Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

07/03/2019
by   Ba Dung Le, et al.
0

Preventing organizations from Cyber exploits needs timely intelligence about Cyber vulnerabilities and attacks, referred as threats. Cyber threat intelligence can be extracted from various sources including social media platforms where users publish the threat information in real time. Gathering Cyber threat intelligence from social media sites is a time consuming task for security analysts that can delay timely response to emerging Cyber threats. We propose a framework for automatically gathering Cyber threat intelligence from Twitter by using a novelty detection model. Our model learns the features of Cyber threat intelligence from the threat descriptions published in public repositories such as Common Vulnerabilities and Exposures (CVE) and classifies a new unseen tweet as either normal or anomalous to Cyber threat intelligence. We evaluate our framework using a purpose-built data set of tweets from 50 influential Cyber security related accounts over twelve months (in 2018). Our classifier achieves the F1-score of 0.643 for classifying Cyber threat tweets and outperforms several baselines including binary classification models. Our analysis of the classification results suggests that Cyber threat relevant tweets on Twitter do not often include the CVE identifier of the related threats. Hence, it would be valuable to collect these tweets and associate them with the related CVE identifier for cyber security applications.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/28/2023

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

Time-relevant and accurate threat information from public domains are es...
research
09/09/2021

Social Media Monitoring for IoT Cyber-Threats

The rapid development of IoT applications and their use in various field...
research
08/16/2021

Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling

Due to the variety of cyber-attacks or threats, the cybersecurity commun...
research
04/23/2021

A Framework for Unsupervised Classificiation and Data Mining of Tweets about Cyber Vulnerabilities

Many cyber network defense tools rely on the National Vulnerability Data...
research
01/29/2018

Early Warnings of Cyber Threats in Online Discussions

We introduce a system for automatically generating warnings of imminent ...
research
04/03/2019

Processing Tweets for Cybersecurity Threat Awareness

Receiving timely and relevant security information is crucial for mainta...
research
08/24/2022

"Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine

The Russian Invasion of Ukraine in early 2022 resulted in a rapidly chan...

Please sign up or login with your details

Forgot password? Click here to reset