Submit Search
Upload
Web of Short URL’s
•
0 likes
•
59 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i3/IRJET-V4I326.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
IJNSA Journal
Extracting Resources that Help Tell Events' Stories
Extracting Resources that Help Tell Events' Stories
Carlo Andrea Conte
Iy2515891593
Iy2515891593
IJERA Editor
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...
Augustin Jose
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
IJET - International Journal of Engineering and Techniques
Adaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevance
eSAT Journals
A web content analytics
A web content analytics
csandit
Twitter api
Twitter api
kaleem malick
Recommended
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
IJNSA Journal
Extracting Resources that Help Tell Events' Stories
Extracting Resources that Help Tell Events' Stories
Carlo Andrea Conte
Iy2515891593
Iy2515891593
IJERA Editor
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...
WARNINGBIRD: A NEAR REAL-TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER...
Augustin Jose
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
IJET - International Journal of Engineering and Techniques
Adaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevance
eSAT Journals
A web content analytics
A web content analytics
csandit
Twitter api
Twitter api
kaleem malick
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A Survey
IRJET Journal
Detecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
ijtsrd
Semantically-Interlinked Based on Rich Site Summary Bank for Sites of Indones...
Semantically-Interlinked Based on Rich Site Summary Bank for Sites of Indones...
IRJET Journal
Web usage Mining Based on Request Dependency Graph
Web usage Mining Based on Request Dependency Graph
IRJET Journal
REST based API
REST based API
ijtsrd
IRJET- Page Ranking Algorithms – A Comparison
IRJET- Page Ranking Algorithms – A Comparison
IRJET Journal
IRJET - Review on Search Engine Optimization
IRJET - Review on Search Engine Optimization
IRJET Journal
International conference On Computer Science And technology
International conference On Computer Science And technology
anchalsinghdm
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining
Editor IJMTER
Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...
JPINFOTECH JAYAPRAKASH
IRJET- Semantic Web Mining and Semantic Search Engine: A Review
IRJET- Semantic Web Mining and Semantic Search Engine: A Review
IRJET Journal
Smart Crawler Automation with RMI
Smart Crawler Automation with RMI
IRJET Journal
Modelling social Web applications via tinydb
Modelling social Web applications via tinydb
Claudiu Mihăilă
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...
IRJET Journal
Learning to detect phishing ur ls
Learning to detect phishing ur ls
eSAT Publishing House
Farthest first clustering in links reorganization
Farthest first clustering in links reorganization
IJwest
DLTSR_A_Deep_Learning_Framework_for_Recommendations_of_Long-Tail_Web_Services...
DLTSR_A_Deep_Learning_Framework_for_Recommendations_of_Long-Tail_Web_Services...
NAbderrahim
Smart Crawler: A Two Stage Crawler for Concept Based Semantic Search Engine.
Smart Crawler: A Two Stage Crawler for Concept Based Semantic Search Engine.
iosrjce
E017624043
E017624043
IOSR Journals
Research Paper
Research Paper
Dominic Mutai
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Web of Short URL’s
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A Survey
IRJET Journal
Detecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
ijtsrd
Semantically-Interlinked Based on Rich Site Summary Bank for Sites of Indones...
Semantically-Interlinked Based on Rich Site Summary Bank for Sites of Indones...
IRJET Journal
Web usage Mining Based on Request Dependency Graph
Web usage Mining Based on Request Dependency Graph
IRJET Journal
REST based API
REST based API
ijtsrd
IRJET- Page Ranking Algorithms – A Comparison
IRJET- Page Ranking Algorithms – A Comparison
IRJET Journal
IRJET - Review on Search Engine Optimization
IRJET - Review on Search Engine Optimization
IRJET Journal
International conference On Computer Science And technology
International conference On Computer Science And technology
anchalsinghdm
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining
Editor IJMTER
Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...
JPINFOTECH JAYAPRAKASH
IRJET- Semantic Web Mining and Semantic Search Engine: A Review
IRJET- Semantic Web Mining and Semantic Search Engine: A Review
IRJET Journal
Smart Crawler Automation with RMI
Smart Crawler Automation with RMI
IRJET Journal
Modelling social Web applications via tinydb
Modelling social Web applications via tinydb
Claudiu Mihăilă
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...
