From http://link.springer.com/chapter/10.1007/978-3-319-11379-1_9: From the paper: Most of the security products involved are given anonymous identifiers instead of their real names. Paper download: hxxp://ids.cs.columbia.edu/sites/default/files/boggs_driveby_paper81.pdf .