Evaluating the Performance of Twitter-based Exploit Detectors

11/05/2020
by   Daniel Alves de Sousa, et al.
0

Patch prioritization is a crucial aspect of information systems security, and knowledge of which vulnerabilities were exploited in the wild is a powerful tool to help systems administrators accomplish this task. The analysis of social media for this specific application can enhance the results and bring more agility by collecting data from online discussions and applying machine learning techniques to detect real-world exploits. In this paper, we use a technique that combines Twitter data with public database information to classify vulnerabilities as exploited or not-exploited. We analyze the behavior of different classifying algorithms, investigate the influence of different antivirus data as ground truth, and experiment with various time window sizes. Our findings suggest that using a Light Gradient Boosting Machine (LightGBM) can benefit the results, and for most cases, the statistics related to a tweet and the users who tweeted are more meaningful than the text tweeted. We also demonstrate the importance of using ground-truth data from security companies not mentioned in previous works.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/25/2017

Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

Each year, thousands of software vulnerabilities are discovered and repo...
research
02/24/2020

Angry Birds Flock Together: Aggression Propagation on Social Media

Cyberaggression has been found in various contexts and online social pla...
research
09/09/2021

Social Media Monitoring for IoT Cyber-Threats

The rapid development of IoT applications and their use in various field...
research
11/07/2018

Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls

Over the past few years, extensive anecdotal evidence emerged that sugge...
research
01/20/2016

The DARPA Twitter Bot Challenge

A number of organizations ranging from terrorist groups such as ISIS to ...
research
08/03/2023

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

This paper proposes a machine learning-based approach for detecting the ...
research
10/07/2018

Geocoding Without Geotags: A Text-based Approach for reddit

In this paper, we introduce the first geolocation inference approach for...

Please sign up or login with your details

Forgot password? Click here to reset