IRJET Journal
Learning to detect phishing ur ls
Learning to detect phishing ur ls
eSAT Publishing House
Farthest first clustering in links reorganization
Farthest first clustering in links reorganization
IJwest
DLTSR_A_Deep_Learning_Framework_for_Recommendations_of_Long-Tail_Web_Services...
DLTSR_A_Deep_Learning_Framework_for_Recommendations_of_Long-Tail_Web_Services...
NAbderrahim
Smart Crawler: A Two Stage Crawler for Concept Based Semantic Search Engine.
Smart Crawler: A Two Stage Crawler for Concept Based Semantic Search Engine.
iosrjce
E017624043
E017624043
IOSR Journals
Research Paper
Research Paper
Dominic Mutai
Similar to Web of Short URL’s
(20)
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A Survey
Detecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
Semantically-Interlinked Based on Rich Site Summary Bank for Sites of Indones...
Semantically-Interlinked Based on Rich Site Summary Bank for Sites of Indones...
Web usage Mining Based on Request Dependency Graph
Web usage Mining Based on Request Dependency Graph
REST based API
REST based API
IRJET- Page Ranking Algorithms – A Comparison
IRJET- Page Ranking Algorithms – A Comparison
IRJET - Review on Search Engine Optimization
IRJET - Review on Search Engine Optimization
International conference On Computer Science And technology
International conference On Computer Science And technology
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining
Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...
IRJET- Semantic Web Mining and Semantic Search Engine: A Review
IRJET- Semantic Web Mining and Semantic Search Engine: A Review
Smart Crawler Automation with RMI
Smart Crawler Automation with RMI
Modelling social Web applications via tinydb
Modelling social Web applications via tinydb
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...
Learning to detect phishing ur ls
Learning to detect phishing ur ls
Farthest first clustering in links reorganization
Farthest first clustering in links reorganization
DLTSR_A_Deep_Learning_Framework_for_Recommendations_of_Long-Tail_Web_Services...
DLTSR_A_Deep_Learning_Framework_for_Recommendations_of_Long-Tail_Web_Services...
Smart Crawler: A Two Stage Crawler for Concept Based Semantic Search Engine.
Smart Crawler: A Two Stage Crawler for Concept Based Semantic Search Engine.
E017624043
E017624043
Research Paper
Research Paper
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
result management system report for college project
result management system report for college project
Tonystark477637
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
fenichawla
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
simmis5
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Recently uploaded
(20)
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
result management system report for college project
result management system report for college project
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Web of Short URL’s
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 102 Web of Short URL’s Prerna Yadav 1, Pragati Patil 2, Mrunal Badade 3, Nivedita Mhatre4 1Student, Computer Engineering, Bharati Vidyapeeth Institute of Technology, Maharashtra, India 2Student, Computer Engineering, Bharati Vidyapeeth Institute of Technology, Maharashtra, India 3 Student, Computer Engineering, Bharati Vidyapeeth Institute of Technology, Maharashtra, India 4 Student, Computer Engineering, Bharati Vidyapeeth Institute of Technology, Maharashtra, India -----------------------------------------------------------------***------------------------------------------------------------------------ Abstract: Short URLs have become universal. Especially popular in social networking services, short URLs have been seen a compelling increase in their usage over the past years of URL shortening services, that are replaced long URLs with shorter ones and redirect it for the shortened URL to the original long URL. As the usage of shortened URLs is convenient, shortened URLs have become common. The study is based on the traces of short URLs from two different perspectives use of a large-scale crawl of URL shortening services use of a crawler for twitter messages. The different focus we will provide a more in depth analysis in the distribution, stability, lifespan and overall use of the short URLs. Key Words: Short URLs, Large scale crawls, Twitter, Stability. 