studies.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Wolf Rieder, Philip Raschke, Thomas Cory

Proceedings on Privacy Enhancing Technologies (PoPETs) 1 (2025) 100-117
License: CC BY 4.0

Abstract: The World Wide Web's connectivity is greatly attributed to the HTTP protocol, with HTTP messages offering informative header fields that appeal to disciplines like web security and privacy, especially concerning web tracking. Despite existing research employing HTTP request messages to identify web trackers, HTTP response headers are often overlooked. This study endeavors to design effective machine learning classifiers for web tracker detection using binarized HTTP response headers. Data from the Chrome, Firefox, and Brave browsers, obtained through the traffic monitoring browser extension T.EX, serves as our dataset. Ten supervised models were trained on Chrome data and tested across all browsers, including a Chrome dataset from a year later. The results demonstrated high accuracy, F1-score, precision, recall, and minimal log-loss error for Chrome and Firefox, but subpar performance on Brave, potentially due to its distinct data distribution and feature set. The research suggests that these classifiers are viable for web tracker detection. However, real-world application testing remains pending, and the distinction between tracker types and broader label sources could be explored in future studies.

Submitted to arXiv on 02 Feb. 2024

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2402.01240v3

In recent research, Bahrami et al. focused on device fingerprinting to detect web trackers by combining graph analysis with supervised and unsupervised learning. Their method utilized historical JavaScript file data from 2010 to 2019 and achieved high accuracies up to 89.13%. This was made possible by incorporating temporal aspects and Abstract Syntax Tree-based keyword extraction. Similarly, Kalavri et al. employed a graph-based approach and achieved even higher accuracy of over 97% through neighborhood analysis and label propagation on a bipartite graph representing connections between first-party websites and third-party services. Castell-Uroz et al. proposed a tripartite network graph for identifying third-party tracking resources within first-party websites. They were able to successfully detect new trackers based on hash value popularity and dirt level correlation. On the other hand, Metwalley et al. developed an unsupervised algorithm that analyzed URL queries and HTTP request headers for tracker identification. Their method was successful in identifying new trackers among Alexa-ranked websites. This study aims to address the gap in existing research by evaluating the cross-browser performance of machine learning classifiers trained on HTTP response headers for web tracker detection. The focus is on delineating tracking entities rather than tracking activity, with the definition of trackers contingent upon ground truth labeling in each dataset. The research methodology includes training ten supervised models on Chrome data and testing them across Chrome, Firefox, and Brave browsers using data obtained through the T.EX traffic monitoring browser extension. Results showed high accuracy, F1-score, precision, recall for Chrome and Firefox but subpar performance for Brave due to distinct data distribution. While these classifiers show promise for web tracker detection, real-world application testing is still pending. Overall, this study contributes to the advancement of machine learning approaches in detecting web trackers while highlighting the need for further exploration into distinguishing tracker types and broader label sources in future studies.
Created on 17 Nov. 2025

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.