A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

07/12/2019
by   Avishek Bose, et al.
0

We present a new machine learning and text information extraction approach to detection of cyber threat events in Twitter that are novel (previously non-extant) and developing (marked by significance with respect to similarity with a previously detected event). While some existing approaches to event detection measure novelty and trendiness, typically as independent criteria and occasionally as a holistic measure, this work focuses on detecting both novel and developing events using an unsupervised machine learning approach. Furthermore, our proposed approach enables the ranking of cyber threat events based on an importance score by extracting the tweet terms that are characterized as named entities, keywords, or both. We also impute influence to users in order to assign a weighted score to noun phrases in proportion to user influence and the corresponding event scores for named entities and keywords. To evaluate the performance of our proposed approach, we measure the efficiency and detection error rate for events over a specified time interval, relative to human annotator ground truth.

READ FULL TEXT
research
07/25/2019

Real-time Event Detection on Social Data Streams

Social networks are quickly becoming the primary medium for discussing w...
research
05/28/2020

Complex networks for event detection in heterogeneous high volume news streams

Detecting important events in high volume news streams is an important t...
research
11/16/2017

An n-sided polygonal model to calculate the impact of cyber security events

This paper presents a model to represent graphically the impact of cyber...
research
04/04/2023

Thematic context vector association based on event uncertainty for Twitter

Keyword extraction is a crucial process in text mining. The extraction o...
research
01/03/2019

Event detection in Twitter: A keyword volume approach

Event detection using social media streams needs a set of informative fe...
research
10/05/2019

Content-Based Features to Rank Influential Hidden Services of the Tor Darknet

The unevenness importance of criminal activities in the onion domains of...
research
07/06/2022

EEPT: Early Discovery of Emerging Entities in Twitter with Semantic Similarity

Some events which happen in the future could be important for companies,...

Please sign up or login with your details

Forgot password? Click here to reset