SlideShare a Scribd company logo
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS
USING PUBLIC CLICK ANALYTICS AND TWITTER METADATA
ABSTRACT:
Twitter is a popular online social network service for sharing short messages
(tweets) among friends. Its users frequently use URL shortening services that
provide (i) a short alias of a long URL for sharing it via tweets and (ii) public
click analytics of shortened URLs. The public click analytics is provided in an
aggregated form to preserve the privacy of individual users. In this paper, we
propose practical attack techniques inferring who clicks which shortened URLs
on Twitter using the combination of public information: Twitter metadata and
public click analytics. Unlike the conventional browser history stealing attacks,
our attacks only demand publicly available information provided by Twitter
and URL shortening services. Evaluation results show that our attack can
compromise Twitter users’ privacy with high accuracy.
CONCLUSION
In this paper, we proposed inference attacks to infer which shortened URLs
clicked on by a target user. All the information needed in our attacks is public
information: the click analytics of URL shortening services and Twitter
metadata. To evaluate our attacks, we crawled and monitored the click
analytics of URL shortening services and Twitter data. Throughout the
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
experiments, we have shown that our attacks can infer the candidates in most
cases.
REFERENCES
[1] L. Backstrom, C. Dwork, and J. Kleinberg, “Wherefore art thou r3579x?
anonymized social networks, hidden patterns, and structural steganography,”
in Proc. 16th Int. World Wide Web Conf., 2007, pp. 181–190.
[2] D. Boyd, S. Golder, and G. Lotan, “Tweet, tweet, retweet: Conversational
aspects of retweeting on twitter,” in Proc. 43rd Hawaii Int. Conf. Syst. Sci.,
2010, pp. 1–10.
[3] Bugzilla. (2000). Bug 57351: css on a:visited can load an image and/or
reveal if visitor been to a site. [Online]. Available:
https://bugzilla.mozilla.org/show_bug.cgi? id=57351
[4] Bugzilla. (2002). Bug 147777: visited support allows queries into global
history. [Online]. Available: https://bugzilla.
mozilla.org/show_bug.cgi?id=147777
[5] J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov,
““You might also like:” Privacy risks of collaborative filtering,” in Proc. IEEE
Symp. Secur. Privacy, 2011, pp. 231–246.
[6] A. Chaabane, G. Acs, and M. A. Kaafar, “You are what you like! Information
leakage through users’ interests,” in Proc. 19th Network and Distributed
System Security Symp., 2012.
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
[7] Z. Cheng, J. Caverlee, and K. Lee, “You are where you tweet: A content-
based approach to geo-locating twitter users,” in Proc. 19th ACM Int. Conf.
Inform. Knowl. Manage., 2010, pp. 759–768.
[8] A. Clover. (2002). Css visited pages disclosure. [Online]. Available:
http://seclists.org/bugtraq/2002/Feb/271
[9] C. Dwork, “Differential privacy,” in Proc. 33rd Int. Colloquium Automata,
Languages Programm., Springer Berlin Heidelberg, 2006. pp. 1–12.
[10] E. W. Felten and M. A. Schneider, “Timing attacks on web privacy,” in Proc.
7th ACM Conf. Comput. Comm. Secur. (CCS), 2000, pp. 25–32. [11] L. Grangeia,
“Dns cache snooping or snooping the cache for fun and profit,” in SideStep
Seguranca Digitial, Tech. Rep., (2004), [Online]. Available:
http://www.rootsecure.net/content/downloads/pdf/dns_cache_snooping.pdf.

