A Novel Attack Methods For Inferring On Certain Url’s On Twitter

Abstract

Twitter is a well-known online informal organization benefit for sharing short messages (tweets) among friends. Its clients regularly utilize URL shortening administrations that give (i) a short false name of a long URL for sharing it by means of tweets and (ii) open snap examination of shortened URLs. People in general snap examination is given in an amassed frame to save the protection of individual clients. In this, we propose functional assault systems construing who clicks which abbreviated URLs on Twitter utilizing the mix of open data: Twitter metadata and public click investigation. Not at all like the customary program history stealing attacks, have our attacks only demanded publicly available information given by Twitter and URL shortening services. Assessment comes about demonstrate that our assault can trade off Twitter clients' protection with high precision.

Authors and Affiliations

M. V. D. Siva Chaitanya Kumar| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, D. Anil Kumar| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi

Keywords

Related Articles

Implementation of Health Care Monitoring System using low power MCU’s and ARM CORTEX A8

The present common goal in the medical information technology is the design and implementation of telemedicine solutions, which provides a reliable and quality of services to patients. With the advent of recent devel...

Mobile Ad Hoc Networks Authentication Using Npv Method

NPV (Neighbour Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Suc...

Accountability in the Design Phase of a Data Transfer Infrastructure

We propose a novel response for cross-site cold-start thing recommendation, which expects to we demonstrate a nonspecific data parentage structure LIME for data stream over various components that take two trademark,...

Design And Implementation of Modular Multilevel Inverter With Reduced Number Of Components

In this paper, utilizing H-connect topology a general course multilevel inverter for the execution of 49th level inverter and another calculation in producing all voltage levels for a 49th level with less number of dc...

We propose a STP proof conspire named SpatialTemporal provenance Assurance with Mutual Proofs (STAMP). STAMP goes for guaranteeing the uprightness and non-transferability of the STP proofs, with the capacity of ensuri...

Download PDF file
  • EP ID EP16930
  • DOI -
  • Views 311
  • Downloads 7

How To Cite

M. V. D. Siva Chaitanya Kumar, D. Anil Kumar (2017). A Novel Attack Methods For Inferring On Certain Url’s On Twitter. International Journal of Science Engineering and Advance Technology, 5(5), 460-462. https://europub.co.uk./articles/-A-16930