1. INTRODUCTION URL shortening has emerged into one of the leading methods for the easy propagation and allocation of URLs. URL shortening assistance provides their users with a less identical of any grant long URL, and switch consecutive visitant to the expected source. Despite the first well-known URL shortening assistance, namely tiny URL [2], dates back to 2002, currently users can appoint from a large selection of such assistance. The latest popularity of shortening assistance is an outcome of their large-scale usage in Online Social Networks (OSNs) assistance. Short URL accesses serve as small chunk of the “web hits” a site obtains; they are swiftly growing by as enough as 10% per month according to Alexa (Keyword Research, Competitor Analysis, & Website Ranking) [1]. Even with this speedy growth, there is a best of our observation, no other large-scale study in the history that sheds light onto the peculiarity and management guidance of short URLs. We sense that understanding their management has become crucial for certain reasons, along with: Short URLs are extensively used in functional communities and services such as Twitter, as well as in several Online Social Networks and Instant Messaging (IM) systems. A study of URL shortening assistance will implement judgment into the significance of such association likewise an improved understanding of their peculiarity related to the broader web browsing community. Some URL shortening services, such as bit.ly have grown so much in popularity, which they now account for as much as one percent of the total web population per day. If this trend continues, URL shortening services will become part of the web’s critical infrastructure, posing challenging questions regarding its performance, scalability, and reliability. We believe that answering these questions and defining the proper architectures for URL shortening services without understanding their access patterns is not feasible. To understand the nature and impact of URL shortening services, we perform the first large-scale crawl of URL shortening services and analyze the use of short URLs across different applications. Our study is depend on fragments of short URLs as examine from two distinct aspect they are collected over an extensive clamber of URL shortening assistances, and collected by crawling Twitter news. The 1st fragment administer insights for an ordinary characterization on the management of short URLs. The 2nd fragment changes our target onto how convinced association operate shortening assistances. The features of our task can be encapsulated as pursue we study the operations that operate short URLs and present that more connections to short URLs appear from IM Schemes, email applicants and OSN media operations, suggesting a “word of mouth” URL dissemination. This dissemination involves that short URLs comes frequently in short-lived media, with serious chattels on their reputation, period, and connection arrangements.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 103 We present that the short URL snap dissemination can be firmly near by a log-normal arch, validating the order that a limited number of URLs have a very huge number of connections, while the bulk of short URLs has very small connections. We present the connection density of short URLs and examine that a huge proportion of short URLs are not short-lived. 50% of short URLs alive for likewise three months. In addition, we examine large business in the connection of short URLs extra short URLs turn into trendy acutely rapid implying a “twitter effect”, which may build compelling service deluges and may pose attractive architecture objections for web sites. We present that the biggest attractive web sites changes deliberately extra, while having a robust fundamental of web sites which remains stable completely the tested duration. Our analysis also recommend that the web sites which are attractive in the short URL association alter completely from the sites which are attractive among the large-scale web association. We examine the achievement indication of the operation of short URLs. We treasure trove that in likewise 90% of the cabinets, the emerging short URL shorten the bulk of bytes required for the URL by 95%. This emerge recommends that URL shortening utilities are intensely adequate in field expanding. On the other hand, we examine that the introduce alternation of URL shortening utilities raises the web page connection times by a supplementary 54% corresponding overhead. This consequence should be taken into examination for the architecture of subsequent URL shortening utilities. 2. METHODOLOGY We operate two ways to gather short URLs: i) Crawling, in which we hunt Twitter to treasure trove tweets which encompass URLs and ii) Brute-Force, in which we drag two URL shortening utilities, that is bit.ly and ow.ly, by organizing hashes of contrasting sizes and exploring which of them earlier occurs. As specified in the earlier section, bit.ly preserves an information page for every generated short URL. This page implements accurate analysis respecting the bulk of hits a short URL collected, its HTTP assigns and the geographical positions of its visitors. The regular bulk of hits since the formation of the short URL is also document. Information regarding the number of hits from every referrer and country is granted as well. For every bit.ly short URL in our fragments we also gather the followed information pages. Information pages for short URLs generated by certified users still encompass a quotation to the global short URL for this long URL. For the well-being of integrity, our analysis combines the information hand over by the global hash. Unfortunately, ow.ly does not grant any such information. 