More Related Content

PDF
Inference attack on browsing history of twitter users using public click anal...
PDF
Privacy and Security in Online Social Media : Trust and Credebillity on OSM
PDF
Week 8.2 Anonymous Networks
PPTX
Webinar: eCommerce Compliance - PCI meets GDPR
ODP
News construction from microblogging posts using open data
PDF
Week 6.2: eCrime
PDF
Week 7.1 Link Farming
PDF
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Inference attack on browsing history of twitter users using public click anal...
Privacy and Security in Online Social Media : Trust and Credebillity on OSM
Week 8.2 Anonymous Networks
Webinar: eCommerce Compliance - PCI meets GDPR
News construction from microblogging posts using open data
Week 6.2: eCrime
Week 7.1 Link Farming
Flaws in Oauth 2.0 Can Oauth be used as a Security Server

Viewers also liked (20)

PPTX
Click Analytics: Why Every Click Counts
PPTX
Enhancing Google Analytics: High-Impact Practices for Your Library
PPTX
Cryptography - Simplified - Key Generation - Asymmetric Keys
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography
PDF
How to Use Analytics on SlideShare
PPTX
3 Storytelling Tips - From Acclaimed Writer Burt Helm
PDF
12 Ways to Increase Your Influence at Work
PDF
10 Things To Be Thankful For by: @empoweredpres
PPTX
15 Quotes To Nurture Your Creative Soul!
PDF
How To Win That Next Sales Presentation - @High_Spark @cliffatkinson
PDF
The X factor: The Secret to Better Content Marketing
PPTX
10 Better Ways to Add Text to #Images
PDF
Our World is Hungry
PDF
20 Inspirational Leadership Quotes
PDF
The ABC’s of Living a Healthy Life
PDF
The Minimum Loveable Product
PDF
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
PDF
The Seven Deadly Social Media Sins
PDF
Five Killer Ways to Design The Same Slide
Click Analytics: Why Every Click Counts
Enhancing Google Analytics: High-Impact Practices for Your Library
Cryptography - Simplified - Key Generation - Asymmetric Keys
CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography
How to Use Analytics on SlideShare
3 Storytelling Tips - From Acclaimed Writer Burt Helm
12 Ways to Increase Your Influence at Work
10 Things To Be Thankful For by: @empoweredpres
15 Quotes To Nurture Your Creative Soul!
How To Win That Next Sales Presentation - @High_Spark @cliffatkinson
The X factor: The Secret to Better Content Marketing
10 Better Ways to Add Text to #Images
Our World is Hungry
20 Inspirational Leadership Quotes
The ABC’s of Living a Healthy Life
The Minimum Loveable Product
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
The Seven Deadly Social Media Sins
Five Killer Ways to Design The Same Slide
Ad

Similar to INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANALYTICS AND TWITTER METADATA (20)

PDF
IRJET- Secure Social Network using Text Mining
PDF
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
PDF
Detecting and Resolving Privacy Conflicts in Online Social Networks
PDF
IRJET- Malicious Short Urls Detection: A Survey
PDF
Insecure trends in web technologies 2009
PDF
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
PPTX
Info Session on Cybersecurity & Cybersecurity Study Jams
PPT
Web browser privacy and security
PDF
International Journal of Engineering Research and Development
PDF
Management Information Systems 12th Edition Laudon Test Bank
PDF
IRJET - Detecting Spiteful Accounts in Social Network
PDF
Management Information Systems 12th Edition Laudon Test Bank
PDF
Management Information Systems 12th Edition Laudon Test Bank
PDF
Social media platform and Our right to privacy
PDF
Posn private information protection in online social networks 2
PDF
Posn private information protection in online social networks 2
DOCX
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
PDF
PDF
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
PDF
cyber security
IRJET- Secure Social Network using Text Mining
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET- Malicious Short Urls Detection: A Survey
Insecure trends in web technologies 2009
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
Info Session on Cybersecurity & Cybersecurity Study Jams
Web browser privacy and security
International Journal of Engineering Research and Development
Management Information Systems 12th Edition Laudon Test Bank
IRJET - Detecting Spiteful Accounts in Social Network
Management Information Systems 12th Edition Laudon Test Bank
Management Information Systems 12th Edition Laudon Test Bank
Social media platform and Our right to privacy
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
cyber security
Ad

More from Nexgen Technology (20)

DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
DOCX
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
DOCX
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
DOCX
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
DOCX
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
DOCX
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
DOCX
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
DOCX
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...

