Total views : 47

Knowledge Discovery in Tweets for the Prevention of Inference Attacks

Affiliations

  • Department of Computer Science and Engineering, Malla Reddy Engineering College for Women, Hyderabad − 500014, Telangana, India

Abstract


Objectives: The objective of our proposed study is to eliminate the inference attacks through knowledge discovery process without compromising the accuracy of the systems. Methods/Analysis: In this paper, we have explored an enhanced privacy adoption scheme for twitter users. A supervised learning model that prevents the inference attacks using hit analytics and metadata knowledge derivation systems. By integrating the extracted feature vectors, we have eliminated the inference attacks caused by third party applications and elegantly classified the malignant and benign URLs. Findings: The proposed model is experimented in twitter dataset. The tweet URLs are collected and segmented into different URLs and similar URLs. The performance analysis is in terms of frequency of URLs usage, User’s assurance level via hit analytics and accuracy. It is evident from the results that higher usage of twitter network is employed and as the rate of users increases, the proposed classifier detects the benign and malicious URLs at significant level of 83%. Novelty/Improvement: A recent development made in the digital era has seen a phenomenal growth of social users. The social users make use of social networks to share their opinions about the facts, events etc. Our proposed study has incorporated on twitter users where trained classifier is developed from the behavior analysis of tweets users.

Keywords

Click Analytics and Third Party Applications, Digital Era, Public Knowledge, Social Networks, Twitter, URL Services

Full Text:

 |  (PDF views: 35)

References


  • Jonghyuk Song et. al. Inference attack on browsing history of twitter users using public click analytics and twitter metadata, IEEE Transactions on Dependable and Secure Computing. 2014.
  • Neumann A. Analyzing security implications of URL shortening services, Diploma Thesis, RWTH Aachen University, 2011.
  • Maggi F, Frossi A, Zanero S, Stringhini G, Stone-Gross B, Kruegel C, Vigna G. Two years of short URLs internet measurement: Security threats and countermeasures, Intl. World Wide Web (WWW) Conference, Rio de Janeiro, 2013. Crossref.
  • Neumann A, Barnickel J, Meyer U. Security and privacy implications of URL shortening services, Web 2.0 Security and Privacy 2011 Conference, Oakland, USA, May 2011.
  • Antoniades D, Athanasopoulos E, Polakis I, Ioannidis S, Karagiannis T, Kontaxis G, Markatos EP. Web: The web of short URLs, 2011 Intl. World Wide Web (WWW) Conference, Hyderabad, India, March 2011. Crossref.
  • Iversion AI. Spamhaus and URL shortening services, Spam Ressource. Available at: http://www.spamresource.com/2011/03/spamhaus-url-shortening-services.html.
  • Lab MX. Increase in usage of URL shorteners in spam campaigns, Available at: Crossref.
  • Lauretti D. Facebook is blocking links from Google’s URL shortening service, Examiner, March 2013.
  • Lab MX. Shortened URLs: The real dangers behind and how to avoid troubles. Available at: Crossref.
  • Hoffman S. Cligs URL shortening service hacked, users redirected, CRN Technology News for Solution Providers and the IT Channel, June 2009, p.1.
  • Rajab M, Ballard L, Lutz N, Mavrommatis P, Provos N.CAMP: Content-agnostic malware protection, 20th Annual Network and Distributed System Security Symposium, CA: USA, February 24, 2013.
  • Merritt M. Family online safety guide, 4th ed. Norton Symantec Press, December 2012.
  • Consoi CA. Dealing with image spam, Virus Bulletin. Dec. 2006; 1-3.
  • Fry R. Malware defense and automation: Fully integrated defense operation, RSA Conference, February 24-27, 2014.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.