2.1. Twitter dragging Using the 1st approach, we hunt for HTTP URLs that were placed on Twitter. Using the Twitter hunt functionality [4], we gather tweets that encompass HTTP URLs. Twitter establish rate limiting in the number of hunt demands per hour from an obsessed IP address [3]. To regard this policy we check our crawler to one hunt demand every 5 minutes. Every search request retrieves up to 1500 results, going no more than 7 days (max) back in time. During our collection period we handled to collect more than 20 million tweets consist of HTTP URLs. A small portion of the HTTP URLs (13%) collected was not shortened by any URL shortening service. Among the HTTP URLs collected from Twitter, 50% were bit.ly URLs. The second most popular shortening service was tl.gd with 4%, while tiny URL compare to 3.5% and ow.ly become to 1.5% of the overall URLs. Hence, part of our analysis target on bit.ly URLs. 2.2. Brute-Force Using the second method, we intensely search the available key space for ow.ly and bit.ly hashes. While the Twitter crawling access returns links recently “gossiped” in a social network, this access acts as an alternate source of collection, providing hashes irrespective of their published medium and regency. In the bit.ly case, we searched the entire key space [0-9a-zA-Z] for hashes of up to 3 characters in length presently, the shortening service returns 6-character hashes, indicating a significant exhaustion of shorter combinations. In the case of ow.ly, the system does not disseminate random hashes of the user’s long URL, but serially iterates over the available short URL space; thus, if the same long URL is submitted multiple times, it will result in multiple different hashes. Considering this deterministic registration
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 104 mechanism, we collected the full set of short URLs created for a period of 9 days. During that time, we monitored the evolution of the key space by creating a new short URL of our own every hour and measuring the distance from the one we had created the previous hour. Using this heuristic, we were able to determine which and how many short URLs were created during that timeframe with a granularity of one hour. Chart -1: Number of ow.ly short URLs created as a function of time. Chart 1 shows the number of ow.ly URLs certified as a function of time. We observe a clear diurnal and weekly cycle, with about 70,000 new short URLs created each day. 3. URL’S POINT TO? Having observed that short UR smartly arise in non- browser types of applications, we now plan at understanding the type of web pages that are very popular through bit.ly links. We casually classified the content of the 100 most accessed domains in the twitter trace. Similarly, we classified the links of the owly trace, which was gained via the Brute-Force method. In this case of ow.ly, the number of approach per short URL is not available so we selected the most popular domain that are more popular in the webs. Chart -2: Summary of data collected Chart -3: Most popular types of content. Chart 3 represents the top most categories for each case. One may notice that news and informative content come first. This observation corroborates the finding of Kwak et al. [9], which suggested that Twitter acts more as an information-relaying network rather than as a social networking site. However, while this study suggests that trending topics are related to news by as much as 85%, the fraction of news related short URLs is significantly lower in our case (25% and 51% for the two traces). A surprising finding is that 4 of the most accessed URLs in the owly trace were shortening services. Such cases reflect short URLs packed inside other short URLs to avoid exposure of the long URLs from tools that unwrap the first level of redirection. Spammers use such techniques to avoid detection, as mentioned by Grier et al. in [16]. Manually examining a number of these URLs confirmed this suspicion with a large number of short URLs pointing to spam content. We plan further investigation of this phenomenon as future work. 4. RELATED WORK Interest in online social networks and services has been significant over the past years. Several measurement studies have examined basic graph properties such as degree distributions or clustering coefficients [8, 11] or their particular structure [17]. While part of our traces originates from Twitter, our work significantly differs from these