Recently uploaded (20)

PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Lesson notes of climatology university.
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
1_English_Language_Set_2.pdf probationary
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Trump Administration's workforce development strategy
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
Complications of Minimal Access Surgery at WLH
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Hazard Identification & Risk Assessment .pdf
Lesson notes of climatology university.
Weekly quiz Compilation Jan -July 25.pdf
IGGE1 Understanding the Self1234567891011
A systematic review of self-coping strategies used by university students to ...
Final Presentation General Medicine 03-08-2024.pptx
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Orientation - ARALprogram of Deped to the Parents.pptx
Supply Chain Operations Speaking Notes -ICLT Program
1_English_Language_Set_2.pdf probationary
What if we spent less time fighting change, and more time building what’s rig...
Final Presentation General Medicine 03-08-2024.pptx
Trump Administration's workforce development strategy
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Unit 4 Skeletal System.ppt.pptxopresentatiom
Complications of Minimal Access Surgery at WLH

INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANALYTICS AND TWITTER METADATA

  • 1. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANALYTICS AND TWITTER METADATA ABSTRACT: Twitter is a popular online social network service for sharing short messages (tweets) among friends. Its users frequently use URL shortening services that provide (i) a short alias of a long URL for sharing it via tweets and (ii) public click analytics of shortened URLs. The public click analytics is provided in an aggregated form to preserve the privacy of individual users. In this paper, we propose practical attack techniques inferring who clicks which shortened URLs on Twitter using the combination of public information: Twitter metadata and public click analytics. Unlike the conventional browser history stealing attacks, our attacks only demand publicly available information provided by Twitter and URL shortening services. Evaluation results show that our attack can compromise Twitter users’ privacy with high accuracy. CONCLUSION In this paper, we proposed inference attacks to infer which shortened URLs clicked on by a target user. All the information needed in our attacks is public information: the click analytics of URL shortening services and Twitter metadata. To evaluate our attacks, we crawled and monitored the click analytics of URL shortening services and Twitter data. Throughout the
  • 2. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com experiments, we have shown that our attacks can infer the candidates in most cases. REFERENCES [1] L. Backstrom, C. Dwork, and J. Kleinberg, “Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography,” in Proc. 16th Int. World Wide Web Conf., 2007, pp. 181–190. [2] D. Boyd, S. Golder, and G. Lotan, “Tweet, tweet, retweet: Conversational aspects of retweeting on twitter,” in Proc. 43rd Hawaii Int. Conf. Syst. Sci., 2010, pp. 1–10. [3] Bugzilla. (2000). Bug 57351: css on a:visited can load an image and/or reveal if visitor been to a site. [Online]. Available: https://bugzilla.mozilla.org/show_bug.cgi? id=57351 [4] Bugzilla. (2002). Bug 147777: visited support allows queries into global history. [Online]. Available: https://bugzilla. mozilla.org/show_bug.cgi?id=147777 [5] J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov, ““You might also like:” Privacy risks of collaborative filtering,” in Proc. IEEE Symp. Secur. Privacy, 2011, pp. 231–246. [6] A. Chaabane, G. Acs, and M. A. Kaafar, “You are what you like! Information leakage through users’ interests,” in Proc. 19th Network and Distributed System Security Symp., 2012.
  • 3. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com [7] Z. Cheng, J. Caverlee, and K. Lee, “You are where you tweet: A content- based approach to geo-locating twitter users,” in Proc. 19th ACM Int. Conf. Inform. Knowl. Manage., 2010, pp. 759–768. [8] A. Clover. (2002). Css visited pages disclosure. [Online]. Available: http://seclists.org/bugtraq/2002/Feb/271 [9] C. Dwork, “Differential privacy,” in Proc. 33rd Int. Colloquium Automata, Languages Programm., Springer Berlin Heidelberg, 2006. pp. 1–12. [10] E. W. Felten and M. A. Schneider, “Timing attacks on web privacy,” in Proc. 7th ACM Conf. Comput. Comm. Secur. (CCS), 2000, pp. 25–32. [11] L. Grangeia, “Dns cache snooping or snooping the cache for fun and profit,” in SideStep Seguranca Digitial, Tech. Rep., (2004), [Online]. Available: http://www.rootsecure.net/content/downloads/pdf/dns_cache_snooping.pdf.