Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

06/28/2023
by   Dincy R Arikkat, et al.
0

Time-relevant and accurate threat information from public domains are essential for cyber security. In a constantly evolving threat landscape, such information assists security researchers in thwarting attack strategies. In this work, we collect and analyze threat-related information from Twitter to extract intelligence for proactive security. We first use a convolutional neural network to classify the tweets as containing or not valuable threat indicators. In particular, to gather threat intelligence from social media, the proposed approach collects pertinent Indicators of Compromise (IoCs) from tweets, such as IP addresses, URLs, File hashes, domain addresses, and CVE IDs. Then, we analyze the IoCs to confirm whether they are reliable and valuable for threat intelligence using performance indicators, such as correctness, timeliness, and overlap. We also evaluate how fast Twitter shares IoCs compared to existing threat intelligence services. Furthermore, through machine learning models, we classify Twitter accounts as either automated or human-operated and delve into the role of bot accounts in disseminating cyber threat information on social media. Our results demonstrate that Twitter is growing into a powerful platform for gathering precise and pertinent malware IoCs and a reliable source for mining threat intelligence.

READ FULL TEXT

page 17

page 21

page 22

page 24

research
07/03/2019

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

Preventing organizations from Cyber exploits needs timely intelligence a...
research
01/27/2023

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Open source intelligence is a powerful tool for cybersecurity analysts t...
research
03/31/2020

Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream

In recent days, the amount of Cyber Security text data shared via social...
research
10/12/2022

BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces

StyleGAN is the open-sourced TensorFlow implementation made by NVIDIA. I...
research
09/14/2021

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

The clear, social, and dark web have lately been identified as rich sour...
research
08/24/2022

"Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine

The Russian Invasion of Ukraine in early 2022 resulted in a rapidly chan...
research
04/03/2019

Processing Tweets for Cybersecurity Threat Awareness

Receiving timely and relevant security information is crucial for mainta...

Please sign up or login with your details

Forgot password? Click here to reset