A Novel Attack Methods For Inferring On Certain Url’s On Twitter

M.V.D.Siva Chaitanya Kumar, D.Anil Kumar

Abstract


Twitter is a well-known online informal organization benefit for sharing short messages (tweets) among friends. Its clients regularly utilize URL shortening administrations that give (i) a short false name of a long URL for sharing it by means of tweets and (ii) open snap examination of shortened URLs. People in general snap examination is given in an amassed frame to save the protection of individual clients. In this, we propose functional assault systems construing who clicks which abbreviated URLs on Twitter utilizing the mix of open data: Twitter metadata and public click investigation. Not at all like the customary program history stealing attacks, have our attacks only demanded publicly available information given by Twitter and URL shortening services. Assessment comes about demonstrate that our assault can trade off Twitter clients' protection with high precision.


References


L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography. In Proc. 16th Int’l World Wide Web Conf. (WWW), 2007.

D. boyd, S. Golder, and G. Lotan. Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In Proc. 43rd Hawaii International Conference on System Sciences (HICSS), 2010.

Bugzilla. Bug 57351: css on a:visited can load an image and/or reveal if visitor been to a site, 2000. https://bugzilla.mozilla.org/show bug.cgi?id=57351.

Bugzilla. Bug 147777: visited support allows queries into global history, 2002. https://bugzilla.mozilla.org/show bug.cgi?id=147777.

J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov. “you might also like:†privacy risks of collaborative filtering. In Proc. IEEE Symp. Security and Privacy (S&P), 2011.

A. Chaabane, G. Acs, and M. A. Kaafar. You are what you like! information leakage through users’ interests. In Proc. 19th Network and Distributed System Security Symp. (NDSS), 2012.

Z. Cheng, J. Caverlee, and K. Lee. You are where you tweet: A content-based approach to geo-locating twitter users. In Proc. 19th ACM International Conference on Information and Knowledge Management (CIKM), 2010.

A. Clover. Css visited pages disclosure, 2002. http://seclists.org/bugtraq/2002/Feb/271.

C. Dwork. Di_erential privacy. In Proc. 33rd International Colloquium on Automata, Languages and Programming (ICALP), 2006.

E. W. Felten and M. A. Schneider. Timing attacks on web privacy. In Proc. 7th ACM Conf. Computer and Comm. Security (CCS), 2000.

L. Grangeia. Dns cache snooping or snooping the cache for fun and profit. In SideStepSegurancaDigitial, Technical Report, 2004.

J. He, W. W. Chu, and Z. V. Liu. Inferring privacy information from social networks. In Proc.4th IEEE international conference on Intelligence and Security Informatics (ISI), 2006.

B. Hecht, L. Hong, B. Suh, and E. H. Chi. Tweets from Justin bieber’s heart: The dynamics of the location field in user profiles. In Proc. SIGCHI Conference on Human Factors in Computing Systems

(CHI), 2011.

C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell. Protecting browser state from web privacy attacks. In Proc. 15th Int’l World Wide Web Conf. (WWW), 2006.

M. Jakobsson and S. Stamm. Invasive browser sni_ng and countermeasures. In Proc. 15th Int’l World Wide Web Conf. (WWW), 2006.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â