People rely on the Internet for services from entertainment to healthcare. Internet connectivity is becoming increasingly essential in people’s lives. But people are not invisible on the internet. Their activities are tracked by web site owners and service providers using various technologies and techniques. In response to this issue, many tools and services have been developed that aim to block online tracking. Using the CNAME field of a website’s DNS records to mask the true destination of a URL is one of the latest techniques that trackers are using to bypass anti-tracking measures. This technique, called CNAME cloaking, makes it difficult to separate tracking services from regular web traffic. This study seeks to understand the current trends of CNAME cloaking use for tracking, its effectiveness against anti-tracking tools and methods to identify instances of its use. To learn about these trends, we crawled the top 100 sites in the Tranco list using a software tool called OpenWPM and collected data on all of the URL requests that were made and all DNS responses received during each site visit. The crawls were performed at on different days of the week, using both a default configuration of the Firefox web browser and one with uBlock Origin installed. The results were then compared and processed to identify trends. The contributions made by this study are: providing a study of the current trend of CNAME cloaking used for tracking, identifying the impact of time and anti-tracking tools on website activity, and examining the approach to identifying CNAME cloaking based tracking instances used by the Safari web browser.
A Study of CNAME Cloaking and Online Tracking
Category
Computer Science