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 105 studies as we focus on the use of short URLs and their presence within a social network, rather than network itself. Chart -4: Cumulative Distribution Function for the daily click differences for the TOP-10/1000/10000 short URLs. Chart 2 is a part of our analysis relates to the evolution of content popularity, information propagation through social links, as well as popularity of objects and applications in social networks. For example, in [6, 7] the authors study how Flickr images evolve and how information propagates through the Flickr social graph. Lerman and Ghosh [10] in investigated the information spread in Twitter and Digg and showed that although Twitter is a less solid network and spreads information slower than Digg, information continues to spread for longer and penetrates further the social graph. In a spirit similar to these studies, we examine how content becomes popular over time. However, in this work, we focus on how this popularity is reflected by the hit rate of short URLs. Cha et al [5] also deal with content popularity by performing a study of user generated content via crawling the YouTube and Daum sites. The authors observed the presence of the Pareto principle. Our analysis confirms that this is also the case in the popularity of short URLs. Our observations on the dispersion of the hit rates of short URLs are consistent with the well-documented findings on the existence of Zipf’s Law and heavy-tailed distributions in WWW. However, our work further highlights that a web site’s popularity does not necessarily translate in an equivalent popularity in the “web of short URLs”. Information propagation in Twitter has been studied in. The authors have crawled the Twitter network and analyzed the temporal behavioral of trending topics. The authors suggested that Twitter is mostly a news propagation network, with more than 85% of trending topics reflecting headline news. Indeed, this observation is also confirmed by our study. A large fraction of short URLs points to news-related domains; however, the percentage of news related URLs appears lower in our study, 7 out of the top-100 URLs. Information propagation in Twitter has been studied in [18]. The authors have crawled the Twitter network and analyzed the temporal behavioral of trending topics. 5. CONCLUSIONS We have presented a large-scale study of URL shortening services by exploring traces both from the services themselves and from one of the largest pools of short URLs, namely the Twitter social network. To our knowledge, this paper presents the first extensive characterization study of such services. Specifically, we provided a general characterization on the web of short URLs, presenting their main distribution channels, their user community and its interests, as well as their popularity. Furthermore, we explored their lifetime and access patterns showing an activity period of more than a month with an increased popularity over the first days of their life. We explored the publishers of short URLs, and show a possibility of increased popularity when short URLs are accessed through Twitter. Additionally, a publisher of such URLs is more likely to be considered a spammer and enjoy decreased popularity when operating at an aggressive rate. Finally, we quantified the performance of URL shortening services, showing a high space gain in terms of bytes used, but also increased overhead in the web page transfer times when accessed through short URLs. This overhead increases web page access time by more than 54% in 50% of the cases, implying that alternative shortening archive. 6. REFERENCES [1] Alexa Traffic Stats. http://www.alexa.com/ siteinfo/bit.ly#trafficstats. [2] TinyURL.com. http://tinyurl.com/. [3] Twitter Rate Limit. http://apiwiki.twitter.com/Rate- limiting. [4] Twitter Search. http://search.twitter.com/. [5] M. Cha, H. Kwak, P. R. P., Y.-Y. Ahn, and S. Moon. I Tube, You Tube, Everybody Tubes: Analyzing the World’s Largest User Generated Content Video System. In ACM IMC ’07, San Diego, CA, USA, pages 1–14, 2007. [6] M. Cha, A. Mislove, B. Adams, and K. Gummadi. Characterizing Social Cascades in Flickr. In ACM SIGCOMM Workshop on OSNs, 2008.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 106 [7] M. Cha, A. Mislove, and K. P. Gummadi. A Measurement- driven Analysis of Information Propagation in the Flickr Social Network. In Proc. of the 18 Intl. World Wide Web Conference (WWW), 2009. [8] H. Chun, H. Kwak, Y. Eom, Y. Ahn, S. Moon, and H. Jeong. Comparison of online social relations in volume vs interaction: a case study of cyworld. In IMC ’08: Proc. of the ACM SIGCOMM conference on Internet measurement. [9] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In WWW ’10: Proceedings of the 19th international conference on World wide web, pages 591–600, New York, NY, USA, 2010. ACM. [10] K. Lerman and R. Ghosh. Information contagion: n empirical study of the spread of news on digg and twitter social networks. In Proceedings of the 3th AAAI Conference on Weblogs and Social Media (ICWSM’10), pages 90–97, 2010. [11] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and Analysis of Online Social Networks. In Proc of the 5th ACM/USENIX Internet Measurement Conference (IMC’07), 2007. 7. BIOGRAPHIES Prerna Yadav, Student of Bharati VidyaPeeth college of Engineering, completing last year of my diploma in Computer Technology department. Pragati Patil, Student of Bharati VidyaPeeth college of Engineering, completing last year of my diploma in Computer Technology department. Mrunal Badade, Student of Bharati VidyaPeeth college of Engineering, completing last year of my diploma in Computer Technology department. Nivedita Mhatre, Student of Bharati VidyaPeeth college of Engineering, completing last year of my diploma in Computer Technology department.
Download now