Unvilling In Twitter Inference Attack On Browsing History Of Twittwe Users Using Public Click Analytics And Twitter Metadata

Authors

  • Mohd hassan, Mohd SaadUddin, Mohammed Asim Sameer B.E. Student, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author
  • Mr. Suraj Prakash Yadav Associate Professor, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author

Keywords:

Real-time stress detection, physiological monitoring, hazardous operations, personalized stress assessment, wearable sensors, cognitive workload monitoring.

Abstract

Twitter is a popular online social network service for sharing short messages (tweets) among friends. Its users frequently use URL shortening services that provide (i) a short alias of a long URL for sharing it via tweets and (ii) public click analytics of shortened URLs. The public click analytics is provided in an aggregated form to preserve the privacy of individual users. In this paper, we propose practical attack techniques inferring who clicks which shortened URLs on Twitter using the combination of public information: Twitter metadata and public click analytics. Unlike the conventional browser history stealing attacks, our attacks only demand publicly available information provided by Twitter and URL shortening services. Evaluation results show that our attack can compromise Twitter users’ privacy with high accuracy. While these platforms offer unprecedented opportunities for connectivity and information sharing, they have also become fertile ground for the rapid dissemination of misinformation. In response to this growing concern, this study delves into a novel problem termed the Activity Minimization of Misinformation Influence (AMMI) problem. The core objective of the AMMI problem is to strategically identify and block a specific set of K nodes within a given social network G in such a way that the total amount of misinformation interaction between the remaining nodes (TAMIN) is minimized. Essentially, we aim to select K
influential nodes whose removal would most effectively curtail the spread and interaction of misinformation across the network. Neutralize key nodes that facilitate misinformation flow represents a crucial step towards effective network governance and the preservation of information integrity in the digital age.

Downloads

Published

2025-04-15

Issue

Section

Articles

How to Cite

Unvilling In Twitter Inference Attack On Browsing History Of Twittwe Users Using Public Click Analytics And Twitter Metadata. (2025). International Journal of Engineering and Science Research, 15(2s), 1605-1610. https://ijesr.org/index.php/ijesr/article/view/1332

Similar Articles

1-10 of 788

You may also start an advanced similarity search for this article.